SlideShare una empresa de Scribd logo
1 de 11
iFour ConsultancyISMS Framework: Clause 6 - Planning
Planning- ISMS requirements
It is not enough to do your best; you must know what to do and then do your
best. – W. Edwards Deming
An organization needs to establish its strategic objectives and should identify
risks and opportunities and relate them to the scope of ISMS.
Following are the pre-requisites for planning phase which focuses on
establishing an effective and sustainable ISMS:
Management commitment to security
Security policy
Security strategy and plan
Security Measures
Web development company Indiahttp://www.ifourtechnolab.com
Planning – ISMS requirements (continued)
 ISO 27001:2013 classifies planning into:
Clause 6.1: Actions to address risks and opportunities.
 Clause 6.1.1: General
 Clause 6.1.2: Information security risk assessment
 Clause 6.1.3: Information security risk treatment
Clause 6.2: Information security objectives and planning to achieve them.
 Planning for the ISMS requirements is done keeping these factors in mind:
Size of the organization
Nature of its business
Maturity of the processes in implementing ISO
Commitment of senior management
Web development company Indiahttp://www.ifourtechnolab.com
Planning process
Clause 6.1 Actions to address risk and opportunities
Determine
internal issues
Determine
interested parties
& requirements
Determine
external issues
Methods,
criteria for risks
& opportunities
Determine risks &
opportunities
Intended outcomes,
Prevent or reduce undesired effects,
Continual improvement
Methods of prevention
and reduction of
undesired effects
Plan actions to
address risks &
opportunities
Acceptable level of risk
proportional to
potential impact
Action plan & how to
evaluate action &
integrate into processes
Implement actions
Web development company Indiahttp://www.ifourtechnolab.com
Establish an ISMS
Clause 6.1 (Continued)
Web development company Indiahttp://www.ifourtechnolab.com
Clause 6.1.2 Information security risk assessment
Risk is the probability of occurrence of an incident that causes harm to an
informational asset.
Purpose of risk assessment:
Threats to organizations (i.e., operations, assets, or individuals) or threats directed
through organizations against other organizations or the nation.
Vulnerabilities - internal and external to organizations.
Adverse impact to organizations that may occur, given the potential for threats exploiting
vulnerabilities.
The likelihood that harm will occur.
 Clause 6.1.2 focuses on:
Defining and information security risk assessment process.
Assessing the organization’s information security risks.
Web development company Indiahttp://www.ifourtechnolab.com
Clause 6.1.2 (Continued)
Defining an information security risk assessment process
 How are you going to perform risk assessment process:
The organization shall apply & define risk assessment process that:
 Establishes and maintains information security risk criteria including:
 Risk acceptance criteria
 Criteria for performing information security risk assessments
 How are you going to ensure that your repeatedly performed risk assessments
produce
Consistent
Valid
Comparable results
Web development company Indiahttp://www.ifourtechnolab.com
Identify Analyze Evaluate
Clause 6.1.2 (Continued)
RISK ASSESSMENT PROCESS
Web development company Indiahttp://www.ifourtechnolab.com
 Identify organization’s information security risks
Identify the risks associated with loss of CIA for information within the scope of ISMS.
Identify the risk owners
 Analyze organization’s information security risks
Assess the consequences that you might have to face in case the identified risks
materialize
Assess the realistic likelihood of occurrence of the identified risks
Determine the level of risks
 Evaluate organization’s information security risks
Compare the risk analysis results with risk criteria established earlier
Prioritize the analyzed risks for risk treatment
Clause 6.1.2 (Continued)
Web development company Indiahttp://www.ifourtechnolab.com
 Example of step wise risk assessment approach:
Clause 6.1.2 (Continued)
Calculate the asset value
•Cost of actual asset
•Cost to protect the asset
Identify vulnerabilities and categorize them into
•Very high, High, Medium or Low
Identify threats and categorize them into
•Very High, High, Medium or Low
Identify probability and business impact of potential threats
•Frequency of attack and Extent of loss
•Impact severity = Asset value x threat severity x vulnerability severity
Calculate risk score
•Risk Score = Impact severity x probability
•Based on risk score’s level, you need to decide the appropriate risk treatment.
Ascertain and establish controls
•Identify countermeasures and solutions to eliminate potential damage
•Do cost/benefit analysis before implementing the control
Web development company Indiahttp://www.ifourtechnolab.com
References
http://isoconsultantpune.com/iso-90012015-clause-6-planning/
http://searchsecurity.techtarget.in/tip/A-free-risk-assessment-template-for-
ISO-27001-certification
http://www.praxiom.com/iso-27001.htm
https://buildsecurityin.us-cert.gov/articles/best-practices/deployment-and-
operations/plan-do-check-act
Web development company Indiahttp://www.ifourtechnolab.com

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 

Similar a Iso 27001 2013 clause 6 - planning - by Software development company in india

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
toltonkendal
 

Similar a Iso 27001 2013 clause 6 - planning - by Software development company in india (20)

Security risk management
Security risk managementSecurity risk management
Security risk management
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
 

