Wednesday, April 27, 2016

Effective Security Awareness Program


HIPAA and PCI DSS both ask for Security Awareness Program for organizations that must comply with them. You can find it in section 12.6 (page 104) of PCI DSS v 3.1 or under Security Awareness and Training section in HIPAA Security Standards: Administrative Safeguards (Page 14). 

ISO 27001:2013 is also mentioned the Security Awareness Program (item A.7.2.2, page 11) as a control for all employees and, where relevant, contractors.

An effective Security Awareness Program trains and helps all employees to recognize IS security issues and see IS security as a beneficial concept to make a habit in order to build a more secure environment. An effective program should finally make the staff feel comfortable when they want to report a (potential) security threat which is the most important part of the program. Senior Management should have additional training to understand and support the organization security policy and its requirements. In addition to that, managers of teams or directors of departments who have privileged access need better understanding of InfoSec requirements of their staff, especially the employees who have a special access to sensitive or classified data. 

I found NIST 800-50 as a very good resource to implement such a program. NIST 800-50 describes this program in the following steps: 
  1. Select awareness and training topics
  2. Find sources of awareness and training material
  3. Implement awareness and training material, using a variety of methods
  4. Evaluate the effectiveness of the program
  5. Update and improve the focus as technology and organizational priorities change

And I would add another step as step 0 which is Assemble the Security Awareness Team. You'd better choose these personnel from different areas/departments of your organization in order to maximize their commitment and contribution. 

Although NIST 800-50 is a well-defined document in this topic, there is another material you can use as reference to develop and implement a successful Security Awareness Program: 



One of the challenges in implementing Security Awareness Programs is finding and selecting appropriate training materials. Actually, material selection process depends on your organization and the nature of the business of your organization. You can develop these materials in-house, or you can adapt them from a professional organization. You can also purchase them from a vendor. Vendors delivers their materials in different formats such as newsletters, CBT (Computer Based Training), posters, and so on. Almost all of these materials are very general materials describing different topics like How to avoid social engineering attacks or How to avoid malicious downloads. 

This is an example of the contents in a very general security awareness program:

  1. Security awareness policy of the organization
  2. A place/person to get additional information on protecting security (i.e. security officers, internal security portal, internal security mailing list, etc.)
  3. Impact of the risk of unauthorized access to the information systems
  4. How to report a (potential) security incident and who to report it
  5. How to protect against different type of attacks like social engineering attacks
  6. Secure password practices and importance of choosing a strong passwords
  7. Secure email practices as well as browsing practices
  8. Secure practices for working remotely
  9. Avoiding malicious software i.e. viruses, spyware, adware, ransom-ware, ...
  10. Secure use of social media and mobile devices
  11. Caller ID Spoofing, email phishing and web spoofing
  12. Physical security including shoulder surfing

Such a Security Awareness Program will help you to prevent or mitigate lots of risks including Data Loss (DL), Phishing, Privileged Access Hacks, Social Engineering Attacks or Ransom-ware

PCI DSS asks for communication of security awareness in new-hire processes as well (item 12.6.1. on page 104 of version 3.1). Security Awareness Training can be combined with other organizational training like confidentiality or ethics training which is mostly done by HR department. It is also a good idea to treat any role change for existing employees as a kind of new hire so anybody who wants to change his/her role within the organization would get the security training related to his new role. In order to design and develop a security training related to all roles in the company, each position should be identified based on its level of access to sensitive or classified information and other security factors. 

In order to ensure a successful implementation of a security awareness program, InfoSec experts suggest that: 
  • Make sure that you obtain senior management support. You should first attempt to obtain such a support, before implementing the program. This support is a key to guaranty that you have enough budget for the proper implementation of the program and also getting support from other departments. Do not forget that to implement an effective program, like any other projects, you need time, budget, and other resources. You should convince the management that awareness efforts provides an ROI that will save the company money in long term. 
  • Make sure that you are partnering with other departments. Without support of all departments within your organization the security awareness program would be useless. 
  • Make sure that you have some metrics in place to prove that your effort in development and implementation of the program is successful. Surveys are the easiest metrics while some other tools can be more effective such as phishing simulation tools to see how people respond to such a fake incident/attack. Examination of the number of InfoSec incidents, before and after training, could be another useful metric.

Labels: , , ,

Friday, April 1, 2016

What is Vendor Assessment Program?


