Shirminaz E021684 Unit 32 Information Security Management 22 Update
Shirminaz E021684 Unit 32 Information Security Management 22 Update
Assessor Feedback:
LO2. Critically assesses how an organization can implement and maintain an Informati
Management System (ISMS).
Pass, Merit & Distinction Descripts P2 M2 D1
* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.
Assessor Feedback:
Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
Important Points:
1. It is strictly prohibited to use textboxes to add texts to the assignments, except for the compulsory
information. eg: Figures, tables of comparison, etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in the rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand-in date and the instructions given in the assignment. Late submissions will
not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may
apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be
asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using the
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citations and a
reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced
to A REFERRAL, or at worst you could be expelled from the course.
12. Use word processing applications spell check and grammar check functions to help edit your
assignment.
13. Use the footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
Programme:
Unit: Unit 32
Unit 32 – Planning an ISMS, Security policy and DRP for Sigma Health
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break
the rules, however innocently, may be penalized. It is your responsibility to ensure that you understand
correct referencing practices. As a university-level student, you are expected to use appropriate
references throughout and keep carefully detailed notes of all your sources of materials for material you
have used in your work, including any material downloaded from the Internet. Please consult the relevant
unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declaration is a form of malpractice.
Academic Year
Unit Tutor
Assignment Title Planning an ISMS, Security policy and DRP for Sigma Health
Issue Date
Submission Date
Submission Format
The submission should be in the form of an
A briefing paper
individual report written in a concise, formal style using single spacing (refer to the assignment
guidelines for more details).
You are required to make use of headings, paragraphs, and subsections as appropriate, and all work
must be supported with research and referenced using Harvard referencing system. Please provide
in-text citation and a list of references using Harvard referencing system
A formal 15-minute presentation (10–20 slides as a guide with supporting speaker notes) to
communicate an evaluation of your investigation to a non-technical audience, highlighting key
information regarding the range of IT security risks that organizations face and the IT security
solutions for them. The presentation will also include an assessment of the current organizational
security procedures and an evaluation of both the physical and virtual security countermeasures
presented.
Formal report to the school management which process review to assess the existing risk assessment
procedures in an organization and review and summarize standard risk management approaches that
could be applied. The review will show how implementing IT security should work in conjunction with
an organization’s policy. The ISMS and the policy should include all stakeholders so that an audit trail
can be identified. The report will evaluate the suitability of the ISMS and the security tools selected to
meet the needs of the business. The recommended word limit is 4,000–4,500 words, although you
will not be penalized for exceeding the total word limit. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system.
Please note that the Presentation slide, speaker notes and the briefing paper should be
attached to the final individual report.
LO2. Critically assess how an organisation can implement and maintain an Information Security
Management System (ISMS)
CASE STUDY
Connect Sri Lanka is a security solutions company based in Colombo. The organization provides network
security solutions for a range of clients from multiple industry sectors worldwide. The services offered
by Connect include the following. You have been employed as a Junior Network Security Specialist for
Connect Limited. Based on the job description your main duties are
● Providing a security audit and risk assessment of an organization’s network in the context of its
business requirements
● Plans and designs Information Security Management Systems (ISMS) for organizations.
CONNECT usually has large, multinational corporations as their clients, but the CEO has received an
unusual request from a new client and has decided that this would be an ideal project for you to handle
by yourself to test your skills and knowledge. The client is Sigma Health group of companies, the
Colombo based health service provider, consisting of three Hospitals (SFC). The Sigma group has a Chief
Information Officer and manages a budget of LKR116.4 million. One of the institutes that is part of this
chain is Sigma institute of Health, with 1500 students that specialize in Health science, Paramedics and
Psychology. Sigma Institute of Health has 65 members of staff, both teaching and non-teaching, and
has an operating budget of LKR LKR15.3 million.
All staff data, both personal and for payroll, are kept on dedicated Human Resource (HR) servers in the
Network Server Room. All student data is kept on the college Student Information System (SIS), which
contains data such as:
● Attendance data – Present/Not Present/Authorized Absent for all lessons while at college
All campus files are on a shared public access fileserver. This contains all educational resources created
by teachers and areas for students to upload coursework assignments and homework. An Acceptable
Use Policy was created for students (see Appendix 1). Staff were not considered a security threat, so no
staff policies were created. Similarly, the campus had a simple software firewall, however this was
configured just to block attempts at network intrusion from known malicious black site IP addresses.
Students logging in to any computer on the college network had Read Access to the fileserver; teachers
had Read/Write access. The campus maintained their own email exchange server, holding all staff and
student emails and historical emails from all previous years. The email server, fileserver, backup NAS
drive and Network Domain Server were in a non-secured room in the IT Technicians’ office. This room
was never locked in case staff or students needed IT support. The college had a Virtual Learning
Platform (VLP), that provided a web interface to the fileserver and provided a way for students to
access course materials. The campus computers ran older versions of Windows 7, as it was determined
to be too expensive to migrate to the current version of the software. To save money, a freeware VPN
had been set up to allow teachers to access college materials from home using college laptops installed
with a VPN client software. It was still possible for staff members to access the fileserver directly using
Remote Desktop. Because the college was deemed to be at a low risk, most of the security
countermeasures had been designed to minimize a threat from malicious damage from students:
● All IT labs were locked and could not be opened without a swipe card
● Virus scanners had been configured to automatically scan any USB drive plugged into a device
● All optical drives had been removed from each college computer.
The CEO considered the campus to be a low-priority threat, data backups involved a single 8TB Network
Attached Storage (NAS) Drive, where data was backed up each week. Security procedures were not
strictly followed as it was thought there was no requirement because the college was a ‘soft target’. The
ISMS implemented lacked a clear framework and failed to continuously measure effectively if the
security controls performed as expected. Just prior to the pandemic in March 2020, Sigma Institute
suffered a massive security breach. A ransomware virus was downloaded and deployed onto all the
institute servers, resulting in a complete and total loss of:
● All coursework and teaching resource data on the public fileserver and VLP
● All financial data on the HR servers, meaning college staff and contractors could not be paid
The campus did not have the finances to pay the ransom and so a completely new IT system was
purchased. All data was lost. As part of a review after the incident, it was determined that a teacher
working from home at the weekend, in trying to find extra teaching materials, inadvertently
downloaded a virus containing a malicious payload onto their staff laptop from a compromised website.