Más de iFour Consultancy

Más de iFour Consultancy (6)

Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 

Último

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Iso 27001 2013 clause 6 - planning - by Software development company in india

  • 1. iFour ConsultancyISMS Framework: Clause 6 - Planning
  • 2. Planning- ISMS requirements It is not enough to do your best; you must know what to do and then do your best. – W. Edwards Deming An organization needs to establish its strategic objectives and should identify risks and opportunities and relate them to the scope of ISMS. Following are the pre-requisites for planning phase which focuses on establishing an effective and sustainable ISMS: Management commitment to security Security policy Security strategy and plan Security Measures Web development company Indiahttp://www.ifourtechnolab.com
  • 3. Planning – ISMS requirements (continued)  ISO 27001:2013 classifies planning into: Clause 6.1: Actions to address risks and opportunities.  Clause 6.1.1: General  Clause 6.1.2: Information security risk assessment  Clause 6.1.3: Information security risk treatment Clause 6.2: Information security objectives and planning to achieve them.  Planning for the ISMS requirements is done keeping these factors in mind: Size of the organization Nature of its business Maturity of the processes in implementing ISO Commitment of senior management Web development company Indiahttp://www.ifourtechnolab.com
  • 4. Planning process Clause 6.1 Actions to address risk and opportunities Determine internal issues Determine interested parties & requirements Determine external issues Methods, criteria for risks & opportunities Determine risks & opportunities Intended outcomes, Prevent or reduce undesired effects, Continual improvement Methods of prevention and reduction of undesired effects Plan actions to address risks & opportunities Acceptable level of risk proportional to potential impact Action plan & how to evaluate action & integrate into processes Implement actions Web development company Indiahttp://www.ifourtechnolab.com
  • 5. Establish an ISMS Clause 6.1 (Continued) Web development company Indiahttp://www.ifourtechnolab.com
  • 6. Clause 6.1.2 Information security risk assessment Risk is the probability of occurrence of an incident that causes harm to an informational asset. Purpose of risk assessment: Threats to organizations (i.e., operations, assets, or individuals) or threats directed through organizations against other organizations or the nation. Vulnerabilities - internal and external to organizations. Adverse impact to organizations that may occur, given the potential for threats exploiting vulnerabilities. The likelihood that harm will occur.  Clause 6.1.2 focuses on: Defining and information security risk assessment process. Assessing the organization’s information security risks. Web development company Indiahttp://www.ifourtechnolab.com
  • 7. Clause 6.1.2 (Continued) Defining an information security risk assessment process  How are you going to perform risk assessment process: The organization shall apply & define risk assessment process that:  Establishes and maintains information security risk criteria including:  Risk acceptance criteria  Criteria for performing information security risk assessments  How are you going to ensure that your repeatedly performed risk assessments produce Consistent Valid Comparable results Web development company Indiahttp://www.ifourtechnolab.com
  • 8. Identify Analyze Evaluate Clause 6.1.2 (Continued) RISK ASSESSMENT PROCESS Web development company Indiahttp://www.ifourtechnolab.com
  • 9.  Identify organization’s information security risks Identify the risks associated with loss of CIA for information within the scope of ISMS. Identify the risk owners  Analyze organization’s information security risks Assess the consequences that you might have to face in case the identified risks materialize Assess the realistic likelihood of occurrence of the identified risks Determine the level of risks  Evaluate organization’s information security risks Compare the risk analysis results with risk criteria established earlier Prioritize the analyzed risks for risk treatment Clause 6.1.2 (Continued) Web development company Indiahttp://www.ifourtechnolab.com
  • 10.  Example of step wise risk assessment approach: Clause 6.1.2 (Continued) Calculate the asset value •Cost of actual asset •Cost to protect the asset Identify vulnerabilities and categorize them into •Very high, High, Medium or Low Identify threats and categorize them into •Very High, High, Medium or Low Identify probability and business impact of potential threats •Frequency of attack and Extent of loss •Impact severity = Asset value x threat severity x vulnerability severity Calculate risk score •Risk Score = Impact severity x probability •Based on risk score’s level, you need to decide the appropriate risk treatment. Ascertain and establish controls •Identify countermeasures and solutions to eliminate potential damage •Do cost/benefit analysis before implementing the control Web development company Indiahttp://www.ifourtechnolab.com

Notas del editor

  1. Web development company India – http://www.ifourtechnolab.com
  2. Web development company India – http://www.ifourtechnolab.com
  3. Web development company India – http://www.ifourtechnolab.com
  4. Web development company India – http://www.ifourtechnolab.com
  5. Web development company India – http://www.ifourtechnolab.com
  6. Web development company India – http://www.ifourtechnolab.com
  7. Web development company India – http://www.ifourtechnolab.com
  8. Web development company India – http://www.ifourtechnolab.com
  9. Web development company India – http://www.ifourtechnolab.com
  10. Web development company India – http://www.ifourtechnolab.com
  11. Web development company India – http://www.ifourtechnolab.com