Lakhasly

Online English Summarizer tool, free and accurate!

Summarize result (35%)

ISO/IEC 27000:2018(E) and improving an organization's information security to achieve business objectives. The following fundamental principles also contribute to the successful implementation of an ISMS: a) awareness of the need for information security; b) assignment of responsibility for information security; c) incorporating management commitment and the interests of stakeholders; d) enhancing societal values; e) risk assessments determining appropriate controls to reach acceptable levels of risk; f) security incorporated as an essential element of information networks and systems; g) active prevention and detection of information security incidents; h) ensuring a comprehensive approach to information security management; i) continual reassessment of information security and making of modifications as appropriate.In terms of information security, a management system allows an organization to: a) satisfy the information security requirements of customers and other stakeholders; b) improve an organization's plans and activities; c) meet the organization's information security objectives; d) comply with regulations, legislation and industry mandates; and e) manage information assets in an organized way that facilitates continual improvement and adjustment to current organizational goals.Information security is achieved through the implementation of an applicable set of controls, selected through the chosen risk management process and managed using an ISMS, including policies, processes, procedures, organizational structures, software and hardware to protect the identified information assets.Analysing requirements for the protection of information assets and applying appropriate controls to ensure the protection of these information assets, as required, contributes to the successful implementation of an ISMS.Information security involves the application and management of appropriate controls that involves consideration of a wide range of threats, with the aim of ensuring sustained business success and continuity, and minimizing consequences of information security incidents.12 (C) ISO/IEC 2018 - All rights reserved ISO/IEC 27000:2018(E) In terms of an ISMS, management involves the supervision and making of decisions necessary to achieve business objectives through the protection of the organization's information assets.Management of information security is expressed through the formulation and use of information security policies, procedures and guidelines, which are then applied throughout the organization by all individuals associated with the organization.This technology is often an essential element in the organization and assists in facilitating the creation, processing, storing, transmitting, protection and destruction of information.These controls need to be specified, implemented, monitored, reviewed and improved where necessary, to ensure that the specific information security and business objectives of the organization are met.The management system includes organizational structure, policies, planning activities, responsibilities, practices, procedures, processes and resources.Any activity using resources needs to be managed to enable the transformation of inputs into outputs using a set of interrelated or interacting activities; this is also known as a process.Information can be transmitted by various means including: courier, electronic or verbal communication.Management structures extend from one person in a small organization to management hierarchies consisting of many individuals in large organizations.4.2.2 Information Information is an asset that, like other important business assets, is essential to an organization's business and, consequently, needs to be suitably protected.Information can be stored in many forms, including: digital form (e.g. data files stored on electronic or optical media), material form (e.g. on paper), as well as unrepresented information in the form of knowledge of the employees.Relevant information security controls are expected to be seamlessly integrated with an organization's business processes.4.2.4 Management Management involves activities to direct, control, and continually improve the organization within appropriate structures.Management activities include the act, manner, or practice of organizing, handling, directing, supervising, and controlling resources.The output from one process can directly form the input to another process and generally this transformation is carried out under planned and controlled conditions.It is based on a risk assessment and the organization's risk acceptance levels designed to effectively treat and manage risks.4.3 Process approach Organizations need to identify and manage many activities in order to function effectively and efficiently.4.2.3 Information security Information security ensures the confidentiality, availability and integrity of information.4.2.5 Management system A management system uses a framework of resources to achieve an organization's objectives.In many organizations, information is dependent on information and communications technology.Whatever form information takes, or the means by which it is transmitted, it always needs appropriate protection.


