NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
53,000
CERTIFICATES TRANSPARENT 100
GLOBALLY
> ISO 27001:2022
IMPLEMENTATION GUIDE
ISO 27001 is the internationally-recognised standard for Information Security Management Systems (ISMS). It
provides a robust framework to protect information that can be adapted to all types and sizes of organisation.
Organisations that have significant exposure to information-security related risks are increasingly choosing to
implement an ISMS that complies with ISO 27001.
OPERATIONAL
THE TYPES
OF RISK THAT
SENSITIVE
The types of risks
that
ANDsensitive
VALUABLE and
valuable information
INFORMATION
are subject to
AREgenerally
SUBJECT beTO
can Confidentiality Integrity Availability
CAN GENERALLY
grouped into three
categories:
BE GROUPED where one or where the content of the where access to the
more people gain information is changed information is lost or
INTO THREE
unauthorised access to so that it is no longer hampered.
CATEGORIES: information. accurate or complete.
These information security risk types form what is commonly Vulnerabilities such as open office windows, source code
referred to as the CIA triad. misconfigurations, or the location of buildings next to rivers,
increase the likelihood that the presence of a threat will result
Risks in information security typically arise from the presence in an unwanted and costly incident.
of threats and vulnerabilities to assets that process, store,
hold, protect or control access to information that can lead to In information security, risk is managed through the design,
incidents. implementation and maintenance of controls such as locked
windows, software testing, correct configurations, software
Assets in the context of ISO 27001 typically include patching or siting vulnerable equipment above ground level.
information, people, equipment, systems or infrastructure.
An ISMS that complies with ISO 27001 has an interrelated
Information is the data set(s) that an organisation wants to set of best practice processes that support the design,
protect such as employee records, customer records, financial implementation and maintenance of controls, specific to that
records, design data, test data etc. business.
Incidents are unwanted events that result in a loss of The processes that form part of an ISMS are usually a
confidentiality (e.g. a data breach,) integrity (e.g. corruption combination of existing core business processes (e.g.
of data,) or availability (e.g. system failure). recruitment, induction, training, purchasing, product design,
equipment maintenance, service delivery,) and those specific
Threats are what cause incidents to occur and may be
to maintaining and improving information security (e.g. change
malicious (e.g. a cyber-attack,) accidental (e.g. accidental
management, configuration management, access control,
sharing of information to the wrong party,) or a force majeure
incident management, threat intelligence).
(e.g. a flood).
In brief:
ESTABLISH
INTERESTED ISMS INTERESTED
PARTIES PARTIES
Plan Do
MAINTAIN IMPLEMENT
AND IMPROVE AND OPERATE
THE ISMS THE ISMS
INFORMATION
SECURITY Act Check MANAGED
REQUIREMENTS INFORMATION
AND MONITOR SECURITY
EXPECTATIONS AND REVIEW
THE ISMS
Plan-Do-Check-Act is an example of a closed-loop system. This ensures the learning from the ‘do’ and ‘check’ stages are
used to inform the ‘act’ and subsequent ‘plan’ stages. In theory this is cyclical, however it’s more of an upward spiral as the
learning moves you on each time you go through the process.
First Party Audits To treat the risk, organisations may select and implement
applicable controls from Annex A, as well as implement any
– Internal Audits other controls outside of this to manage their risks to an
acceptable level. As a result, a Statement of Applicability must
Internal audits are a great opportunity for learning within your be produced and each control from the Annex A must be
organisation. They provide time to focus on a particular process justified whether implemented or not. Risk management is core
or department to truly assess its performance. The purpose of to an ISMS and just as important after asset identification and
an internal audit is to ensure adherence to policies, procedures valuation.
and processes as determined by you, the organisation, and to
confirm compliance with the requirements of ISO 27001.
Second Party
Audit Planning – External Audits
Devising an audit schedule can sound like a complicated Second party audits are usually carried out by customers or
exercise. Depending on the scale and complexity of your by others on their behalf, or you may carry them out with your
operations, you may schedule internal audits anywhere from external providers. Second party audits can also be carried
every month to once a year. There’s more detail on this in out by regulators or any other external party that has a formal
Section 9 – Performance Evaluation. interest in an organisation.
