Adobe Scan Oct 10, 2023
Adobe Scan Oct 10, 2023
ISMS
CH, 8:SECURITY STANDARps AND BEST PRACTICES 111
have a brief look at the chapters mentioned obove ondthe salient
Nowletus
features of some of the important claUses mentioned in the standards.
B.5.4 While the first two chapters deal with Scope and general introduction
andthe need for the same, the chapter on terrns and definitions
of1SMS
down
loys the definition of some of the most important and significant words
Usedin
the document/Usage of the words in the security scenorio and the
contexrtual meoning of such words is properly documented in this chapter.
8.5.5The chapter on records and documents defines the policy, staternent
of opplicability, steps involved in formulating arisk treatrnent plan, process
olved in implementation ondoperating the ISMS, monitoring, reviewing and
identifyingthe documentation requirements and all other measures relating
ncontrol of documentation and controlof records etc.
.5.6 The next chapter is on Management Responsibility including procedures
nr monagement's role in ISMS, utilizotion of and avoilability of resources for
properrimplementation of ISMS including factors like training,awareness and
rompetence of all humanresources and maintainproper records for allthese.
8.5.7Audit programmes, procedures for conducting regularaudits to monitor
implementation of ISMS in the organisation, maintenance of records thereof,
conformance of such audit functions to security requirements are all discussed
in this chapter. Audit criteria, scope and methods for conducting the audit
ond oll other relevant procedures reloting to audit are also addressed in this
chopter.
8.5.8 Monagement review as a result of the responsibility discussed in Chap
ter No.5 above, are dealt with in detail here. What should constitute inputs
fo review meetings of monggement and what should be outcome and the
output from review including the follow-up action or other decision taken as
output of review are alldiscussed in detoil.
8.5.9 The steps related to improvement of ISMS procedures are discussed
here. Continual improvement of the procedures and effectiveness and efficiency
of the systern through oudit programs, monitoring and review are mandatory
0s per this chapter. Commonly referred to as CAPA, this chapter mainly deals
with Corrective Action and Preventive Action.
O.10 Corrective gctions mentioned in the process include identitying the
Non Contormities with ISMS requirements, defining the couse for such non
conformi ties evaluating the need for actions to ensure that such non confor-
mities do not recur andimplementing those actions are all port for corrective
oction. Similarly, preventive action mainly involves identification of potential
non conformities and taking action to prevent such non conformities. CAPA
T SECURTOVERVIEW
112 UE
reviewedfor their effectiveness and
sho be
constontly
dsUsse ot he
manogement
Intormation Security.
eticienc
the fact thot Gnó
Goooloirishno Working Group onCyber Frauds has mode Eleleoctborat
ronice
should Bomerriti .
and
Tachnoiogy Ri_k Monagement that Commerciol banks
hos stated
obo the SMS andManagement
intomation Security Ihe committee reports :
The best known ISMS is described in ISO//EC 27001 ond ISO//EC
ond reloted stondards published jointly by ISO ond IEC. ISO 27001
inmpler e
maintain and
cemed with how to implement,
monitor,
ISO27002 continually
infomation Security Manogement System while used provides
when building andetIaSiler,
which can be
steos or olist ot security meosures
standards called
8.6.1 The ISO hos come out with its latest the 1SO/EC
27001:2013 which is being gradually adopted by"The orgonisations.
oficial introduction of these standards stotes that ISO,
information ini,
monogement system preserves the confidentiality, integrity and securty
intormation by opplying a risk monagement process and givesayvailability c
to interested parties that risks are adequotely managed. It is
tne intormation security management system is part of and
confidenca
important
tne organization's processes and overall monogement structure and integrated
with
information security is considered in the design of processes, tha
systems, and controls. It is expected that an information
security informati
managemet
svstem implementation will be scaled in accordance with the needs
on
of th
organizotion".