Vendor assessment is mentioned in ISO 27001 under supplier relationship sector (item A.15.1 and A.15.2 in Annex A, page 19)

The goal of Vendor Assessment Program is assessing the security controls a.k.a safeguards surrounding your organization's information in other vendors' systems. These vendors may access, collect, use, process, store, transmit or destroy your information on your organization behalf or provide IT infrastructure components for your organization.  

These vendors must show and support the implementation of appropriate controls in order to safeguard three mandatory elements of all infosec systems: Confidentiality, Integrity and finally Availability. 

Vendor Assessment Program is a kind of internal program to make sure that your vendors operate in a dependable and persistent way to comply with your organization's policies and procedures on infosec and privacy. They should prove that they are consistent with the scope, type, classification, and sensitivity of your information. 

The Vendor Assessment Program may satisfies different standard, best practices or regulations's requirements such as PCI DSS, HIPAA, California Electronic Communications Privacy Act (CalECPA) and so on.  

The assessment process may have the following steps:

  • Meeting with vendors
  • Review of scope of services and location of the vendor to check compliance with local regulations
  • Identification and evaluation of the type of data which is involved 
  • Review of contracts, nondisclosure agreements and/or partnership agreements
  • Ask the vendor to fill out data-gathering questionnaire to find the level of maturity of the security management system of the vendor
  • Evaluation of data-gathering questionnaires and investigation to evaluate and assess the risk of partnership
  • Detailed review of vendors security program i.e. policies, procedures, and standard documents (if needed)
  • Monitor, review and audit the vendor (if needed)
  • Report the observations and re-assess the risk

Labels: , ,

Wednesday, March 2, 2016

Simple Risk Management in Four Steps


Risk Management is noting but Risk Assessment plus Risk Treatment. Risk Assessment exercises should be undertaken regularly (for example: quarterly) in order to check if internal controls/safeguards are still fit for purpose or not? 

The 1st question that you have yourself is Do the controls detect and prevent errors and problems in our existing operations environment? The 2nd question would be: Will controls help to reduce of impact of new risks? (Risk Mitigation). 

The key point is that you should look at the Risk Management as an-ongoing process. It means that you must review exposure to new and emerging risks continually. So risk management cycle would have these steps:

1. Risk Identification: 
Regularly consider the nature & extent of internal & external risks.

2. Risk Evaluation:
Develop a process to evaluate identified risks, consider the impact that risks may have on operations, and then assess the probability of a risk materialization.

3. Managing the Risk:
Ensure controls are sufficient to detect and/or prevent the problems and understand that internal controls reduce risks.

4. Monitoring of Controls:
Make sure that you have proper procedures to monitor the effectiveness of internal control regularly and ensure controls are up to date and are capable of mitigating new risks.

Now we can walk through all above-mentioned steps by an example: 

1. Risk Identification 

As an example you may face such risks in an organization:

a. Delays in investment
b. Incorrect payment of invoices to suppliers
c. Loss of independent compliance audit
d. IT Failure

2. Risk Evaluation

We follow a quantitative approach to evaluate risk here. In the risk evaluation step you need to rank the impact of that risk to your business and also calculate the likelihood of that event. 
Use this formula to calculate/score the risk: 

Risk (R) = Likelihood (L)* Impact (I) 

For example for the items in section 2 we may have:

Score of risk a = likelihood of a * impact of a = 6 * 7 = 42
Score of risk b = likelihood of b * impact of b = 2 * 4 = 8
Score of risk c = likelihood of c * impact of c = 3 * 7 = 21
Score of risk d = likelihood of d * impact of d = 2 * 9 = 18

We choose a number between 0 to 9 for likelihood as well as for the impact. You can adpot any range. 

3. Managing the risk

Now you have to make sure that the risks are mitigated by using proper controls (Risk Mitigation). You have to check the existing safeguards and add more if needed. 
These are the potential controls for the risk a to risk d which already mentioned in section 1:

Controls for risk a: 
  • Director of investment should monitor the time between fund receipt to investment. 
  • Investment department should monitor investment protocols for delays in investing funds.

Controls for risk b:
  • Accounting department should schedule weekly arrangements with the suppliers to check and authorize payments of invoices. 
  • Accounting department should review expenses against budget.

Control for risk c:
  • Maintain separation of company and auditor.