The teacher was not using the VPN. The ransomware was activated only when the laptop was
connected to the campus network on the following Monday. The ransomware virus then deployed and
copied itself onto all network devices from the target location, encrypting all data on all servers,
resulting in a total, catastrophic loss of all data. In the aftermath of the incident, the client wants you to
review the risk assessment procedures that were in place and provide a new risk assessment procedure
that is ISO compliant.
They also want you to clearly demonstrate how any new security will still allow Sigma campus to carry
out its normal operations, with a greater emphasis on lessons being delivered remotely.
To make sure that something like this does not happen again, the client also wants you to design a
suitable security policy, identifying key stakeholders, justifying your plan and the IT tools selected. The
new plan needs to cover a wide range of potential IT threats. You have been given the current IT Use
Policy from Sigma campus and their current Risk Assessment plan.
As part of your work for CONNECT, your CEO wants you to put together a presentation on IT security
threats and countermeasures and the risk assessment. You will present this to the CEO and four senior
Security Specialists, so that you can demonstrate you have the breadth of knowledge required to begin
to work with larger clients on your own.
ACTIVITY – 01
As junior security analyst your job is to perform an examination of the key principles of an ISMS and its
relevance to the successful operation in Sigma Institute of Health covering the following in a 15 minute
presentation.
● Conduct an assessment and critical analysis of the elements and processes required for Sigma
institute of health to establish and maintain a more robust ISMS, ensuring that the key ISMS principles
are met
● Conduct a risk assessment and analysis of the benefits that an effective ISMS can have on Sigma
Institute and perform a risk matrix and the prioritization table.
● A justification of the steps required for Sigma institute of health to implement an ISMS. You should
support any points you make in the 15-minute presentation with well-chosen examples from any
research you have carried out on related sectors or ISMS scenarios.
ACTIVITY - 02
Produce a process review document that assesses the current mechanisms and legislation for data
security within an organization. Your review should include the following.
● A review of the current risk assessment procedures in Sigma Institute. (Appendix 2 – Unit 5 – Risk
Assessment)
● A summary of an appropriate risk-management strategy or applied ISO standard and its application to
IT security at Sigma Institute
● Justification, with reasons, for the designed security plan, including the selected physical, importance
of the virtual and policy elements
● An analysis of the possible impact on security at Sigma Institute of Health, following the results of an
IT security audit
ACTIVITY – 03
Present a written report to appraise an ISMS for Sigma Institute and design a suitable security policy,
based on the supplied evidence and operational requirements. Your report should include the
following.
● A plan of the design of an ISMS for Sigma Institute, including an implementation map, taking into
consideration functional and non-functional requirements of the digital systems
● A suitable security policy, including the main components of a disaster recovery plan for the college
● Identification and discussion of the stakeholders and their roles in implementing a security audit
● Justification, with reasons, for the designed security plan, including the selected physical, virtual and
policy elements
ACTIVITY – 04
You should support any points you make in the report with well-chosen examples from any research
you have carried out on related sectors or projects, as well as the existing scenario and any associated
documentation.
● An appraisal of and justification for the planned ISMS design, against the new IT security landscape in
Sigma institute of health, auditing the different stages of the process followed
● An analysis of the relationship between ISO and international ISMS standards and the establishment
of an effective ISMS for Sigma Institute
● An evaluation of the suitability of the tools used in the security policy designed for Sigma Institute in
terms of how it meets their needs
● A critical examination of the advantages and disadvantages of the planned ISMS for the college,
against key and international standards.
APPENDIX1
SIGMA INSTITUTE STUDENTS ACCEPTABLE USE POLICY
This document provides the basis for determining the acceptability of the use of Sigma Institute IT facilities. It
defines unacceptable usage, to which users are expected to always adhere. Using the systems appropriately also
helps the equipment to be used efficiently and to be available when needed. Use of the Sigma Institute
computing resources and facilities is subject to Sri Lankan law such as computer crimes act, and personal data
protection act and illegal use will be dealt with appropriately. (for more information go to https://cert.gov.lk/)
for more information.
Acceptable Use
Sigma Institute provides each student with access to the college network, access to the internet, use of a desktop
terminal and an email account. This use is permitted and encouraged by the college where such use is suitable
for academic and teaching purposes and supports the college’s goals and objectives. The internet is to be used in
a manner consistent with the college’s standards of conduct and as part of any study-related activities. Use of
the network, internet/intranet, and email, including data sent on it, may be subject to monitoring for security
and/or network management reasons. Users may also be subject to limitations on their use of such resources.
Unacceptable Use
The Sigma Institute network may not be used for any of the following.
1) The creation, viewing or transmission of any offensive, obscene, or indecent images, data or other material, or
any data capable of being resolved into obscene or indecent images or material
2) The creation, viewing or transmission of material which is designed or likely to cause annoyance,
inconvenience, or needless anxiety
3) The creation, viewing or transmission of offensive materials (for example adult materials, images, or
pornography)
4) The transmission of material such that this infringes the copyright of another person without giving credibility
to the author
6) Deliberate unauthorized access to facilities or services accessible via the Sigma Institute network
7) To examine, change, or use another person's files, output, or username or password for which they do not
have explicit authorization
8) Deliberate activities with any of the following characteristics.
Wasting staff effort or networked resources, including time on end systems accessible via the Sigma Institute
network and the effort of staff involved in the support of those systems.
Corrupting or destroying other users' data.
Violating the privacy of other users
Disrupting the work of other users
Using the Sigma Institute network in a way that denies service to other users (for example deliberate or
reckless overloading of access links or of switching equipment. This includes the unwarranted use of internet
audio and video)
Use of a VPN or proxy service to disguise or forge identity or usage while using the college network to
browse the internet.
Using college network facilities for the playing, downloading, installing or distribution of games, web-games,
or materials, software or media which is copyrighted by a third party.
Attaching items of equipment or peripherals that do not belong to the college to any college computers,
networks, or systems without explicit authorization from the IT Services team.
Where the Sigma Institute network is being used to access another network, any abuse of the acceptable use policy
of that network will be regarded as unacceptable use of the Sigma Institute network. Compliance It is the
responsibility of all users to take all reasonable steps to ensure compliance with the conditions set out in this policy
document and to ensure that unacceptable use of the Sigma Institute network does not occur.
Where necessary, service may be withdrawn from a user. This may take one of two forms:
1) An immediate, temporary withdrawal of service should a violation of any of these conditions occur after
appropriate warnings have been given
2) An immediate suspension of service should a serious violation of the policy occur or a violation that causes
disruption to computer services.
