Implementation Guideline ISO/IEC 27001:2013
Total Page:16
File Type:pdf, Size:1020Kb
A publication of the ISACA Germany Chapter e.V. Information Security Expert Group Implementation Guideline ISO/IEC 27001:2013 A practical guideline for implementing an ISMS in accordance with the international standard ISO/IEC 27001:2013 Publisher: ISACA Germany Chapter e.V. Oberwallstr. 24 10117 Berlin, Germany www.isaca.de The content of this guideline was developed by members of the [email protected] ISACA Germany Chapter e.V. and was thoroughly researched. Due care has been exercised in the creation of this publication; however, this publication is not comprehensive. It reflects the Team of Authors: views of the ISACA Germany Chapter. ISACA Germany Chapter e.V. • Gerhard Funk (CISA, CISM), independent consultant accepts no liability for the content. • Julia Hermann (CISSP, CISM), Giesecke & Devrient GmbH • Angelika Holl (CISA, CISM), Unicredit Bank AG The latest version of the guideline can be obtained free of • Nikolay Jeliazkov (CISA, CISM), Union Investment charge at www.isaca.de. All rights, including the right to • Oliver Knörle (CISA, CISM) reproduce excerpts of the content, are held by the ISACA • Boban Krsic (CISA, CISM, CISSP, CRISC), DENIC eG Germany Chapter e.V. • Nico Müller, BridgingIT GmbH • Jan Oetting (CISA, CISSP), Consileon Business Consultancy GmbH This guideline was translated from the German original version • Jan Rozek »Implementierungsleitfaden ISO/IEC 27001:2013« published in • Andrea Rupprich (CISA, CISM), usd AG June 2016. • Dr. Tim Sattler (CISA, CISM, CRISC, CGEIT, CISSP), Jungheinrich AG • Michael Schmid (CISM), Hubert Burda Media Last updated: April 2017 (final upon review by the Information • Holger Schrader (CISM, CRISC) Security Expert Group of the ISACA Germany Chapter) Implementation Guideline ISO/IEC 27001:2013 A practical guideline for implementing an ISMS in accordance with the international standard ISO/IEC 27001:2013 3 Foreword An information security management system (ISMS) is a In 2014, the Information Security Expert Group decided to comprehensive set of policies and processes that an organi- frame and develop a guideline for implementing an ISMS in zation creates and maintains to manage risk to information accordance with ISO/IEC 27001:2013. This was first written assets. The ISMS helps to detect security control gaps and and published in German. We believe that this guide, which at best prevents security incidents or at least minimizes their has attracted a good response in German-speaking countries, impact. The implementation of an ISMS in accordance with will also be of great interest to an international audience. the international standard ISO/IEC 27001 is, however, a very This is why we are especially grateful to the expert group for complex subject which includes many activities and resources having supported a translation of their work with a lot of ef- and can take many months. Neverthless, for many organiza- fort in adjustment, review, verification and quality assurance. tions, an introduction is not only obligatory on the basis of contractual or legal requirements, but also a critical success We would be glad if this outstanding work of the expert factor in times of digital transformation and ever-increasing group facilitates the work of information security professi- cybercrime. onals worldwide and if it promotes knowledge sharing and exchange of experiences among them. The security of information and related technology is the concern of ISACA members worldwide. The goal of our members is to work to reduce the number of security inci- dents and to enable organizations to be better prepared for attacks and to react more effectively. To be successful in achieving this goal, the sharing of knowledge and experience is of primary importance. Therefore, on behalf of the Board of the ISACA Germany Chapter, we are pleased to present this work of our Information Security Expert Group to an Matthias Goeken international audience. Tim Sattler Implementation Guideline ISO/IEC 27001:2013 5 Why do we need this guideline? Information security is vital. However, as an aspect of corpo- Acknowledgment rate management, its aim must be to provide optimum sup- port for business objectives. A well-structured information ISACA Germany Chapter e.V. would like to thank the ISACA security management system (ISMS) designed in accordance Information Security Expert Group and the authors who crea- with international standards provides an ideal foundation for ted this guideline: Gerhard Funk, Julia Hermann, Angelika efficient, effective implementation of a comprehensive secu- Holl, Nikolay Jeliazkov, Oliver Knörle, Boban Krsic, Nico rity strategy, particularly in an era where cyber threats and Müller, Jan Ötting, Jan Rozek, Andrea Rupprich, Dr. Tim cyber security are prevalent issues. Sattler, Michael Schmid, and Holger Schrader. Whether the focus is placed on threats originating from the Project management: Oliver Knörle Internet, protecting intellectual property, complying with re- gulations and contractual requirements, or securing produc- Reviewers of the English version: Gerhard Funk, Julia Her- tion systems depends on the situation at hand (e.g., industry, mann, Oliver Knörle, Boban Krsic, Nico Müller, Dr. Tim business model, attitude toward risk / risk appetite, etc.) and Sattler. Special thanks to Elena Steinke who reviewed the the respective organization’s specific security objectives. Re- document from both a professional and a native speaker per- gardless of what the chosen approach is called, it is always spective. important to identify and be aware of the information secu- rity threats that exist in the respective context and to select, implement, and consistently maintain the appropriate strate- gies, processes, and security measures. The concrete implementation of an ISMS requires experi- ence; however, first and foremost, implementation must be based on the decisions and obligations of the highest level of management in regards to this issue. The basic requirements for using an ISMS to support the business objectives include a clear mandate from management, a security strategy ad- apted to the business strategy, qualified personnel, and the necessary resources. This Implementation Guideline ISO/IEC 27001:2013 (in this document referred to as Implementation Guideline) includes practical recommendations and tips for organizations that already operate an ISMS in accordance with the internatio- nal standard ISO/IEC 27001:2013, ‘Information technology — Security techniques — Information security management systems — Requirements’ or that want to set up this type of system, regardless of the certifications they hold or are attempting to acquire. The guide provides practical support and strategies for anyone responsible for setting up and/or Disclaimer operating an ISMS. It clearly outlines the benefits of an in- dividually customized ISMS that also conforms to standards The information provided in this document was compiled by (if necessary). It also places particular emphasis on practi- experts in the fields of information security, auditors, and in- cal recommendations for establishing ISMS processes and/or formation security managers, to the best of their knowledge improving existing ones, and it includes typical examples of and experience. There is no guarantee that this information how to implement various requirements. is comprehensive or free from errors. Implementation Guideline ISO/IEC 27001:2013 7 Contents 1. Introduction 9 2. Guideline Structure 11 2.1 Subject Areas ............................................................................................................. 11 2.2 Chapter Structure .................................................................................................... 12 2.3 Conventions .............................................................................................................. 12 3. Components of an ISMS in accordance with ISO/IEC 27001:2013 13 3.1 Context of the Organization ...................................................................................13 3.2 Leadership and Commitment ................................................................................ 14 3.3 IS Objectives...............................................................................................................15 3.4 IS Policy ..................................................................................................................... 16 3.5 Roles, Responsibilities and Competencies ........................................................... 17 3.6 Risk Management .................................................................................................... 19 3.7 Performance Monitoring & KPIs .......................................................................... 24 3.8 Documentation......................................................................................................... 25 3.9 Communication ....................................................................................................... 27 3.10 Competence and Awareness ................................................................................... 29 3.11 Supplier Relationships ............................................................................................. 31 3.12 Internal Audit ......................................................................................................... 33 3.13 Incident Management ............................................................................................. 37 3.14 Continuous Improvement