Controls for risk d:
  • Presence of up-to-date, certified and tested Disaster Recovery Plan.
  • Presence of up-to-date, certified and tested Business Continuity Plan.

4. Monitoring of controls

You should monitor/audit your systems and test them on a regular basis at planned intervals. For example you can choose the following timeline:
  • Test risk a: Quarterly
  • Test risk b: Semiannually
  • Test risk c: Biannually
  • Test risk d: Quarterly

Labels: , , ,

Wednesday, February 17, 2016

List of ISO 27000 Family Standards


The published ISO standards related to Information Technology - Security Techniques are:


Number Title Release Date Description
ISO 27000 Overview and vocabulary 2014 Provides terms & definitions commonly used in the ISMS family of standards
ISO 27001 ISMS Requirements 2013 Specifies an ISMS, a suite of activities concerning the management of information security risks
ISO 27002 Code of practice for IScontrols 2013 Guidelines for organizational ISMS including the selection, implementation and management of controls
ISO 27003 ISMS implementation guidance 2010 Guideline for successful design and implementation of an ISMS
ISO 27004 IS management - Measurement 2009 Security metrics for an ISMS
ISO 27005 IS risk management 2011 Provides guidelines for IS risk management
ISO 27006 Audit and certification of ISMS 2015 Specifies requirements and provides guidance for bodies providing audit to get certification
ISO 27007 Guidelines for ISMS auditing 2011 Provides guidance on managing an ISMS audit program and conducting the audits
ISO 27008 Guidelines for auditors on IS controls 2011 Provides reviewing the implementation and operation of controls
ISO 27010 IS management for inter-sector and inter-organization 2015 Provides additional guidelines for implementing ISMS within information sharing communities
ISO 27011 ISMS for telecommunications organizations 2008 Recommendations for implementation of ISMS in telecommunications organizations.
ISO 27013 Integrated implementation of ISO 27001 & ISO 20000-1 2015 Guidance on the integrated implementation of ISO 27001 and ITIL
ISO 27014 Governance of information security 2013 Provides guidance on concepts and principles for the governance of IS
ISO 27015 IS management guidelines for financial services 2012 Additional controls to ISO 27002 for organizations providing financial services
ISO 27016 IS management - Organizational economics 2014 Provides guidelines on how an organization can make decisions to protect information and understand the economic consequences of these decision
ISO 27017 IS controls for cloud services 2015 Additional implementation guidance for controls specified in ISO 27002
ISO 27018 protection of PII in public clouds 2014 Provides guidance to ensure cloud service providers offer suitable IS controls to protect the privacy of their customers’ clients.
ISO 27019 IS management for energy utility industry 2013 Additional controls to ISO 27002 for organizations in energy utility industry
ISO 27031 ICT readiness for business continuity 2011 Provides guidance on the principles behind the role of ICT in ensuring business continuity
ISO 27032 Guidelines for cybersecurity 2012 Provides guidance for improving the state of Cybersecurity
ISO 27033 Network security Different Set of standards provide detailed guidance on the security aspects of the management, operation and use of computer networks
ISO 27034 Application security Different Set of standards provide guidelines on IS to those specifying, designing and programming or procuring, implementing and using application systems
ISO 27035 IS incident management 2011 Provides guidance on IS incident management for large and medium-sized organizations
ISO 27036 IS for supplier relationships Different Set of standards provide guidelines on IS risks involved in the acquisition of goods and services from suppliers
ISO 27037 Digital evidence 2012 Guidelines for identification, collection, acquisition and preservation of digital forensic evidence
ISO 27038 Specification for digital redaction 2014 Techniques for performing digital redaction on digital documents
ISO 27039 Intrusion Detection Systems (IDPS) 2015 Selection, deployment and operations of intrusion detection systems (IDPS)
ISO 27040 Storage security 2015 Provides detailed technical guidance for organizations to design, document, and implement data storage security
ISO 27041 Assuring suitability and adequacy of incident investigative method 2015 Provides guidance on mechanisms for investigation of IS incidents
ISO 27042 Analysis and interpretation of digital evidence 2015 Provides guidance on the analysis and interpretation of digital evidence for continuity, validity, reproducibility, and repeatability
ISO 27043 Incident investigation principles and processes 2015 Provides guidelines based on idealized models for common incident investigation processes
ISO 27799 IS management in health 2008 Additional controls to ISO 27002 for organizations in helthcare industry

Labels: , ,

Wednesday, December 2, 2015

HIPAA from IT Security Viewpoint


Health Insurance Portability and Accountability Act, HIPAA, has 4 elements:
A. HIPAA Privacy Rule 
B. HIPAA Security Rule
C. HIPAA Enforcement Rule 
D. HIPAA Breach Notification Rule  


A. HIPAA Security Rule

The HIPAA Security Rule like any other security standards requires 3 type of controls: Administrative, Physical, and Technical. Actually HIPAA calls them safeguards, the same terminology that is used in PCI DSS. 