The use of Sigma Institute facilities is subject to Sri Lankan Personal Data Protection act and computer crimes act
Privacy legislation and any illegal use will be dealt with appropriately. All service withdrawals would be made on the
judgement of the Chief information Officer of Sigma Group, and the Principal, Head of School, Class Teachers, and
Parents / Guardian would then be immediately informed.
The use of Sigma Institute facilities is subject to Sri Lankan law and Act and any illegal use will be dealt with
appropriately.
APPENDIX 2
Asset Threat Probability Impact Risk Rating Priority
Computer Lab PCs Virus Very Likely Minor Medium 1
Computer Lab PCs Deletion of Data Likely Minor Low 1
Computer Lab PCs Breach of Copyright Very Likely Moderate High 2
Computer Lab PCs Transmission of Likely Moderate Medium 2
Unauthorized Material
Recommended resources
Please note that the resources listed are examples for you to use as a starting point in your research – the
list is not definitive.
Weblinks:
https://advisera.com/ (n.d.) What is ISO 27001? Quick and easy explanation [online] Available at:
https://advisera.com/27001academy/what-is-iso-27001/ [Accessed 1 August 2022]
https://csrc.nist.gov/ (n.d.) COMPUTER SECURITY RESOURCE CENTER - countermeasures [online] Available
at: https://csrc.nist.gov/glossary/term/countermeasures [Accessed 1 August 2022]
https://onlinedegrees.und.edu/ (2022) 7 Types of Cyber Security Threats [online] Available at:
https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/ [Accessed 1 August 2022]
https://us.norton.com/ (2021) What is a firewall? Firewalls explained and why you need one [online]
Available at: https://us.norton.com/internetsecurity-emerging-threats-what-is firewall.html [Accessed 1
August 2022]
https://www.bmc.com/ (2019) Introduction to Information Security Management Systems (ISMS) [online]
Available at: https://www.bmc.com/blogs/introduction-to-information-security management-systems-
isms/ - :~:text=An%20information%20security%20management%20system,more%20focused%20on
%20your%20industry [Accessed 1 August 2022]
https://www.exabeam.com/ (2022) 21 Top Cybersecurity Threats and How Threat Intelligence Can Help
[online] Available at: https://www.exabeam.com/information-security/cyber security-threat/ [Accessed 1
August 2022]
https://www.isms.online/ (n.d.) Information Security Management System SaaS For ISO 27001 [online]
Available at: https://www.isms.online/information-security-management-system isms/ [Accessed 1 August
2022
https://www.iso.org/home.html (n.d.) ISO/IEC 27001 INFORMATION SECURITY MANAGEMENT [online]
Available at: https://www.iso.org/isoiec-27001-information-security.html [Accessed 1 August 2022]
https://www.itgovernance.co.uk/ (2022) ISO 27001: The International Information Security Standard
[online] Available at: https://www.itgovernance.co.uk/iso27001 [Accessed 1 August 2022]
https://www.sans.org/uk/ (2022) Security Policy Templates [Online] Available at:
https://www.sans.org/information-security-policy/ [Accessed 1 August 2022]
Activity 01
Concerning information, the significance of the Security Management Systems Plan Important Elements
An organization's information security posture can be established, implemented, maintained, and constantly improved with the use of an ISMS
plan (International Organization for Standardization [ISO], 2013). It is customized to the unique requirements and organizational situation, taking
into account variables such as:
The strategy makes use of a risk-based methodology to recognize, evaluate, and lessen risks to information assets (TUV SUD, 2023). It describes
the roles, responsibilities, policies, and security measures that are in place to protect these assets.
Enhanced security posture: An organization's resistance against cyberattacks and data breaches is strengthened by a well-defined ISMS plan.
Better risk management: The framework offers a methodical way to recognize and lessen information security threats.
Regulation adherence: ISMS strategies can assist firms in abiding by data protection rules and regulations unique to their industry.
An ISMS plan demonstrates an organization's commitment to information security, which may help to build trust with partners and clients.
The strategy-Do-Check-Act (PDCA) cycle for continuous improvement is generally aligned with the fundamental components of an ISMS strategy
(British Standards Institution [BSI], 2023).
Plan: In this phase, information security policies and objectives are established, risk assessments are carried out, and the ISMS's scope is defined.
Do: In this instance, the plan is carried out through employee training, security control implementation, and awareness raising.
Check: Performance evaluations and audits are used to track the efficacy of the ISMS.
Act: By making modifications to rules, controls, and processes, the ISMS is continuously enhanced based on the results from the "Check" step.
The usual steps in creating an ISMS plan are broken down as follows:
Define the scope of the information assets and processes that are included in the ISMS.
Evaluate possible risks, weaknesses, and the effects they may have on information assets by conducting a risk assessment.
Security Policy Development: Create succinct, unambiguous policies that specify employee roles and information security procedures.
Control Selection and Implementation: Using the risk assessment as a guide, select the best security controls and put them into practice.
Awareness and Training: Inform staff members about best practices, rules, and procedures related to information security.
Monitoring and Review: Keep a close eye on the ISMS's performance and carry out routine reviews to make necessary improvements.
An organization's information security strategy is based on its ISMS plan. Organizations are able to protect their important data assets and
maintain a strong information security posture by utilizing established frameworks and adhering to a systematic approach.
Ensuring that only individuals with the proper authorization can access sensitive information is a crucial aspect of maintaining confidentiality.
Sigma Health Group places a high priority on protecting the privacy of student, staff, and patient records.
Use:
Role-Based Access Control (RBAC): Sensitive data should only be accessed by authorized persons, such as medical professionals, administrative
workers, and specific IT personnel.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Encryption: Both while in transit and while at rest, sensitive data should be encrypted. This means that all financial information, personal
information, and patient records need to be secured using encryption standards like AES-256.
Secure Access measures: Verify user identities before giving access to important systems and data by putting strong authentication measures in
place, such as multi-factor authentication (MFA).
2. Honesty
Integrity guarantees that the data is true and hasn't been altered. This is essential for Sigma Health Group to preserve the integrity of student
grades, financial data, and medical records.
Use:
Put checksums and hash algorithms into place to identify any unwanted data modifications. SHA-256 hash functions, for instance, can be used to
confirm the integrity of files.
Keep thorough audit trails that record all access to and changes made to important data. This makes it easier to find and address any
unauthorized changes.
