ISO 27001
Information Technology – Security Techniques
Information Security Management Systems - Requirements
Udugahapattuwa D.M.R.
What is ISO 27001?
▶ A Standardization by ISO (International Organization for Standardization).
▶ Provides requirements for establishing, Implementing, maintaining and continuous
improvement of an Information Security Management System.
▶ It Applies to the High-Level Structure
▶ Our focus is on the standard 27001
▶ 8. Operation
▶ 9. Performance Evaluation
8.Operation
8.1 Operational Planning and Control
▶ An organisation shall plan, implement and control the processes needed to
meet information security requirements
▶ To ensure the above were carried out efficiently the documentation of
information is necessary.
▶ Control of the planned changes and reviewing consequences of unintended
changes taking action to mitigate the adverse effects.
▶ If the any of above or any other process are outsourced. The organisation
must ensure that they are controlled and determined.
8.2 Information Security Risk Assessment
▶ The security risk assessments on the organisation should be carried out at
planned intervals.
▶ When Significant changes are proposed or occur revision of it’s security risk
assessment is required.
▶ All the information document in the assessment should be retained.
8.3 Information Security Risk Treatment
▶ In this area we focus on the implementation of the security risk treatment
plan
▶ Risk Treatment should have a plan, ISMS Risk Assessment Report and a
Statement of Applicability.
▶ Some areas of Risk Treatment Implementation
▶ Information Security Policies
▶ Access Control
Continued Risk Treatment Implementation Methods
RetainRisk
Share Risk
AvoidRisk
Dicrease the risk
9.Performance Evaluation
9.1 Monitoring, Measurement, Analysis and
Evaluation
▶ The key is to evaluate the company information security performance and the
effectiveness of ISMS (Information Security Management System)
▶ Determining what to be monitored and measured is a another key area that a
company should consider on.
▶ You will need to
▶ What needs to be monitored
▶ Agree on the methods you will use for monitoring and analysing
▶ When you will conduct the monitoring and measuring
▶ Decide who will conduct the measurement
▶ Decide when you will analyse the results of the measurement
▶ Who will be responsible for evaluating the results.
9.2 Internal Audit
▶ Conducting internal audits in derived intervals of time by the company which
will determine to
▶ Conform to own organisational requirements for information Security Management
System and to this Standard
▶ More effective implementation and Maintenance of the controls
▶ The need of comparison between the previous and current audits for more
efficient improvements.
▶ Define audit criteria and scope for each audit.
▶ Reporting Authority
9.3 Management Review
▶ Review of the Organisational Information Security Management System at
planned intervals is a highly significant task.
▶ By conducting thorough reviews to ensure continuing suitability, effectiveness
and adequacy of the ISMS
▶ Things to be Considered
▶ Status if actions taken after previous management reviews
▶ Changes occurred internally and externally in related to ISMS.
▶ Feedback on the Information Security Performance
Q & A
THANK YOU!

More Related Content

PPTX
Controlling
PPTX
Security
PPT
Chapter005
PPT
Controlling
PDF
Medgate Industrial Hygiene Suite
PDF
Whitepaper iso 27001_isms | All about ISO 27001
PPT
Chapter008
PPTX
MCGlobalTech Enterprise Risk Management Program
Controlling
Security
Chapter005
Controlling
Medgate Industrial Hygiene Suite
Whitepaper iso 27001_isms | All about ISO 27001
Chapter008
MCGlobalTech Enterprise Risk Management Program

What's hot (20)

PDF
Electronic Batch Records
PDF
It change management
DOCX
PPTX
Tips for Compliance with Safety and Environmental Regulations
PDF
ISO 27001 (v2013) Checklist
PDF
50001:2018 EnMS Manual Template Preview
PDF
Risk Management for Medical Devices - ISO 14971 Overview
PDF
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
PPTX
Security audits & compliance
PDF
An Inside Look at Changes to the New ISO 14971:2019 from a Member of the Stan...
PPTX
Data center engineering operations
DOC
Excel in facility maintenance management with simple steps
PDF
CQI-IRCA 27001:2013 Lead Auditor Course
PPTX
8D problem solving for NCR management: Beginners training
PDF
Predictive Maintenance Solution -1019
PPTX
knowledge Byte -IT change management
PPTX
Clause 10 - Continual Improvement
PPTX
MIS 22 Disaster Management
PDF
Fritz Penn Indeed Resume
Electronic Batch Records
It change management
Tips for Compliance with Safety and Environmental Regulations
ISO 27001 (v2013) Checklist
50001:2018 EnMS Manual Template Preview
Risk Management for Medical Devices - ISO 14971 Overview
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Security audits & compliance
An Inside Look at Changes to the New ISO 14971:2019 from a Member of the Stan...
Data center engineering operations
Excel in facility maintenance management with simple steps
CQI-IRCA 27001:2013 Lead Auditor Course
8D problem solving for NCR management: Beginners training
Predictive Maintenance Solution -1019
knowledge Byte -IT change management
Clause 10 - Continual Improvement
MIS 22 Disaster Management
Fritz Penn Indeed Resume
Ad

Similar to Basics to ISO 27001 by Manula Udugahapattuwa (20)