Original text

ISO/IEC 27000:2018(E)
and improving an organization’s information security to achieve business objectives. It is based on a
risk assessment and the organization’s risk acceptance levels designed to effectively treat and manage
risks. Analysing requirements for the protection of information assets and applying appropriate
controls to ensure the protection of these information assets, as required, contributes to the successful
implementation of an ISMS. The following fundamental principles also contribute to the successful
implementation of an ISMS:
a) awareness of the need for information security;
b) assignment of responsibility for information security;
c) incorporating management commitment and the interests of stakeholders;
d) enhancing societal values;
e) risk assessments determining appropriate controls to reach acceptable levels of risk;
f) security incorporated as an essential element of information networks and systems;
g) active prevention and detection of information security incidents;
h) ensuring a comprehensive approach to information security management;
i) continual reassessment of information security and making of modifications as appropriate.
4.2.2 Information
Information is an asset that, like other important business assets, is essential to an organization’s
business and, consequently, needs to be suitably protected. Information can be stored in many forms,
including: digital form (e.g. data files stored on electronic or optical media), material form (e.g. on
paper), as well as unrepresented information in the form of knowledge of the employees. Information
can be transmitted by various means including: courier, electronic or verbal communication. Whatever
form information takes, or the means by which it is transmitted, it always needs appropriate protection.
In many organizations, information is dependent on information and communications technology. This
technology is often an essential element in the organization and assists in facilitating the creation,
processing, storing, transmitting, protection and destruction of information.
4.2.3 Information security
Information security ensures the confidentiality, availability and integrity of information. Information
security involves the application and management of appropriate controls that involves consideration
of a wide range of threats, with the aim of ensuring sustained business success and continuity, and
minimizing consequences of information security incidents.
Information security is achieved through the implementation of an applicable set of controls, selected
through the chosen risk management process and managed using an ISMS, including policies, processes,
procedures, organizational structures, software and hardware to protect the identified information
assets. These controls need to be specified, implemented, monitored, reviewed and improved where
necessary, to ensure that the specific information security and business objectives of the organization
are met. Relevant information security controls are expected to be seamlessly integrated with an
organization’s business processes.
4.2.4 Management
Management involves activities to direct, control, and continually improve the organization within
appropriate structures. Management activities include the act, manner, or practice of organizing,
handling, directing, supervising, and controlling resources. Management structures extend from one
person in a small organization to management hierarchies consisting of many individuals in large
organizations.
12 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
In terms of an ISMS, management involves the supervision and making of decisions necessary to achieve
business objectives through the protection of the organization’s information assets. Management of
information security is expressed through the formulation and use of information security policies,
procedures and guidelines, which are then applied throughout the organization by all individuals
associated with the organization.
4.2.5 Management system
A management system uses a framework of resources to achieve an organization’s objectives. The
management system includes organizational structure, policies, planning activities, responsibilities,
practices, procedures, processes and resources.
In terms of information security, a management system allows an organization to:
a) satisfy the information security requirements of customers and other stakeholders;
b) improve an organization’s plans and activities;
c) meet the organization’s information security objectives;
d) comply with regulations, legislation and industry mandates; and
e) manage information assets in an organized way that facilitates continual improvement and
adjustment to current organizational goals.
4.3 Process approach
Organizations need to identify and manage many activities in order to function effectively and
efficiently. Any activity using resources needs to be managed to enable the transformation of inputs into
outputs using a set of interrelated or interacting activities; this is also known as a process. The output
from one process can directly form the input to another process and generally this transformation
is carried out under planned and controlled conditions. The application of a system of processes
within an organization, together with the identification and interactions of these processes, and their
management, can be referred to as a “process approach”.
4.4 Why an ISMS is important
Risks associated with an organization’s information assets need to be addressed. Achieving information
security requires the management of risk, and encompasses risks from physical, human and technology
related threats associated with all forms of information within or used by the organization.
The adoption of an ISMS is expected to be a strategic decision for an organization and it is necessary
that this decision is seamlessly integrated, scaled and updated in accordance with the needs of the
organization.
The design and implementation of an organization’s ISMS is influenced by the needs and objectives of the
organization, the security requirements, the business processes employed and the size and structure
of the organization. The design and operation of an ISMS needs to reflect the interests and information
security requirements of all of the organization’s stakeholders including customers, suppliers, business
partners, shareholders and other relevant third parties.
In an interconnected world, information and related processes, systems, and networks constitute critical
business assets. Organizations and their information systems and networks face security threats from
a wide range of sources, including computer-assisted fraud, espionage, sabotage, vandalism, fire and
flood. Damage to information systems and networks caused by malicious code, computer hacking, and
denial of service attacks have become more common, more ambitious, and increasingly sophisticated.
An ISMS is important to both public and private sector businesses. In any industry, an ISMS is an
enabler that supports e-business and is essential for risk management activities. The interconnection of
public and private networks and the sharing of information assets increase the difficulty of controlling
© ISO/IEC 2018 – All rights reserved 13
ISO/IEC 27000:2018(E)
access to and handling of information. In addition, the distribution of mobile storage devices containing
information assets can weaken the effectiveness of traditional controls. When organizations adopt