Strict Access Controls: Put in place access controls to stop illegal data alterations. Sensitive records should only be edited or deleted by authorized
individuals.
3. Accessible
Availability guarantees that systems and data are accessible when required. Ensuring uninterrupted access to systems and data for medical
personnel, administrative staff, and students is of utmost importance to Sigma Health Group.
Use:
Redundant Systems: To achieve high availability, implement redundant systems for vital services. Having backup servers and networking hardware
is part of this.
Sturdy Backup Options: Make regular backups of all important data and store them in the cloud or off-site. Make sure backups are encrypted and
that their integrity and restorability are routinely checked.
Disaster Recovery Plans: Create and keep up-to-date detailed plans that specify what should be done in the case of a data breach or system
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
4. Hazard Assessment
Information asset risks must be identified, evaluated, and mitigated as part of risk management. This entails assessing risks for Sigma Health
Group, including ransomware, data breaches, and system malfunctions.
Use:
Frequent Risk Assessments: To find possible threats and weaknesses, do regular risk assessments. Employ frameworks like ISO/IEC 27005 to
manage risks in an organized manner.
Mitigation solutions: Using the risks that have been identified as a guide, develop and implement mitigation solutions. For instance, patching
software vulnerabilities, setting up firewalls to stop fraudulent traffic, and training employees on phishing scams.
Continuous Monitoring: Use tools for continuous monitoring to quickly identify and address security incidents. Security data can be gathered and
examined by using Security Information and Event Management (SIEM) systems.
5. Observance
Following all applicable laws, rules, and regulations is referred to as compliance. Sigma Health Group finds it critical to adhere to local data
protection legislation and standards such as ISO/IEC 27001.
Use:
Frequent Compliance Audits: To guarantee adherence to pertinent laws and standards, conduct compliance audits on a regular basis. If you need
an impartial evaluation, bring in outside auditors.
Security policy updates should be made on a regular basis to take into account new risks, rules, and regulations. Make certain that all policies are
outlined in writing and distributed to the appropriate parties.
Education and Awareness: Educate employees on the significance of adhering to security standards as well as compliance obligations. This entails
being aware of data protection regulations and the repercussions of breaking them.
6. Constant Enhancement
By implementing continuous improvement, the ISMS is made to adapt to changing business requirements and threats. This entails routinely
evaluating and upgrading security measures for Sigma Health Group.
Use:
Frequent evaluations: To find opportunities for improvement, conduct routine evaluations of the ISMS. Updates should be based on input from
risk assessments, audits, and security incidents.
Incident Response: Conduct a thorough study following any security incident to determine what went wrong and how future occurrences of the
same type of incident may be avoided.
Embracing Best Practices: Keep abreast of the most recent developments in cybersecurity best practices and integrate them into the ISMS.
Interact with the larger security community to gain insight from the experiences of others.
Strong management commitment and leadership are necessary for an effective ISMS. This means that in the case of Sigma Health Group, security
rules need to be actively supported and upheld by the CEO, CIO, and other leaders.
Use:
Security Governance Framework: Create a structure outlining the tasks, functions, and supervision of security management. Key stakeholders and
top management should be involved in this.
Resource Allocation: Make certain that sufficient funds, manpower, and equipment are set up for the ISMS's implementation and upkeep. This
indicates a top-down commitment to security.
Security Culture: Encourage an organization-wide culture of security awareness. Leaders must to lead by example by upholding security protocols
and stressing their significance.
Workers are frequently the security system's weakest link. For Sigma Health Group, preventing security breaches requires staff training on best
practices.
Use:
Conduct Regular Training Programs: Provide personnel with regular training on security best practices, such as identifying phishing attempts,
creating strong passwords, and reporting suspicious activity.
Phishing Simulations: To assess staff awareness and ability to respond to phishing attempts, conduct phishing simulation exercises. Utilize the
findings to customize training courses.
Transparent Communication: Make sure that all employees are aware of the security policies and procedures. Make sure that everyone is aware
of their obligations and roles in upholding security.
Sigma Health Group will gain a lot from putting these principles into practice when they implement an ISMS:
Data Security:
Safeguarding confidential patient, student, and staff information guarantees adherence to data protection regulations and upholds stakeholders'
confidence.
stops data breaches that can cause financial loss and legal problems.
Business Continuity:
reduces the likelihood of interruptions to healthcare and educational services by guaranteeing the availability of vital systems and data.
Risk Reduction:
decreases the possibility and effect of security incidents like ransomware attacks by identifying and mitigating possible security threats.
Adherence to Regulations:
aids Sigma Health Group in adhering to pertinent rules and legislation, preventing fines and improving reputation.
shows stakeholders and regulatory agencies that you are committed to data security and protection.
Stakeholder Self-Assurance:
builds trust by showcasing a dedication to information security with patients, students, staff, and partners.
Economy of Cost:
lowers the price of recovering from a data breach, including lost profits, legal fees, and system recovery costs.
prioritizes security investments according to risk assessments, which optimizes the use of available resources.
Sigma Health Group may substantially improve its cybersecurity posture, guarantee the continuity of its operations, and uphold the faith of its
stakeholders by adhering to the principles of an ISMS.
Performed Risk Assessment and Benefit Analysis of the Sigma Health Group's ISMS Plan
An essential step in the entire risk management process is risk assessment. This methodical approach entails recognizing, assessing, and
evaluating any risks and hazards together with the associated hazards (International Organization for Standardization [ISO], 2013).
Finding and controlling vulnerabilities to information security requires carrying out a thorough risk assessment. The ISO/IEC 27001 standards shall
be followed in the performance of this evaluation. The following steps are involved in the process:
01. Establish the context for the risk assessment by defining its parameters, including the resources, dangers, and weaknesses that are
pertinent to Sigma Health Group.
02. Determine whether hazards have the potential to jeopardize the organization's assets.
03. Risk analysis: Examine the hazards that have been identified to ascertain their likelihood and possible impact.
04. Risk assessment: Assess the risks in order to rank them according to likelihood and possible impact.
05. Identify the best course of action for reducing, shifting, avoiding, or accepting the risks.
Range:
Assets include the campus PCs, backup NAS drive, Network Domain Server, email exchange server, HR servers, and public access file server.
Information includes staff and student personal information, academic records, medical histories, attendance records, financial information, and
email correspondence.
Possible Dangers:
Prioritization Table: The risks are ranked from highest to lowest risk level based on the risk matrix.
Make frequent backups of your data and save it offline in various places.