As mentioned above, the HIPAA Security Rule has its own 3 parts: 

1. Technical Safeguards
2. Physical Safeguards
3. Administrative Safeguards

All these three parts have their implementation specifications. Some of those implementation specifications are required which must be implemented. Some of them are addressableAddressable ones must be implemented only if it is reasonable and appropriate to do so. In either cases, your choice must be documented as HHS says: "for each addressable specification: (a) implement the addressable implementation specifications; (b) implement one or more alternative security measures to accomplish the same purpose; (c) not implement either an addressable implementation specification or an alternative. The covered entity’s choice must be documented."

Bear in mind that addressable implementation specifications are not optional. If you are in doubt, you should implement them. 


1. Technical Safeguards

HIPAA technical safeguards is about the technologies you use to protect PHI (or ePHI) and control the access to PHI. HIPAA Security Rule does not require you to use a specific technology, they call it Technology Neutral as you can see here

HIPAA has five different sub-sections under the technical safeguards section:
1.1. Access Control
1.2. Audit Controls
1.3. Integrity
1.4. Person or Entity Authentication
1.5. Transmission Security

You can find all of them in detail in one pdf file here

If you need just a brief explanation of the standard, you can use the following list: 

1.1.1. Access Control, Unique User Identification (required)
A unique name or number is needed to identify and/or track the users. 

1.1.2. Access Control, Emergency Access Procedure (required)
Establish procedures for obtaining necessary ePHI during an emergency.

1.1.3. Access Control, Automatic Logoff (addressable)
Implement a mechanism to terminate an electronic session after a pre-determined time of inactivity.

1.1.4. Access Control, Encryption and Decryption (addressable)
Implement a mechanism to encrypt and decrypt ePHI.

1.2.0. Audit Controls (required)
Implement mechanisms to record and examine activity in information systems that contain or use ePHI.

1.3.0. Integrity, Mechanism to Authenticate ePHI (addressable)
Implement mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner.

1.4.0. Person or Entity Authentication (required)
Implement procedures to verify that an object seeking access to ePHI is the one claimed.

1.5.1. Transmission Security, Integrity Controls (addressable)
Implement security measures to ensure that electronically transmitted ePHI is not modified until disposed of.

1.5.2. Transmission Security, Encryption (addressable)
Implement a mechanism to encrypt ePHI whenever deemed appropriate.


2. Physical Safeguards

Physical Safeguards are kind of controls to avoid, detect, counteract, or minimize security risks to physical property, computer systems, assets, and information like ePHI.  

HIPAA Physical Safeguards has 4 sections: 

2.1. Facility Access Controls
2.2. Workstation Use
2.3. Workstation Security
2.4. Device and Media Controls

Again you can summerize the safeguards into this short list: 

2.1.1. Facility Access Controls, Contingency Operations (addressable)
Establish procedures that allow facility access in support of restoration of lost data under the DRP and emergency mode operations plan in case of an emergency.

2.1.2. Facility Access Controls, Facility Security Plan (addressable)
Implement policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft.

2.1.3. Facility Access Controls, Access Control and Validation Procedures (addressable)
Implement procedures to control and validate a person’s access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision.

2.1.4. Facility Access Controls, Maintenance Records (addressable): Implement policies and procedures to document repairs and modifications to the physical components of a facility which are related to security (e.g. hardware, walls, doors, and locks).

2.2.0. Workstation Use (required)
Implement policies/procedures to specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ePHI.

2.3.0. Workstation Security (required)
Implement physical safeguards for all workstations that access ePHI, to restrict access to authorized users.

2.4.1. Device and Media Controls, Disposal (required):
 Implement policies and procedures to address the final disposition of ePHI, and/or the hardware or electronic media on which it is stored.