You may have little control over the timing and frequency of
Risk-based Thinking these audits, however establishing your own ISMS will ensure
you are well prepared when they do happen.
The best way to consider frequency of audits is to look at the
risks involved in the process or business that’s being audited.
Any process that is high risk, either because it has a high Third Party
potential to go wrong or because the consequences would be
severe if it did go wrong, should be audited more frequently
– Certification Audits
than a low risk process. Third party audits are carried out by UKAS-accredited external
certification bodies such as NQA.
How you assess risk is entirely up to you. ISO 27001 doesn’t
dictate any particular method of risk assessment or risk The certification body will assess conformance to the
management. ISO 27001:2022 standard, where a representative visits
the organisation and assesses the relevant system and its
Organisations must implement a risk assessment methodology processes. Maintaining certification also involves periodic
and treatment plan with appropriate risk acceptance criteria reassessments.
and the criteria required to conduct a risk assessment in the
first place. This process must be fully integrated into their Certification demonstrates to customers that you have a
management system. Risks must be prioritised for treatment commitment to quality, safety and the increasing threats to
and treated appropriately. businesses in this digital world.
CERTIFICATION ASSURES:
• Regular assessment to •C
redibility that the system • Reduced risk and •C
onsistency in the
continually monitor and can achieve its intended uncertainty and increase outputs designed to meet
improve processes. outcomes. market opportunities. stakeholder expectations.
£
£
VULNERABILITIES
In ISO 27001, in addition to Clauses 4.0 - 10.0, THREATS INFORMATION RISKS
CONFIDENTIALITY
there is a further set of requirements detailed in
a section called Annex A, which is referenced INTEGRITY
in Clause 6.0.
AVAILABILITY
Annex A contains 93 information security
CONTROL
controls. Each of these 93 controls need to ACCESS
be considered. To be compliant with ISO
27001, the organisation must implement these ASSETS
controls, or an acceptable justification must be
CONTROLS
given for not implementing a particular control.
SECTION 1:
SCOPE
The Scope section of ISO 27001 sets out:
• The purpose of the standard.
Risk Treatment
Processes or actions that reduce identified risks to an
acceptable level.
Top Management
The group of individuals who are the most senior decision
makers in an organisation. They are likely to be accountable
for setting its strategic direction, and for determining and
achieving stakeholder objectives.
• Maturity: Are you an agile start-up with a blank canvas to • Competition: Do you operate in a rapidly changing and
work on, or a 30+ year old institution with well-established innovative market, requiring many system upgrades to
processes and security controls? stay competitive, or in a mature, stable market with little
• Organisation culture: Is your organisation relaxed innovation year-to-year?
about how, when and where people work, or extremely • Landlord: Do you need approval to upgrade physical
regimented? Might the culture resist the implementation of security?
Information Security controls? • Regulators/enforcement bodies: Is there a requirement in
• Management: Are there clear communication channels your sector to make regular statutory changes, or is there
and processes from the organisation’s key decision makers little oversight from regulators in your market sector?
through to the rest of the organisation? • Economic/political: Do currency fluctuations impact your
• Resource size: Are you working with an Information Security organisation? How do geopolitical situations impact your
Team, or is one person doing it all? organisation?
• Resource maturity: Are the available resources (employees/ • Environmental considerations: Is your site on a flood plain
contractors) knowledgeable, fully trained, dependable and with the server(s) located in a basement? Are there factors
consistent, or are personnel inexperienced and constantly making your site(s) a possible target for a break-in or a
changing? terrorist attack (e.g. in a prominent city centre location or
• Information asset formats: Are your information assets next to a possible target)?
mainly stored in hard-copy (paper) format, or are they stored • Prevalence of information security attacks: Does your
electronically on a server on-site, or in remote cloud-based organisation operate in a sector that regularly attracts
systems? interest from hackers (criminals, hacktivists)?
• Information asset sensitivity/value: Does your organisation • Shareholders: Are they very concerned about the
have to manage highly valuable or particularly sensitive vulnerability of the organisation to data breaches? How
information assets? concerned are they about the cost of the organisation’s
efforts to improve its information security?