Use multi-factor authentication (MFA) to gain access to systems that are sensitive.
To restrict access based on job responsibilities, use role-based access control (RBAC).
For remote access, make use of a robust VPN with strong encryption.
Make sure logs are routinely examined and remote access systems are kept under observation.
Inform people of the dangers of utilizing USB devices that are not verified.
Establish a reliable backup plan and test backup restorations on a regular basis.
Backups should be kept in many locations, such as offsite and cloud-based services.
Verify the background of staff members and students who have access to private information.
Encourage a culture of security awareness by holding frequent training and awareness campaigns.
Access control systems and locks provide security for server rooms.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Update the disaster recovery plan (DRP) in light of lessons acquired from routine disaster recovery drills.
Make sure all-important data is backed up and that it can be easily restored in case of an emergency.
By conducting this risk assessment, Sigma Health Group can better understand the threats to their information assets and prioritize their efforts
to mitigate these risks. Implementing the recommended mitigation measures will strengthen their information security posture, ensuring
compliance with ISO/IEC 27001 standards, and protecting their sensitive data and systems from various threats.
Secrecy: The ISMS made guaranteed that only authorized people could access sensitive data, including student information, medical records for
patients, and payroll information. Given the sensitivity of medical data and personal information, this protection was essential.
Integrity: The ISMS protected data integrity by putting in place safeguards including digital signatures, checksums, and access limits. This
guaranteed that information stayed true and unchangeable, which was necessary to keep academic evaluations and medical records trustworthy.
Risk Control:
Risk Identification and Mitigation: Thorough risk evaluations revealed possible dangers and weaknesses, allowing Sigma Health Group to rank and
handle the most important risks. By being proactive, they were able to avert situations similar to the ransomware attack that had previously
destroyed their IT infrastructure.
Incident Response: A well-defined incident response plan is a necessary component of an efficient ISMS since it guarantees prompt identification,
containment, elimination, and recovery from security incidents. This maintained continuity in patient care and instruction by minimizing
downtime and lessening the impact on operations.
Adherence to Regulations
Compliance with Standards: Sigma Health Group was guaranteed to comply with national and international legislation, including GDPR for data
protection and HIPAA for healthcare data security, by aligning the ISMS with ISO/IEC 27001 standards. Respect for the law prevented fines and
preserved stakeholder confidence.
Audit Readiness: Consistent adherence to regulatory requirements was guaranteed by frequent internal and external audits. Being prepared
helped to prevent unforeseen compliance problems and increased trust with regulatory agencies.
Exhibiting Carefulness:
Legal Protection: By following accepted security guidelines, you showed that you took reasonable precautions to safeguard confidential data. In
order to reduce responsibility and safeguard the company in the event of data breaches or legal issues, this legal defensibility was essential.
uniform Procedures: Sigma Health Group will operate more consistently and effectively as a result of the ISMS's implementation because it will
have uniform security procedures. Consequently, security responsibility management became less unexpected and complex.
Reduced Downtime: The preventative measures and rapid incident response capabilities of the ISMS significantly reduced operational disruptions.
This was necessary to maintain the smooth operation of healthcare services and educational programs, both of which depend on the continuous
availability of IT systems.
Resource Optimization:
Effective Use of Resources: By focusing resources on high-priority risks and necessary assets, Sigma Health Group made the best use of the
LKR116.4 million and LKR15.3 million budgets. The allocation that was developed ensured that security expenditures produced the highest return.
Clients and Partners Trust: Due to our excellent information security standards demonstration, we have earned the trust of patients, students,
parents, and partners. Their level of trust in the company increased when they realized that their data was safe.
Competitive Advantage: Sigma Health Group's commitment to data security and privacy set them apart from rivals thanks to an efficient ISMS.
This competitive edge was especially helpful in drawing in new clients and students.
Public perception:
Positive Public Relations: Sigma Health Group's reputation was enhanced by efficient information security protocols and openness regarding data
protection. Preventing security incidents and data breaches prevented bad press that may have damaged the company's reputation.
Proactive Security Measures: Sigma Health Group was able to stay ahead of emerging threats through regular risk assessments and ongoing
monitoring. They kept up a strong defense against changing cyber threats by modifying security measures in response to the most recent threat
intelligence.
Learning from issues: The ISMS was made to include the lessons learnt from security issues through post-incident reviews and feedback loops. The
organization's resistance to potential dangers was strengthened through this process of continuous development.
Promoting Innovation: Sigma Health Group could concentrate on innovation in healthcare and education without having to worry about data
breaches all the time if it had a solid security foundation. Their services were able to be more inventive and better because to this independence.
Culture of Security:
Regular training programs ensured that staff members were knowledgeable about security best practices and their role in protecting information.
This knowledge reduced the chance of human error, which is often a significant information security threat.
Participation in the ISMS process by employees improved their alertness and proactivity in spotting and reporting possible security threats. The
overall security posture of the organization was enhanced by this shared accountability.
Policy Compliance: Whether intentional or inadvertent, insider threats were less likely when there were clear policies and frequent training. For
Sigma Health Group, this meant that staff members and pupils adhered to security guidelines in order to safeguard private information from
internal exploitation.
Cost savings: The company averted significant financial losses from recovery efforts, legal fees, and possible fines by preventing data breaches and
reducing their impact. Over time, it proved to be economical to invest in an ISMS.
Insurance: Lowering the cost of cybersecurity insurance may be achieved by putting in place thorough security policies using an ISMS. This
strengthened the organization's financial security and demonstrated its dedication to reducing cyber dangers.
The dependable services provided to patients and students are the consequence of Sigma Health Group's assurance of data availability and
operational continuity. Their reliability resulted in an increase in customer satisfaction and loyalty.
Improved Learning Environment: Students at the Sigma Institute of Health had a better learning environment thanks to safe and easily accessible
IT solutions, which improved their academic achievement and general well-being.
In addition to attaining regulatory compliance, operational efficiency, reputation, continuous improvement, and employee engagement in
upholding a safe workplace, Sigma Health Group enhanced its security posture. These all-inclusive advantages contributed to the organization's
long-term success, stability, and capacity to offer top-notch medical and educational services.
Critically Examining the Needs to Create and Uphold Sigma Health Group's ISMS Plan
Important Components
Top Management Involvement: Sigma Institute of Health's Chief Information Officer (CIO) and upper management need to actively support and
promote the ISMS. Their participation is essential to obtaining resources and guaranteeing that goals are in line with the organization.