the ISMS family of standards, the ability to apply consistent and mutually-recognizable information
security principles can be demonstrated to business partners and other interested parties.
Information security is not always taken into account in the design and development of information
systems. Further, information security is often thought of as being a technical solution. However, the
information security that can be achieved through technical means is limited, and can be ineffective
without being supported by appropriate management and procedures within the context of an ISMS.
Integrating security into a functionally complete information system can be difficult and costly. An ISMS
involves identifying which controls are in place and requires careful planning and attention to detail. As
an example, access controls, which can be technical (logical), physical, administrative (managerial) or a
combination, provide a means to ensure that access to information assets is authorized and restricted
based on the business and information security requirements.
The successful adoption of an ISMS is important to protect information assets allowing an organization to:
a) achieve greater assurance that its information assets are adequately protected against threats on a
continual basis;
b) maintain a structured and comprehensive framework for identifying and assessing information
security risks, selecting and applying applicable controls, and measuring and improving their
effectiveness;
c) continually improve its control environment; and
d) effectively achieve legal and regulatory compliance.
4.5 Establishing, monitoring, maintaining and improving an ISMS
4.5.1 Overview
An organization needs to undertake the following steps in establishing, monitoring, maintaining and
improving its ISMS:
a) identify information assets and their associated information security requirements (see 4.5.2);
b) assess information security risks (see 4.5.3) and treat information security risks (see 4.5.4);
c) select and implement relevant controls to manage unacceptable risks (see 4.5.5);
d) monitor, maintain and improve the effectiveness of controls associated with the organization’s
information assets (see 4.5.6).
To ensure the ISMS is effectively protecting the organization’s information assets on an ongoing
basis, it is necessary that steps a) to d) be continually repeated to identify changes in risks or in the
organization’s strategies or business objectives.
4.5.2 Identifying information security requirements
Within the overall strategy and business objectives of the organization, its size and geographical spread,
information security requirements can be identified through an understanding of the following:
a) identified information assets and their value;
b) business needs for information processing, storage and communication;
c) legal, regulatory, and contractual requirements.
Conducting a methodical assessment of the risks associated with the organization’s information
assets involves analysing threats to information assets, vulnerabilities to and the likelihood of a threat
14 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
materializing to information assets, and the potential impact of any information security incident
on information assets. The expenditure on relevant controls is expected to be proportionate to the
perceived business impact of the risk materializing.
4.5.3 Assessing information security risks
Managing information security risks requires a suitable risk assessment and risk treatment method
which can include an estimation of the costs and benefits, legal requirements, the concerns of
stakeholders, and other inputs and variables as appropriate.
Risk assessment should identify, quantify, and prioritize risks against criteria for risk acceptance
and objectives relevant to the organization. The results should guide and determine the appropriate
management action and priorities for managing information security risks and for implementing
controls selected to protect against these risks.
Risk assessment should include:
— the systematic approach of estimating the magnitude of risks (risk analysis); and
— the process of comparing the estimated risks against risk criteria to determine the significance of
the risks (risk evaluation).
Risk assessment should be performed periodically to address changes in the information security
requirements and in the risk situation, for example in the assets, threats, vulnerabilities, impacts, the
risk evaluation, and when significant changes occur. These risk assessments should be undertaken in a
methodical manner capable of producing comparable and reproducible results.
The information security risk assessment should have a clearly defined scope in order to be effective
and should include relationships with risk assessments in other areas, if appropriate.
ISO/IEC 27005 provides information security risk management guidance, including advice on risk
assessment, risk treatment, risk acceptance, risk reporting, risk monitoring and risk review. Examples
of risk assessment methodologies are included as well.
4.5.4 Treating information security risks
Before considering the treatment of a risk, the organization should define criteria for determining
whether or not risks can be accepted. Risks can be accepted if, for example, it is assessed that the risk
is low or that the cost of treatment is not cost-effective for the organization. Such decisions should be
recorded.
For each of the risks identified following the risk assessment, a risk treatment decision needs to be
made. Possible options for risk treatment include the following:
a) applying appropriate controls to reduce the risks;
b) knowingly and objectively accepting risks, providing they clearly satisfy the organization’s policy
and criteria for risk acceptance;
c) avoiding risks by not allowing actions that would cause the risks to occur;
d) sharing the associated risks to other parties, for example insurers or suppliers.
For those risks where the risk treatment decision has been to apply appropriate controls, these controls
should be selected and implemented.
4.5.5 Selecting and implementing controls
Once information security requirements have been identified (see 4.5.2), information security risks to
the identified information assets have been determined and assessed (see 4.5.3) and decisions for the
© ISO/IEC 2018 – All rights reserved 15
ISO/IEC 27000:2018(E)
treatment of information security risks have been made (see 4.5.4), then selection and implementation
of controls for risk reduction apply.
Controls should ensure that risks are reduced to an acceptable level taking the following into account:
a) requirements and constraints of national and international legislation and regulations;
b) organizational objectives;
c) operational requirements and constraints;
d) their cost of implementation and operation in relation to the risks being reduced, and remaining
proportional to the organization’s requirements and constraints;
e) their objectives to monitor, evaluate and improve the efficiency and effectiveness of information
security controls to support the organization’s aims. The selection and implementation of controls
should be documented within a statement of applicability to assist with compliance requirements;
f) the need to balance the investment in implementation and operation of controls against the loss
likely to result from information security incidents.
The controls specified in ISO/IEC 27002 are acknowledged as best practices applicable to most