PDF
Isms awareness presentation
PPTX
Iso 27001 awareness
PPTX
Iso 27001 isms presentation
PPT
University iso 27001 bgys intro and certification lami kaya may2012
PPT
Overview of ISO 27001 ISMS
PDF
ISO 27001 is the commonly used standard for ISMS implementation and certifica
PDF
PDF
Unlocking the Benefits of ISO 27001 Certification for Information Security.pdf
PPT
4 System For Information Security
PDF
NQA Your Complete Guide to ISO 27001
PDF
NQA Your Complete Guide to ISO 27001
PPT
isms-presentation.ppt
DOC
ISO27001
PPTX
Information Security Management-Planning 1.pptx
PPTX
Information security management system
DOCX
Iso 27001 2013 Standard Requirements
PPTX
Presentaion.pptx
PDF
ISO-27001-Beginners-Guide.pdf guidline for implementation
DOCX
A Comprehensive Guide to ISO 27001 Standard for Information Security
Isms awareness presentation
Iso 27001 awareness
Iso 27001 isms presentation
University iso 27001 bgys intro and certification lami kaya may2012
Overview of ISO 27001 ISMS
ISO 27001 is the commonly used standard for ISMS implementation and certifica
Unlocking the Benefits of ISO 27001 Certification for Information Security.pdf
4 System For Information Security
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
isms-presentation.ppt
ISO27001
Information Security Management-Planning 1.pptx
Information security management system
Iso 27001 2013 Standard Requirements
Presentaion.pptx
ISO-27001-Beginners-Guide.pdf guidline for implementation
A Comprehensive Guide to ISO 27001 Standard for Information Security
Ad

Recently uploaded (20)

PPTX
Matchmaking for JVMs: How to Pick the Perfect GC Partner
PDF
AI-Powered Fuzz Testing: The Future of QA
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
R-Studio Crack Free Download 2025 Latest
PDF
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
PDF
CapCut PRO for PC Crack New Download (Fully Activated 2025)
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
PPT
3.Software Design for software engineering
PDF
Workplace Software and Skills - OpenStax
PPTX
Airline CRS | Airline CRS Systems | CRS System
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PPTX
ROI from Efficient Content & Campaign Management in the Digital Media Industry
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
Guide to Food Delivery App Development.pdf
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
Website Design & Development_ Professional Web Design Services.pdf
Matchmaking for JVMs: How to Pick the Perfect GC Partner
AI-Powered Fuzz Testing: The Future of QA
CCleaner 6.39.11548 Crack 2025 License Key
R-Studio Crack Free Download 2025 Latest
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
CapCut PRO for PC Crack New Download (Fully Activated 2025)
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Understanding the Need for Systemic Change in Open Source Through Intersectio...
3.Software Design for software engineering
Workplace Software and Skills - OpenStax
Airline CRS | Airline CRS Systems | CRS System
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
ROI from Efficient Content & Campaign Management in the Digital Media Industry
Viber For Windows 25.7.1 Crack + Serial Keygen
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Guide to Food Delivery App Development.pdf
Full-Stack Developer Courses That Actually Land You Jobs
Website Design & Development_ Professional Web Design Services.pdf

Basics to ISO 27001 by Manula Udugahapattuwa

  • 1. ISO 27001 Information Technology – Security Techniques Information Security Management Systems - Requirements Udugahapattuwa D.M.R.
  • 2. What is ISO 27001? ▶ A Standardization by ISO (International Organization for Standardization). ▶ Provides requirements for establishing, Implementing, maintaining and continuous improvement of an Information Security Management System. ▶ It Applies to the High-Level Structure ▶ Our focus is on the standard 27001 ▶ 8. Operation ▶ 9. Performance Evaluation
  • 3. 8.Operation 8.1 Operational Planning and Control ▶ An organisation shall plan, implement and control the processes needed to meet information security requirements ▶ To ensure the above were carried out efficiently the documentation of information is necessary. ▶ Control of the planned changes and reviewing consequences of unintended changes taking action to mitigate the adverse effects. ▶ If the any of above or any other process are outsourced. The organisation must ensure that they are controlled and determined.
  • 4. 8.2 Information Security Risk Assessment ▶ The security risk assessments on the organisation should be carried out at planned intervals. ▶ When Significant changes are proposed or occur revision of it’s security risk assessment is required. ▶ All the information document in the assessment should be retained.
  • 5. 8.3 Information Security Risk Treatment ▶ In this area we focus on the implementation of the security risk treatment plan ▶ Risk Treatment should have a plan, ISMS Risk Assessment Report and a Statement of Applicability. ▶ Some areas of Risk Treatment Implementation ▶ Information Security Policies ▶ Access Control
  • 6. Continued Risk Treatment Implementation Methods RetainRisk Share Risk AvoidRisk Dicrease the risk
  • 7. 9.Performance Evaluation 9.1 Monitoring, Measurement, Analysis and Evaluation ▶ The key is to evaluate the company information security performance and the effectiveness of ISMS (Information Security Management System) ▶ Determining what to be monitored and measured is a another key area that a company should consider on. ▶ You will need to ▶ What needs to be monitored ▶ Agree on the methods you will use for monitoring and analysing ▶ When you will conduct the monitoring and measuring ▶ Decide who will conduct the measurement ▶ Decide when you will analyse the results of the measurement ▶ Who will be responsible for evaluating the results.
  • 8. 9.2 Internal Audit ▶ Conducting internal audits in derived intervals of time by the company which will determine to ▶ Conform to own organisational requirements for information Security Management System and to this Standard ▶ More effective implementation and Maintenance of the controls ▶ The need of comparison between the previous and current audits for more efficient improvements. ▶ Define audit criteria and scope for each audit. ▶ Reporting Authority
  • 9. 9.3 Management Review ▶ Review of the Organisational Information Security Management System at planned intervals is a highly significant task. ▶ By conducting thorough reviews to ensure continuing suitability, effectiveness and adequacy of the ISMS ▶ Things to be Considered ▶ Status if actions taken after previous management reviews ▶ Changes occurred internally and externally in related to ISMS. ▶ Feedback on the Information Security Performance
  • 10. Q & A