Information Security Policy: Create a thorough information security policy outlining the organization's dedication to safeguarding staff and
student data, guaranteeing system availability, and upholding regulatory compliance.
Establishing the Purpose: All essential resources, such as the HR servers, Student Information System (SIS), email exchange server, public access
file server, backup NAS drive, and network domain servers, should be covered by the ISMS. All physical sites, such as server rooms and IT labs,
should be covered as well.
Setting Goals: Clearly define information security goals that complement Sigma's corporate objectives. For example, guaranteeing the privacy of
health information, the accuracy of academic data, and the accessibility of virtual learning environments
Risk Identification and Analysis: To detect potential threats like ransomware, cyberattacks, data breaches, and physical security hazards, conduct a
thorough risk assessment. To assess each risk's impact and likelihood, use risk matrices.
Create a risk treatment strategy that ranks hazards according to their seriousness. Put in place the necessary safeguards, such as improved
firewall configurations, multi-factor authentication (MFA), and frequent data backups, to reduce risks.
ISMS Framework: Using ISO/IEC 27001 standards as a foundation, create a systematic ISMS framework. Comprehensive rules, processes, and
recommendations for handling information security should be included of this framework.
Documentation: Keep thorough records of all ISMS operations, including incident reports, treatment plans, rules, procedures, and risk
assessments. Review and update this material frequently to take into account modifications to the organizational structure and threat landscape.
Technical Controls: Put into practice technical controls such sophisticated firewalls, intrusion detection/prevention systems (IDS/IPS), encryption
for confidential information, and secure server and workstation setups. Update software frequently to guard against vulnerabilities.
Physical Controls: implement surveillance cameras, implement access control systems to secure server rooms, and make sure that only authorized
individuals have access to important places in order to improve physical security.
Administrative controls: Create and implement guidelines and protocols for incident response, user access control, data backup, and secure data
handling. Make routine audits to make sure these policies are being followed.
Security Awareness Programs: To guarantee that all employees and pupils comprehend the value of information security and their part in
safeguarding information assets, regularly provide security awareness training.
IT staff and other critical personnel should receive specific training on advanced security procedures, incident response, and the usage of security
tools and technology.
Continuous Monitoring: To identify and react to security events quickly, establish continuous monitoring of networks and systems. For centralized
monitoring and analysis, make use of systems such as Security Information and Event Management (SIEM).
Frequent Audits: To assess the success of the ISMS and guarantee adherence to ISO/IEC 27001 standards, conduct routine internal and external
audits. Utilize audit results to pinpoint areas in need of development.
Create and update an incident response plan that specifies what should be done in the case of a security occurrence. Make sure the plan outlines
the steps for recovery, eradication, containment, and detection.
Post-Incident Analysis: To identify the underlying cause of incidents and put corrective measures in place to stop them from happening again, do
post-incident analysis. Record your learnings and make the necessary updates to the ISMS.
Constant Enhancement
Plan-Do-Check-Act (PDCA) Cycle: Apply the PDCA cycle to guarantee that the ISMS is continuously improved. Plan, execute, evaluate, and improve
security measures on a regular basis in response to user input and changing threats.
Establish feedback channels to get opinions on the efficacy of the ISMS from employees, students, and other stakeholders. Make improvements
based on the input provided.
Sigma Health Group needed to establish and maintain an Information Security Management System (ISMS) that adhered to the fundamental
principles of confidentiality, integrity, availability, risk management, compliance, continuous improvement, leadership commitment, and
employee awareness. This required a thorough and structured approach. The thorough study that follows is in line with the unique needs and
conditions of Sigma Health Group.
Scope: In addition to the three hospitals (SFC), the ISMS covered networked systems, data (patient, staff, and student), and IT infrastructure. It
also included the Sigma Institute of Health. This ensured that all of Sigma Health Group's vital components were covered.
The main objectives were to protect sensitive data (such as student information, staff payroll data, and patient medical records), guarantee data
availability, follow regulatory requirements, and enable safe remote learning and healthcare.
Engaging Stakeholders:
Engagement: Among the key players were students, administrative staff, medical professionals, senior management, the Chief Information Officer
(CIO), and IT personnel.
Roles and Responsibilities: It was crucial to make sure that all parties involved—from senior management to regular users—knew their roles and
responsibilities in maintaining security. It was simpler to coordinate efforts toward common security objectives when roles and responsibilities
were clearly understood.
Allocation of Resources:
Budgeting: The LKR15.3 million budget for Sigma Institute of Health and the LKR116.4 million budget of Sigma Health Group were used to allocate
resources. This guaranteed that there would be enough money to put the required security measures in place.
Employees and Equipment: Sufficient personnel and funding for essential security equipment and educational initiatives were guaranteed. This
involved bringing on board qualified staff and purchasing instruments for threat detection, data security, and monitoring.
Assets: The campus network, backup NAS drive, email exchange server, public access file server, HR servers, and the Student Information System
(SIS) were all cataloged as essential assets. This made it easier to understand what required safeguarding.
Risks: Ransomware, phishing scams, device malfunctions, and data breaches were among the possible dangers that were found. Understanding
the vulnerabilities and their possible effects on the organization required completing this phase.
Risks with the greatest potential for damage, such ransomware and illegal access to private information, were given top priority. This made sure
that the biggest risks were dealt with first.
Mitigation: The use of robust access restrictions, frequent software upgrades, endpoint security, and network segmentation were among the risk
mitigation techniques. By taking these steps, the exposure to known dangers was decreased.
Monitoring Tools: To keep an eye on network activity and spot irregularities, SIEM and intrusion detection/prevention (IDS/IPS) systems were
employed. Real-time insights into possible security incidents were made possible by these techniques.
Frequent Reviews: To keep up with emerging risks and organizational changes, regular security audits and risk assessments were planned. This
guaranteed the long-term efficacy of the ISMS.
Policies: Comprehensive security policies covering data protection, compliance, access control, and incident response were developed. These
policies were compliant with the ISO/IEC 27001 requirements.
Documentation: All policies were communicated to the relevant parties, maintained current, and easily available. This ensured that everyone was
aware of the security guidelines.
Training Programs: Staff and students received regular training on security best practices, such as how to manage sensitive data and spot phishing
efforts. This promoted a culture of security awareness.
Policy Communication: To guarantee comprehension and adherence, policies and processes were made explicit to all users. Good communication
made sure that all parties complied with the security procedures.