organizations and readily tailored to accommodate organizations of various sizes and complexities.
Other standards in the ISMS family of standards provide guidance on the selection and application of
ISO/IEC 27002 controls for the ISMS.
Information security controls should be considered at the systems and projects requirements
specification and design stage. Failure to do so can result in additional costs and less effective
solutions, and, in the worst case, inability to achieve adequate security. Controls can be selected from
ISO/IEC 27002 or from other control sets. Alternatively, new controls can be designed to meet the
specific needs of the organization. It is necessary to recognize the possibility that some controls not
be applicable to every information system or environment, and not be practicable for all organizations.
Sometimes, implementing a chosen set of controls takes time and, during that time, the level of risk can
be higher than can be tolerated on a long-term basis. Risk criteria should cover tolerability of risks on
a short-term basis while controls are being implemented. Interested parties should be informed of the
levels of risk that are estimated or anticipated at different points in time as controls are progressively
implemented.
It should be kept in mind that no set of controls can achieve complete information security. Additional
management actions should be implemented to monitor, evaluate and improve the efficiency and
effectiveness of information security controls to support the organization’s aims.
The selection and implementation of controls should be documented within a statement of applicability
to assist with compliance requirements.
4.5.6 Monitor, maintain and improve the effectiveness of the ISMS
An organization needs to maintain and improve the ISMS through monitoring and assessing
performance against organizational policies and objectives, and reporting the results to management
for review. This ISMS review checks that the ISMS includes specified controls that are suitable to treat
risks within the ISMS scope. Furthermore, based on the records of these monitored areas, it provides
evidence of verification and traceability of corrective, preventive and improvement actions.
4.5.7 Continual improvement
The aim of continual improvement of an ISMS is to increase the probability of achieving objectives
concerning the preservation of the confidentiality, availability and integrity of information. The focus
of continual improvement is seeking opportunities for improvement and not assuming that existing
management activities are good enough or as good as they can.
16 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
Actions for improvement include the following:
a) analysing and evaluating the existing situation to identify areas for improvement;
b) establishing the objectives for improvement;
c) searching for possible solutions to achieve the objectives;
d) evaluating these solutions and making a selection;
e) implementing the selected solution;
f) measuring, verifying, analysing and evaluating results of the implementation to determine that the
objectives have been met;
g) formalizing changes.
Results are reviewed, as necessary, to determine further opportunities for improvement. In this way,
improvement is a continual activity, i.e. actions are repeated frequently. Feedback from customers and
other interested parties, audits and review of the information security management system can also be
used to identify opportunities for improvement.
4.6 ISMS critical success factors
A large number of factors are critical to the successful implementation of an ISMS to allow an
organization to meet its business objectives. Examples of critical success factors include the following:
a) information security policy, objectives, and activities aligned with objectives;
b) an approach and framework for designing, implementing, monitoring, maintaining, and improving
information security consistent with the organizational culture;
c) visible support and commitment from all levels of management, especially top management;
d) an understanding of information asset protection requirements achieved through the application
of information security risk management (see ISO/IEC 27005);
e) an effective information security awareness, training and education programme, informing all
employees and other relevant parties of their information security obligations set forth in the
information security policies, standards, etc., and motivating them to act accordingly;
f) an effective information security incident management process;
g) an effective business continuity management approach;
h) a measurement system used to evaluate performance in information security management and
feedback suggestions for improvement.
An ISMS increases the likelihood of an organization consistently achieving the critical success factors
required to protect its information assets.
4.7 Benefits of the ISMS family of standards
The benefits of implementing an ISMS primarily result from a reduction in information security risks
(i.e. reducing the probability of and/or impact caused by information security incidents). Specifically,
benefits realized for an organization to achieve sustainable success from the adoption of the ISMS
family of standards include the following:
a) a structured framework supporting the process of specifying, implementing, operating and
maintaining a comprehensive, cost-effective, value creating, integrated and aligned ISMS that
meets the organization’s needs across different operations and sites;
© ISO/IEC 2018 – All rights reserved 17
ISO/IEC 27000:2018(E)
b) assistance for management in consistently managing and operating in a responsible manner
their approach towards information security management, within the context of corporate risk
management and governance, including educating and training business and system owners on the
holistic management of information security;
c) promotion of globally accepted, good information security practices in a non-prescriptive manner,
giving organizations the latitude to adopt and improve relevant controls that suit their specific
circumstances and to maintain them in the face of internal and external changes;
d) provision of a common language and conceptual basis for information security, making it easier to
place confidence in business partners with a compliant ISMS, especially if they require certification
against ISO/IEC 27001 by an accredited certification body;
e) increase in stakeholder trust in the organization;
f) satisfying societal needs and expectations;
g) more effective economic management of information security investments.
5 ISMS family of standards
5.1 General information
The ISMS family of standards consists of inter-related standards, already published or under
development, and contains a number of significant structural components. These components are
focused on:
— standards describing ISMS requirements (ISO/IEC 27001);
— certification body requirements (ISO/IEC 27006) for those certifying conformity with
ISO/IEC 27001; and
— additional requirement framework for sector-specific implementations of the ISMS (ISO/IEC 27009).
Other documents provide guidance for various aspects of an ISMS implementation, addressing a generic
process as well as sector-specific guidance.
Relationships between the ISMS family of standards are illustrated in Figure 1.
18 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
Requirement
standards -
Clause 5.3
Guidelines standards