Scope of the
Management System
To comply with ISO 27001, you must document the scope of
your ISMS. Documented scopes typically describe:
DO
PLANNING CHECK
ISO 27001 is fundamentally a risk management tool that steers an organisation to identify the drivers of its
information security risks. As such, the purpose of an ISMS is to:
• Identify the strategically important, blatantly obvious, and hidden but dangerous risks.
• Ensure that an organisation’s day-to-day activities and operating processes are designed, directed
and resourced to inherently manage those risks.
• Automatically respond and adapt to changes to cope with new risks and continually reduce the
organisation’s risk exposure.
Having a detailed action plan that is aligned monitored and supported by regular reviews is crucial, and provides
the best evidence to the auditor of clearly defined system planning.
The standard has the controls required to meet those risk requirements at Annex A. In total there are 93 controls
sub-divided into four different control groups. When considering these controls, it is important to note that they
are simply possibilities or options.
When conducting the risk process, the risk identified should have appropriate controls that have been selected
from the list in Annex A. Not every control can be implemented. For example, if your organisation does not
have premises and operates remotely, using some controls from the physical security domain would not be
appropriate.
Similarly, the move to cloud-based solutions requires a fresh look at existing controls within the Operations and
Communications Security domains.
Categories of Controls
Finally
Annex A controls are just some of the options available to an organisation. Additional security controls not
specifically outlined in Annex A can be used to provide treatment to an identified risk. So long as the clauses
and controls within the standard are addressed as appropriate, the ISMS will be functioning and provide good
levels of information security.
Awareness
To implement and maintain an
In addition to ensuring specific competence of key personnel
effective ISMS you need to have in relation to information security, the wider group of
supporting resources in place. These employees, suppliers and contractors will need to be aware of
the basic elements of your ISMS. This is central to establishing
resources will need to be: a supportive culture within the organisation.
• Capable – If they are equipment or All staff, suppliers and contractors should be aware of the
infrastructure. following:
• Competent – If they are people.
• That you have an ISMS and why you have one.
• Included in management review • That you have an Information Security Policy and which
meetings. particular elements of the policy are relevant to them.
• How they can contribute to protecting valuable information
and what they need to do to help the organisation achieve its
objectives.
Competence • Which policies, procedures and controls are relevant to them
and what the consequences are of not complying with them.
The implementation of effective information security controls
relies heavily on the knowledge and skills of your employees, TIP: The communication of this information can normally be
suppliers and contractors. To be certain of an appropriate done through existing processes and documents such as
knowledge and skills base you need to: inductions, employment contracts, toolbox talks, supplier
agreements, employee briefings or updates.
• Define what knowledge and skills are required.
• Determine who needs to have the knowledge and skills.
• Set out how you can assess or verify that the right people
Communication
have the right knowledge and skills. To enable the processes in your ISMS to work effectively you
will need to ensure you have communication activities that are
Your auditor will expect you to have documents detailing
well planned and managed. ISO 27001 details these concisely
your knowledge and skills requirements. Where you believe
by requiring you to determine:
the requirements are satisfied, this will need to be supported
with records such as training certificates, course attendance • What needs to be communicated.
records or internal competency assessments. • When it needs to be communicated.
• Who needs be included in communications.
TIP: Most organisations that already use tools such as training/
• What the processes is for communication.
skills matrices, appraisals or supplier assessments can satisfy
the requirement for competence records by expanding the TIP: If your communication requirements are well defined in
areas covered to include information security. your processes, policies and procedures, then you do not
need to do any more to satisfy this requirement. If they aren’t
sufficient, then you should consider documenting your key
communication activities in the form of a table or procedure
that includes the headings detailed above.
DO
OPERATION CHECK
So, after all the planning and risk assessment, we’re ready to move on to the “do” stage.
Clause 8 is all about having appropriate control over the creation and delivery of your
product or service.
PERFORMANCE ACT DO
EVALUATION
CHECK
Internal Audits
There are three main ways in which the The purpose of internal audits is to test your ISMS processes
performance of an ISMS is evaluated. for weaknesses and identify opportunities for improvement.
These are: They are also an opportunity to provide a reality check to
Top Management on how strongly the ISMS is performing.