Staff and Student: Acceptable Use Policies (AUPs) that specify appropriate conduct and the utilization of IT resources were created and
implemented for both staff and students. This lessened the chance of IT resources being misused.
Guidelines: The handling of sensitive data, remote access, and the secure usage of IT resources were all covered. Enforcing these rules was crucial
to keeping the place safe.
Role-based access controls, or RBACs, were put in place to make sure that only individuals with the proper authorization could access sensitive
data. This aided in restricting access to important information.
MFA: To improve security, multi-factor authentication was utilized to gain access to vital systems. This strengthened the defenses against
unwanted access.
Encryption: Payroll information, student data, and medical records were among the sensitive data that was encrypted while it was in transit and
at rest. Data security was guaranteed by encryption, even in the event of interception.
Secure VPN: To safeguard remote access, a more robust, enterprise-grade VPN solution took the place of the freemium VPN. This guaranteed the
security of data transferred across the VPN.
System Upgrades: In order to remove vulnerabilities, Windows 7 systems were upgraded to supported versions. To make sure the systems have
the most recent security features, this was required.
Network Security: To safeguard the network, IDS/IPS, advanced firewalls, and routine patch management were implemented. These precautions
assisted in averting attacks and unwanted access.
Robust Backup: Cloud or off-site encrypted storage was used as part of robust backup solutions. Regular backups were performed and their
integrity was checked. This made sure that in the event of loss, data could be restored.
Disaster Recovery strategy: A thorough strategy for disaster recovery was created and kept up to date, with frequent drills and revisions
depending on emerging risks and lessons discovered. This strategy made certain that the company could bounce back from security breaches fast.
Comprehensive Plan: A thorough incident response plan was created that included guidelines for recovery, eradication, detection, containment,
and post-event evaluation. This plan offered a precise road map for dealing with security-related situations.
tasks and duties: Incident response teams were assigned certain tasks and duties. In the event of an incident, this guaranteed that everyone knew
their roles.
Simulations: To make sure everyone was ready and to pinpoint areas that needed work, regular incident response drills and simulations were
carried out. These drills aided in evaluating the incident response plan's efficacy.
Post-occurrence Analysis: To identify the underlying reasons of an occurrence and modify security protocols appropriately, post-incident analysis
was carried out. This contributed to averting more incidents.
Post-Event Examination:
Review and Improve: To determine what went wrong and how to stop it from happening again, security incidents were examined. The results
informed the updating of policies and controls. This feedback loop guaranteed ongoing improvement.
Management of Compliance:
Frequent Audits: To guarantee compliance with applicable legislation, such as data protection requirements, and ISO/IEC 27001 standards, regular
compliance audits were carried out. This guaranteed that the ISMS complied with all applicable laws and regulations.
External Auditors: In order to provide an objective evaluation, external auditors were called upon as needed. This offered an impartial
confirmation of the efficacy of the ISMS.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Constant Enhancement:
Feedback Loop: Based on input from audits, frequent reviews, and security incidents, a procedure for ongoing improvement was developed. As a
result, the ISMS was able to adapt to new difficulties.
Keeping Up to Date: The company included the most recent security best practices and trends into the ISMS by keeping up with them. This made
it easier to keep up a cutting-edge security posture.
Senior Management Support: The availability of essential resources and regular evaluations were part of the ongoing commitment from senior
management. The security agenda was mostly driven by leadership.
Security Governance Framework: Senior leadership and important stakeholders were included in the establishment of a security governance
framework that involved decision-making procedures. This made sure that organizational culture and decision-making took security into account.
Important Obstacles and Things to Take Into Account When Balancing Security and Usability:
User-Friendly Solutions: Security protocols were put in place without making it more difficult for staff, students, or healthcare practitioners to use
the systems. Sufficient training was given to reduce disturbances. Finding this balance between security and efficiency was essential.
Management of Change:
Easy Transitions: The ISMS was implemented with ease thanks to the application of effective change management techniques. All stakeholders
were made fully aware of the advantages of the ISMS in order to win their support. Adoption of new security measures was ensured and
resistance was minimized through effective change management.
Financial Restraints:
Prioritize Investments: To optimize the use of the resources at hand, security investments were ranked in order of risk. Budgets allotted for
security enhancements were strategically used. This made sure that, in spite of financial limitations, important regions got the financing they
required.
Security Awareness: The organization as a whole promoted a culture of security responsibility and awareness. To continuously enhance security
procedures, reporting of near-misses and security events was encouraged without fear of retaliation. Creating a culture that is security-aware
aided in the early detection and handling of threats.
Sigma Health Group was able to effectively build and maintain an effective Information Security Management System (ISMS) that adhered to the
fundamental concepts of confidentiality, integrity, availability, risk management, compliance, continuous improvement, leadership commitment,
and employee knowledge by addressing these areas in their entirety. This improved their entire security posture, guaranteed adherence to
pertinent regulations, and safeguarded their important data assets.
It was essential that Sigma's Chief Information Officer (CIO) and upper management took an active role. Their direction made sure the ISMS had
the tools and assistance it required. This choice was justified since it established a culture of security and accountability throughout the entire
company.
Information Security Policy: It was essential to draft a concise information security policy. This policy ensured uniformity in the management of
security and provided a framework for all security operations. It was justified since it made sure that everyone knew their roles and duties and
linked company objectives with security precautions.
Establishing the Purpose: The Student Information System (SIS), email servers, backup NAS drives, public access file servers, network
infrastructure, and HR servers were all included in the scope of the ISMS. It also included all physical spaces, including IT labs and server rooms.
This action ensured that no important assets were missed and gave clarity and concentration, thus it was justifiable.
Risk Identification and Analysis: By carrying out a comprehensive risk assessment, possible dangers like ransomware, cyberattacks, data breaches,
and physical security threats were found. It was justifiable to use risk matrices to assess each danger's potential and impact since they provide a
foundation for deliberating on security priorities and investments.
Risk Treatment Plan: Creating and putting into practice a risk treatment plan guaranteed that hazards were effectively addressed. This measure
was warranted since it assisted in ranking the necessary activities according to the level of risk, guaranteeing that resources were allocated
efficiently to address the most pressing problems. On risk severity, making sure that the most important risks were adequately mitigated with the
resources available.
ISMS Framework: An all-encompassing method for managing information security was made possible by establishing a structured ISMS
framework based on ISO/IEC 27001 standards. This action was necessary to guarantee uniformity, thoroughness, and adherence to global norms.