Clause 5.4
Vocabulary standard -
Clause 5.2
27001 27006 27009
27000
27002 27003 27004 27005 27007 TR 27008
27013 27014 TR 27016
27010 27011 27017 27018 27019
27021
2703x 2704x
Sector-speci ic
guidelines standards -
Clause 5.5
Control-speci ic guidelines standards
(out of the scope of this document) ISMS family of standards
Figure 1 — ISMS family of standards relationships
Each of the ISMS family standards is described below by its type (or role) within the ISMS family of
standards and its reference number.
5.2 Standard describing an overview and terminology: ISO/IEC 27000 (this document)
Information technology — Security techniques — Information security management systems — Overview
and vocabulary
Scope: This document provides to organizations and individuals:
a) an overview of the ISMS family of standards;
b) an introduction to information security management systems; and
c) terms and definitions used throughout the ISMS family of standards.
Purpose: This document describes the fundamentals of information security management systems,
which form the subject of the ISMS family of standards and defines related terms.
5.3 Standards specifying requirements
5.3.1 ISO/IEC 27001
Information technology — Security techniques — Information security management systems —
Requirements
Scope: This document specifies the requirements for establishing, implementing, operating, monitoring,
reviewing, maintaining and improving formalized information security management systems (ISMS)
within the context of the organization’s overall business risks. It specifies requirements for the
implementation of information security controls customized to the needs of individual organizations
or parts thereof. This document can be used by all organizations, regardless of type, size and nature.
© ISO/IEC 2018 – All rights reserved 19
ISO/IEC 27000:2018(E)
Purpose: ISO/IEC 27001 provides normative requirements for the development and operation of
an ISMS, including a set of controls for the control and mitigation of the risks associated with the
information assets which the organization seeks to protect by operating its ISMS. Organizations
operating an ISMS may have its conformity audited and certified. The control objectives and controls
from ISO/IEC 27001:2013, Annex A shall be selected as part of this ISMS process as appropriate to cover
the identified requirements. The control objectives and controls listed in ISO/IEC 27001:2013, Table A.1
are directly derived from and aligned with those listed in ISO/IEC 27002:2013, Clauses 5 to 18.
5.3.2 ISO/IEC 27006
Information technology — Security techniques — Requirements for bodies providing audit and certification
of information security management systems
Scope: This document specifies requirements and provides guidance for bodies providing audit and
ISMS certification in accordance with ISO/IEC 27001, in addition to the requirements contained within
ISO/IEC 17021. It is primarily intended to support the accreditation of certification bodies providing
ISMS certification according to ISO/IEC 27001.
The requirements contained in this document need to be demonstrated in terms of competence and
reliability by anybody providing ISMS certification, and the guidance contained in this document
provides additional interpretation of these requirements for anybody providing ISMS certification.
Purpose: ISO/IEC 27006 supplements ISO/IEC 17021 in providing the requirements by which
certification organizations are accredited, thus permitting these organizations to provide compliance
certifications consistently against the requirements set forth in ISO/IEC 27001.
5.3.3 ISO/IEC 27009
Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 —
Requirements
Scope: This document defines the requirements for the use of ISO/IEC 27001 in any specific sector
(field, application area or market sector). It explains how to include requirements additional to those
in ISO/IEC 27001, how to refine any of the ISO/IEC 27001 requirements, and how to include controls or
control sets in addition to ISO/IEC 27001:2013, Annex A.
Purpose: ISO/IEC 27009 ensures that additional or refined requirements are not in conflict with the
requirements in ISO/IEC 27001.
5.4 Standards describing general guidelines
5.4.1 ISO/IEC 27002
Information technology — Security techniques — Code of practice for information security controls
Scope: This document provides a list of commonly accepted control objectives and best practice
controls to be used as implementation guidance when selecting and implementing controls for achieving
information security.
Purpose: ISO/IEC 27002 provides guidance on the implementation of information security controls.
Specifically, Clauses 5 to 18 provide specific implementation advice and guidance on best practice in
support of the controls specified in ISO/IEC 27001:2013, A.5 to A.18.
5.4.2 ISO/IEC 27003
Information technology — Security techniques — Information security management —Guidance
Scope: This document provides explanation and guidance on ISO/IEC 27001:2013.
20 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
Purpose: ISO/IEC 27003 provides a background to the successful implementation of the ISMS in
accordance with ISO/IEC 27001.
5.4.3 ISO/IEC 27004
Information technology — Security techniques — Information security management — Monitoring,
measurement, analysis and evaluation
Scope: This document provides guidelines intended to assist organizations to evaluate the information
security performance and the effectiveness of the ISMS in order to fulfil the requirements of
ISO/IEC 27001:2013, 9.1. It addresses:
a) the monitoring and measurement of information security performance;
b) the monitoring and measurement of the effectiveness of an information security management
system (ISMS) including its processes and controls;
c) the analysing and the evaluating of the results of monitoring and measurement.
Purpose: ISO/IEC 27004 provides a framework allowing an assessment of ISMS effectiveness to be
measured and evaluated in accordance with ISO/IEC 27001.
5.4.4 ISO/IEC 27005
Information technology — Security techniques — Information security risk management
Scope: This document provides guidelines for information security risk management. The approach
described within this document supports the general concepts specified in ISO/IEC 27001.