2.4.2. Device and Media Controls, Media Re-Use (required)
Implement procedures for removal of ePHI from electronic media before the media are made available for re-use.

2.4.3. Device and Media Controls, Accountability (addressable)
Maintain a record of the movements of hardware and electronic media and any person responsible therefore.

2.4.4. Device and Media Controls, Data Backup and Storage (addressable): 
Create a retrievable, exact copy of ePHI, when needed, before movement of equipment.


3. Administrative Safeguards

Administrative controls are the process of developing and ensuring compliance with policy and procedures which you can define them here as a set of policies and procedures to govern the conduct of the workforce, and the security measures in order to protect ePHI.

Administrative contols of HiPAA has the longest list among the others and fall into 9 categories. They are described here in a pdf file. 

3.1. Security Management Process
3.2. Assigned Security Responsibility
3.3. Workforce Security
3.4. Information Access Management
3.5. Security Awareness and Training
3.6. Security Incident Procedures
3.7. Contingency Plan
3.8. Evaluation
3.9. Business Associate Contracts and Other Arrangements

Again this is the summary of the administrative safeguards as a cheat-sheet: 

3.1.1. Security Management Process, Risk Analysis (required)
Perform and document a risk analysis to see if PHI is being used and stored in order to determine all the ways that HIPAA could be violated.

3.1.2. Security Management Process, Risk Management (required)
Implement sufficient measures to reduce these risks to an appropriate level.

3.1.3. Security Management Process, Sanction Policy (required)
Implement sanction policies for employees who fail to comply.

3.1.4. Security Management Process, Information Systems Activity Reviews (required)
Regularly review system activity, logs, audit trails, etc.

3.2.0. Assigned Security Responsibility, Officers (required)
Designate HIPAA Security and Privacy Officers.

3.3.0. Workforce Security, Employee Oversight (addressable)
Implement procedures to authorize and supervise employees who work with PHI, and for granting and removing PHI access to employees.

3.4.1. Information Access Management, Multiple Organizations (required):
Ensure that PHI is not accessed by parent or partner organizations or subcontractors that are not authorized for access.

3.4.2. Information Access Management, ePHI Access (addressable)
Implement procedures for granting access to ePHI that document access to ePHI or to services and systems that grant access to ePHI.

3.5.1. Security Awareness and Training, Security Reminders (addressable):
Periodically send updates and reminders about security and privacy policies to employees.

3.5.2. Security Awareness and Training, Protection Against Malware (addressable)
Have procedures for guarding against, detecting, and reporting malicious software.

3.5.3. Security Awareness and Training, Login Monitoring (addressable):
Institute monitoring of logins to systems and reporting of discrepancies.

3.5.4. Security Awareness and Training, Password Management (addressable):
Ensure that there are procedures for creating, changing, and protecting passwords.

3.6.0. Security Incident Procedures, Response and Reporting (required):
Identify, document, and respond to security incidents.

3.7.1. Contingency Plan, Contingency Plans (required)
Ensure that there are accessible backups of ePHI and that there are procedures for restore any lost data.

3.7.2. Contingency Plan, Contingency Plans Updates and Analysis (addressable):
Have procedures for periodic testing and revision of contingency plans. Assess the relative criticality of specific applications and data in support of other contingency plan components.

3.7.3. Contingency Plan, Emergency Mode (required)
Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of ePHI while operating in emergency mode.

3.8.0. Evaluations (required)
Perform periodic evaluations to see if any changes in your business or the law require changes to your HIPAA compliance procedures.

3.9.0. Business Associate Agreements (required)
Have special contracts with business partners who will have access to your PHI in order to ensure that they will be compliant. 

For detailed information and better understanding of HIPAA security rule, consult NIST SP 800-66An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule


B. HIPAA Privacy Rule

HIPAA Privacy Rule regulates the use and disclosure of PHI held by Covered Entities. Covered entities in HIPAA are health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions.
By law, the HIPAA Privacy Rule applies only to covered entities. However, most health care providers and health plans do not carry out all of their health care activities by themselves. They often use the services of other persons or businesses. HIPAA allows covered providers and health plans to disclose protected health information to these Business Associates if the providers or plans obtain satisfactory assurances that the business associate will use the information only for the purposes for which it was engaged by the covered entity, will safeguard the information from misuse, and will help the covered entity comply with some of the covered entity’s duties under the HIPAA Privacy Rule.
Business Associate is defined as a person or organization, other than a member of a covered entity's workforce, that performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of individually identifiable health information.