• Monitoring the effectiveness of the
When done well, internal audits can ensure that there are no
ISMS controls.
surprises at your external audits.
• Through internal audits.
• Management Review meetings. The internal audits you perform should check:
DO
IMPROVEMENT CHECK
The key aim of implementing an ISMS should be to reduce the likelihood of information
security events occurring and their impact. No ISMS is likely to be perfect. However, a
successful ISMS will improve over time and increase the organisation’s resilience to
information security attacks.
Nonconformity and
Corrective Action Root cause analysis
One of the main drivers of improvement is to learn from To identify effective corrective action, it is strongly
security incidents, issues identified in audits, performance advisable to complete a root cause analysis of the
issues identified from monitoring, complaints from interested issue that occurred. If you don’t get to the bottom of
parties and ideas generated at management reviews. why or how it happened, then it is likely that whatever
fix you implement will not be fully effective. A simple
For each learning opportunity identified you must maintain a approach such as “Five Whys” is a good root cause
record of: analysis tool: start with the issue, then ask “Why”
enough times to reach the root cause. Usually five
• What occurred. times of asking is enough, but for more complex
• If the event had undesirable consequences, what action was problems you may need to dig deeper.
taken to contain and mitigate those.
• The root cause of the event (if determined). For example:
• The action taken to eliminate the root cause (if needed).
• An assessment of the effectiveness of any action taken. Problem statement:
• A trend analysis of similar findings can help your business, The organisation was infected by the Wannacry
but is not a requirement. virus.
Why?
Someone clicked on an email link, it downloaded
the virus and infected their PC.
Why?
They had not received any training in clicking on
links in emails that they are not expecting to receive.
Why?
The training manager is on maternity leave and the
organisation has not implemented cover for them.
Why?
The maternity leave process is not covered in the
Change Management Procedure and so a risk
assessment was not completed to identify any
information security risks.
TIP: You may not have sufficient resources to
undertake root cause analysis for every event. To
prioritise your efforts, you should consider first
completing a simple risk assessment of an event and
then undertake root cause analysis only for those that
are medium or high risk.
1.
Start with “Why?” Make sure the reasons 6.
Keep your processes and supporting
for implementing an ISMS are clear and documentation simple. It can develop
aligned with your strategic direction, to become more extensive over time if
otherwise you risk not getting the critical needed.
buy-in from Top Management.
7.
Design and implement rules you
2.
Consider “What for?” Implementing and can follow in practice. Don’t make
maintaining an ISMS requires significant the mistake of documenting an over-
commitment, so make sure your scope elaborate rule that no-one can follow. It
is broad enough to cover the critical is better to accept a risk and to continue
information that needs protecting, but to look for ways to manage it.
is not so broad that you do not have
sufficient resources to implement and 8.
Remember your suppliers. Some
maintain it. suppliers will help you enhance your
ISMS, some will increase your risk. You
3.
Get all your key stakeholders involved at need to ensure any high-risk suppliers
the appropriate times. Top Management have controls in place that are at least
for context, requirements, policy and as good as yours. If they don’t then look
objectives setting; managers and for alternatives.
employees with valuable knowledge for
risk assessments, process design and 9.
Train, train and train again. Information
procedure writing. security is likely to be a new concept for
most of your employees. People may
4.
Communicate extensively throughout need to change habits ingrained over
the process to all your stakeholders. many years. A single awareness briefing
Let them know what you are doing, is unlikely to be sufficient.
why you’re doing it, how you plan to
do it and what their involvement will be. 10. Remember to allocate sufficient
Provide regular progress updates. resources to routinely test your controls.
The threats your organisation faces will
5.
Get external help. Do not fail for constantly change and you need to
lack of in-house technical skills or test whether you are able to respond to
knowledge. Management of information those threats.
security risks often requires specialist
knowledge. However, be sure to check
the credentials of a third party before
engaging them.
NQA ISO 27001 ISMS (Information Security) E-Learning Introduction Training 1 0.5 Days
CQI and IRCA ISO 27001 ISMS (Information Security) 2+3 5 Days
Lead Auditor Training (A2246)
NC 8 8
E 19 0015