Purpose: ISO/IEC 27005 provides guidance on implementing a process-oriented risk management
approach to assist in satisfactorily implementing and fulfilling the information security risk
management requirements of ISO/IEC 27001.
5.4.5 ISO/IEC 27007
Information technology — Security techniques — Guidelines for information security management systems
auditing
Scope: This document provides guidance on conducting ISMS audits, as well as guidance on the
competence of information security management system auditors, in addition to the guidance contained
in ISO 19011, which is applicable to management systems in general.
Purpose: ISO/IEC 27007 will provide guidance to organizations needing to conduct internal or
external audits of an ISMS or to manage an ISMS audit programme against the requirements specified
in ISO/IEC 27001.
5.4.6 ISO/IEC TR 27008
Information technology — Security techniques — Guidelines for auditors on information security controls
Scope: This document provides guidance on reviewing the implementation and operation of controls,
including technical compliance checking of information system controls, in compliance with an
organization’s established information security standards.
Purpose: This document provides a focus on reviews of information security controls, including checking
of technical compliance, against an information security implementation standard, which is established
by the organization. It does not intend to provide any specific guidance on compliance checking regarding
measurement, risk assessment or audit of an ISMS as specified in ISO/IEC 27004, ISO/IEC 27005 or
ISO/IEC 27007, respectively. This documentis not intended for management systems audits.
© ISO/IEC 2018 – All rights reserved 21
ISO/IEC 27000:2018(E)
5.4.7 ISO/IEC 27013
Information technology — Security techniques — Guidance on the integrated implementation of
ISO/IEC 27001 and ISO/IEC 20000-1
Scope: This document provides guidance on the integrated implementation of ISO/IEC 27001 and
ISO/IEC 20000-1 for organizations that are intending to either:
a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa;
b) implement both ISO/IEC 27001 and ISO/IEC 20000-1 together;
c) integrate existing management systems based on ISO/IEC 27001 and ISO/IEC 20000-1.
This document focuses exclusively on the integrated implementation of an information security
management system (ISMS) as specified in ISO/IEC 27001 and a service management system (SMS) as
specified in ISO/IEC 20000-1.
In practice, ISO/IEC 27001 and ISO/IEC 20000-1 can also be integrated with other management system
standards, such as ISO 9001 and ISO 14001.
Purpose: To provide organizations with a better understanding of the characteristics, similarities and
differences of ISO/IEC 27001 and ISO/IEC 20000-1 to assist in the planning of an integrated management
system that conforms to both International Standards.
5.4.8 ISO/IEC 27014
Information technology — Security techniques — Governance of information security
Scope: This document will provide guidance on principles and processes for the governance of
information security, by which organizations can evaluate, direct and monitor the management of
information security.
Purpose: Information security has become a key issue for organizations. Not only are there increasing
regulatory requirements but also the failure of an organization’s information security measures can
have a direct impact on an organization’s reputation. Therefore, governing bodies, as part of their
governance responsibilities, are increasingly required to have oversight of information security to
ensure the objectives of the organization are achieved.
5.4.9 ISO/IEC TR 27016
Information technology — Security techniques — Information security management — Organizational
economics
Scope: This document provides a methodology allowing organizations to better understand
economically how to more accurately value their identified information assets, value the potential
risks to those information assets, appreciate the value that information protection controls deliver to
these information assets, and determine the optimum level of resources to be applied in securing these
information assets.
Purpose: This document supplements the ISMS family of standards by overlaying an economics
perspective in the protection of an organization’s information assets in the context of the wider societal
environment in which an organization operates and providing guidance on how to apply organizational
economics of information security through the use of models and examples.
5.4.10 ISO/IEC 27021
Information technology — Security techniques — Information security management — Competence
requirements for information security management systems professionals
22 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
Scope: This document specifies the requirements of competence for ISMS professionals leading or
involved in establishing, implementing, maintaining and continually improving one or more information
security management system processes that conforms to ISO/IEC 27001:2013.
Purpose: This document is intended for use by:
a) individuals who would like to demonstrate their competence as information security management
system (ISMS) professionals, or who wish to understand and accomplish the competence required
for working in this area, as well as wishing to broaden their knowledge,
b) organizations seeking potential ISMS professional candidates to define the competence required
for positions in ISMS related roles,
c) bodies to develop certification for ISMS professionals which need a body of knowledge (BOK) for
examination sources, and
d) organizations for education and training, such as universities and vocational institutions, to align
their syllabuses and courses to the competence requirements for ISMS professionals.
5.5 Standards describing sector-specific guidelines
5.5.1 ISO/IEC 27010
Information technology — Security techniques — Information security management for inter-sector and
inter-organizational communications
Scope: This document provides guidelines in addition to guidance given in the ISO/IEC 27000
family of standards for implementing information security management within information sharing
communities.