C. HIPAA Enforcement Rule

HIPAA Enforcement Rule is about money penalties for violating HIPAA rules and establishes procedures for investigations and hearings for HIPAA violations. 

Frequent violations are listed on HHS website as: 

1. Misuse and disclosures of PHI
2. No protection in place of PHI
3. Patient unable to access their health information
4. Using or disclosing more than the minimum necessary protected health information
5. No safeguards of ePHI.


D. HIPAA Breach Notification Rule

HIPAA Breach Notification Rule requires covered entities and their business associates to provide notification following a breach of unsecured PHI. This rule asks the entities to notify HHS if there is any breach of unsecured PHI, and notify the media and public as well if the data breach affects more than 500 individuals.

You can view breaches affecting 500 or more patients here

Labels: , , ,

Wednesday, October 21, 2015

How to Get ISO 27000 Certification in 6 Steps?


Getting certified for ISO 27001 certification is not necessarily complicated or expensive. It needs time, effort and support of senior manager(s). 
You also need attention to details and proper documentation and forms.


Step 0. Decision

Senior manager(s) need to be behind the decision for ISO 27000 implementation and support it in each and every step. 


Step 1. Defining Scope of Implementation

Scope of implementation should be defined as well as the operational and functional boundaries.


Step 2. Documentation

Like ISO 9000, ISO 27000 needs comprehensive documentation in order to address all applicable millstones and administrative, technical, and physical controls. 
These documents will be used to check weather or not the organization meets ISO 27000 requirements. These documents would be a policy (or set of policies), and its related procedures and guidelines to ensure the business is adhering to ISO requirements in an efficient and achievable way. ISO 27002 standard would be a huge help to prepare such documentation but in is not necessary to select the controls from ISO 27002 text. 

At least 15 different documents are required for ISO/IEC 27001:2013
  1. Scope of ISMS (item 4.3, Page 1)
  2. Policy (item 5.2, Page 2)
  3. IS Risk Assessment process (item 6.1.2, Page 3)
  4. IS Risk Treatment process (item 6.1.3, Page 4)
  5. IS Objectives (item 6.2, Page 5)
  6. Evidence of the competence of the people doing work on IS (item 7.2, Page 5)
  7. Other documents deemed necessary by the organization for ISMS (item 7.5.1b, Page 6)
  8. Operational Planning and Control Documents (item 8.1, Page 7)
  9. Results of IS Risk Assessments (item 8.2, Page 7)
  10. Results of IS Risk Treatment (item 8.3, Page 7)
  11. Documented information as evidence of the monitoring and measurement results (item 9.1, Page 7)
  12. Internal audit program plus audit results. (item 9.2, Page 8)
  13. Documented information as evidence of top management review (item 9.3, Page 8)
  14. Evidence of nonconformities identified, actions taken and the results (item 10.1, Page 9) 
  15. Other documentations might be needed: rules for acceptable use of assets, access control policy, operating procedures, confidentiality and nondisclosure agreements, secure system principles, information security policy for supplier relationships, information security incident response procedures, regulations and contractual obligations, associated compliance procedures, and information security continuity procedures.
Auditors will check that above-mentioned documentation are present, up-to-date and fit to ISMS scope. 

Step 3. Realization

By applying Gap Analysis, comparison of actual performance with desired performance and documentation, it is time to make sure that the company is following all procedures and guidelines. 
We'd better conduct a pre-assessment in order to make sure that the organization is on the right track. Pre-assessment can be conducted by using pre-assessments forms, gathering of evidences and filling checklists. Another key to have a successful realization step is to communicate with all employees about the processes in place and the need to adopt them fully and report back on all discrepancies.


Step 4. Internal Audit

An experienced internal or external auditor is needed for this step. Some audit tools like forms and checklists are needed for such a job. 


Step 5. Certification Audit

ISO does not perform certification for ISO 27001. Certification companies like SGS, TÜV Rheinland or BSI can do the audit and issue the certificate for you. 

Step 6. Maintaining the certification

In order to maintain the ISMS working, the organization should integrate it into daily operations. Continual improvement and change management are other essential parts of this ongoing step. 

Labels: , ,