This document provides controls and guidance specifically relating to initiating, implementing,
maintaining, and improving information security in inter-organizational and inter-sector
communications.
Purpose: This document is applicable to all forms of exchange and sharing of sensitive information,
both public and private, nationally and internationally, within the same industry or market sector or
between sectors. In particular, it can be applicable to information exchanges and sharing relating to the
provision, maintenance and protection of an organization’s or state’s critical infrastructure.
5.5.2 ISO/IEC 27011
Information technology — Security techniques — Code of practice for information security controls based
on ISO/IEC 27002 for telecommunications organizations
Scope: This document provides guidelines supporting the implementation of information security
controls in telecommunications organizations.
Purpose: ISO/IEC 27011 allows telecommunications organizations to meet baseline information
security management requirements of confidentiality, integrity, availability and any other relevant
security property.
5.5.3 ISO/IEC 27017
Information technology — Security techniques — Code of practice for information security controls based
on ISO/IEC 27002 for cloud services
Scope: ISO/IEC 27017 gives guidelines for information security controls applicable to the provision and
use of cloud services by providing:
— additional implementation guidance for relevant controls specified in ISO/IEC 27002;
© ISO/IEC 2018 – All rights reserved 23
ISO/IEC 27000:2018(E)
— additional controls with implementation guidance that specifically relate to cloud services.
Purpose: This document provides controls and implementation guidance for both cloud service
providers and cloud service customers.
5.5.4 ISO/IEC 27018
Information technology — Security techniques — Code of practice for protection of personally identifiable
information (PII) in public clouds acting as PII processors
Scope: ISO/IEC 27018 establishes commonly accepted control objectives, controls and guidelines for
implementing measures to protect personally identifiable information (PII) in accordance with the
privacy principles in ISO/IEC 29100 for the public cloud computing environment.
Purpose: This document is applicable to organizations, including public and private companies,
government entities and not-for-profit organizations, which provide information processing services
as PII processors via cloud computing under contract to other organizations. The guidelines in this
document can also be relevant to organizations acting as PII controllers. However, it is possible that PII
controllers be subject to additional PII protection legislation, regulations and obligations, not applying
to PII processors, and these are not covered in this document.
5.5.5 ISO/IEC 27019
Information technology — Security techniques — Information security controls for the energy utility
industry
Scope: This document provides guidance based on ISO/IEC 27002:2013 applied to process control
systems used by the energy utility industry for controlling and monitoring the production or generation,
transmission, storage and distribution of electric power, gas, oil and heat, and for the control of
associated supporting processes. This includes in particular the following:
— central and distributed process control, monitoring and automation technology as well as
information systems used for their operation, such as programming and parameterization devices;
— digital controllers and automation components such as control and field devices or programmable
logic controllers (PLCs), including digital sensor and actuator elements;
— all further supporting information systems used in the process control domain, e.g. for supplementary
data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting
and documentation purposes;
— communication technology used in the process control domain, e.g. networks, telemetry, telecontrol
applications and remote control technology;
— advanced metering infrastructure (AMI) components, e.g. smart meters;
— measurement devices, e.g. for emission values;
— digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor
mechanisms;
— energy management systems, e.g. of distributed energy resources (DER), electric charging
infrastructures, in private households, residential buildings or industrial customer installations;
— distributed components of smart grid environments, e.g. in energy grids, in private households,
residential buildings or industrial customer installations;
— all software, firmware and applications installed on above -mentioned systems, e.g. DMS (distribution
management system) applications or OMS (outage management system);
— any premises housing the above-mentioned equipment and systems;
24 © ISO/IEC 2018 – All rights reserved
ISO/IEC 27000:2018(E)
— remote maintenance systems for above-mentioned systems.
This document does not apply to the process control domain of nuclear facilities. This domain is covered
by IEC 62645.
This document also includes a requirement to adapt the risk assessment and treatment processes
described in ISO/IEC 27001:2013 to the energy utility industry-sector–specific guidance provided in
this document.
Purpose: In addition to the security objectives and measures that are set forth in ISO/IEC 27002, this
document provides guidelines for systems used by energy utilities and energy suppliers on information
security controls which address further, special requirements.
5.5.6 ISO 27799
Health informatics — Information security management in health using ISO/IEC 27002
Scope: This document gives guidelines for organizational information security standards and
information security management practices including the selection, implementation and management
of controls taking into consideration the organization’s information security risk environment(s).
This document provides implementation guidance for the controls described in ISO/IEC 27002
and supplements them where necessary, so that they can be effectively used for managing health
information security.
Purpose: ISO 27799 provides health organizations with an adaptation of the ISO/IEC 27002 guidelines
unique to their industry sector which are additional to the guidance provided towards fulfilling the
requirements of ISO/IEC 27001:2013, Ann


Summarize English and Arabic text online

Summarize text automatically

Summarize English and Arabic text using the statistical algorithm and sorting sentences based on its importance

Download Summary

You can download the summary result with one of any available formats such as PDF,DOCX and TXT

Permanent URL

ٌYou can share the summary link easily, we keep the summary on the website for future reference,except for private summaries.

Other Features

We are working on adding new features to make summarization more easy and accurate


Latest summaries

1. Define Relax...

1. Define Relaxed Passive Movement & Explain Its Principles Definition: Relaxed Passive Movement is ...

تعرف ادارة الإن...

تعرف ادارة الإنتاج و العمليات على أنها ادارة تهتم باتخاذ القرارات الخاصة بعمليات الإنتاج بالشكل الذي...

تعتبر المؤسسة ا...

تعتبر المؤسسة التعليمية من أهم المؤسسات التي تقوم بتنشئة الفرد وإكسابه لما يحتاجه من مكتسبات قيمية و...

- التكرار: يؤك...

- التكرار: يؤكد التكرار اتجاه العناصر وإدراك حركتها، والتكرار استثمار أكثر من شكل في بناء صبغ مجرد...

غالبًا ما تمنع ...

غالبًا ما تمنع المجتمعات من المشاركة بفعالية [13]. لذلك، يُعد توفير وصول شفاف إلى المعلومات وتعليم ك...

عُنِيت الشريعه ...

عُنِيت الشريعه الاسلاميه بتهذيب النفس الانسانيه، وضبط تصرفات الانسان؛ بما جاءت به من توجيهات وارشادا...

ISO/IEC 27000:2...

ISO/IEC 27000:2018(E) and improving an organization’s information security to achieve business objec...

الفرق بين Data ...

الفرق بين Data Warehouse و Data Lake كلاهما حلول لتخزين البيانات الضخمة، لكنهما يختلفان في الهيكل وا...

مفهوم تاريخ الف...

مفهوم تاريخ الفكر الاقتصادي:يعتبر الفكر الاقتصادي قديما قدم الفكر الانساني يتعلق أساس بمنحنى تطور ال...

الإرهاب الدولي ...

الإرهاب الدولي : إن تطوره الإرهاب الدولي في العصر الحديث أصبح يستخدم كبديل للحروب التقليدية، فالإره...

Grade) - قواعد ...

Grade) - قواعد اللغة الإنجليزية للصف الثاني الثانوي 1. Past Simple (الماضي البسيط) الاستخدامات (Uses...

معنى التصميم ال...

معنى التصميم التجريبي: هو عبارة عن مخطط وبرنامج عمل لكيفية تنفيذ التجربة. ونسعى بالتجربة لتخطيط الظر...