Documentation: It was imperative to keep thorough records of all ISMS operations, including risk assessments, treatment plans, guidelines,
policies, and incident reports. This action was warranted since it supported the continuous management of the ISMS, made audits easier, and
produced proof of compliance.
Technical Controls: To defend against cyberattacks, all vital systems needed to have sophisticated technical controls installed, including firewalls,
IDS/IPS, encryption, and safe configurations. Because it directly addressed technical vulnerabilities and decreased the likelihood of data breaches,
this action was justifiable.
Physical Controls: To safeguard physical assets, it was essential to improve physical security measures such installing surveillance cameras and
safeguarding server rooms with access control systems. Physical security breaches could result in major data losses and operational disruptions,
which is why this measure was necessary.
Administrative Controls: It was crucial to create and implement policies and procedures for incident response, user access control, safe data
handling, and data backup. This action was necessary since it guaranteed compliance with legal and regulatory standards and offered an
organized method of controlling security.
Programs for Security Awareness: Regular security awareness training made sure all employees and students knew the value of information
security and their part in safeguarding information assets. This action was warranted since there was a substantial danger of human error and that
risk might be considerably decreased with awareness.
specific Training: It was essential to give IT professionals and important personnel specific training on incident response, enhanced security
procedures, and the use of security tools and technology. This action was warranted since it improved the organization's capacity to safeguard its
resources and handle emergencies.
Continuous Monitoring: It was essential to put in place continuous monitoring of networks and systems in order to identify security incidents and
take immediate action. This action was warranted since it lessened the possible consequences of security breaches and enabled the proactive
control of risks.
Frequent Audits: In order to assess the success of the ISMS and guarantee adherence to ISO/IEC 27001 requirements, it was imperative to conduct
both internal and external audits on a regular basis. This action was warranted since it guaranteed continuous compliance and offered an
unbiased evaluation of the ISMS.
Incident Response Plan: It was essential to create and keep up an incident response plan that specified what should be done in the case of a
security occurrence. This action was warranted since a well-thought-out response might greatly lessen the effects of an occurrence and speed up
recovery.
Post-Incident Analysis: It was crucial to conduct post-incident analysis in order to identify the underlying causes of occurrences and put corrective
measures in place. This action was warranted since it encouraged ongoing development and assisted in averting recurrence.
Constant Enhancement
PDCA Cycle (Plan-Do-Check-Act): By applying the PDCA cycle, the ISMS was guaranteed to continuously improve. This action was warranted since
it encouraged continuous security measure improvement based on user feedback and changing threats.
Feedback Mechanisms: It was crucial to set up feedback mechanisms in order to get opinions on the efficacy of the ISMS from employees,
students, and other stakeholders. This action was necessary to guarantee that the ISMS will continue to be applicable and efficient in meeting the
security requirements of the company.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
At Sigma Institute of Health, putting these procedures into practice to create and maintain an ISMS was essential for safeguarding confidential
data, guaranteeing compliance, and reducing risks. Each action was supported by how it furthered an all-encompassing and successful
information security management strategy that was customized to the unique requirements and environment of Sigma Institute of Health while
also adhering to ISO/IEC 27001 standards.
To guarantee strong information security management, the Sigma Institute of Health's current risk assessment processes must be in line with
international standards like ISO/IEC 27001 and ISO/IEC 27005. In order to fulfill these criteria, this evaluation will critically evaluate the current
practices and suggest changes.
Identified Assets:
Employee Laptops
File Manager
Interaction
Dangers Found:
Infection
Erasure of Information
Violation of Copyright
DDoS Assault
Risk ratings and priorities are determined by assessing probability and impact.
A variety of essential resources are recognized, encompassing both network and hardware elements.
Drawbacks:
inadequate level of detail in the asset classification. Student and staff data servers, for instance
should be kept apart from common file servers because of their delicate nature.
Suggestions:
Create a thorough inventory of all your assets, including data, hardware, software, and physical infrastructure.
Assign assets a class according to how important and sensitive they are to company operations.
Drawbacks:
There is insufficient coverage of threats. Internal dangers, such staff members' unintentional data breaches or insider threats, are not taken into
account.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Advanced persistent threats (APTs) and supply chain attacks are examples of emerging risks that are absent.
Suggestions:
To find a larger variety of dangers, such as intentional, unintentional, external, and internal, use a threat modeling technique.
Update the threat landscape frequently to reflect fresh and developing dangers.
Drawbacks:
Because probability and impact assessments do not follow a consistent methodology, there may be discrepancies.
Not all aspects, including financial loss, legal ramifications, and reputational harm, are taken into account in the impact assessment.
Suggestions:
Use a standardized method, such the scales in ISO/IEC 27005, to assess probability and impact.
Add financial, reputational, legal, operational, and strategic impacts to the list of criteria for impact assessments.
Advantages:
Risks are divided into three categories: Low, Medium, and High using a risk matrix.
Drawbacks:
Variations in the order of importance of risks. High-impact risks, for example, are occasionally assigned a lesser priority.
Suggestions:
Make sure prioritizing and risk ratings are in direct proportion to each other. High-risk assessments must to be matched with high-impact
initiatives.
Keep track of the justification for decisions on prioritizing to guarantee consistency and openness.
There are some details in the mitigation of the hazards that have been identified.
Drawbacks:
Suggestions:
Create thorough risk treatment plans that include particular controls for every risk that has been identified, using ISO/IEC 27002 as a guide for
control selection.
Advantages:
Drawbacks:
There are no precise measurements or key performance indicators (KPIs) to gauge the ISMS's efficacy.
Suggestions:
As required by ISO/IEC 27001, establish a structured monitoring and review procedure that includes routine internal audits and management
reviews.
Create KPIs to gauge the ISMS's performance and guide ongoing efforts at improvement.
Advantages:
Drawbacks:
The documentation is neither thorough nor compliant with ISO/IEC 27001 standards.
Suggestions:
Keep thorough records of all ISMS operations, including incident reports, treatment plans, policies, procedures, and risk assessments.
By doing routine compliance audits and updating documentation as necessary, you can make sure that ISO/IEC 27001 and other pertinent
regulations are being followed.
Sigma Institute of Health's information security management skills will be greatly improved by harmonizing its risk assessment processes with
international standards like ISO/IEC 27001 and ISO/IEC 27005. Sigma may establish a more resilient Information Security Management System
(ISMS) that efficiently safeguards confidential information, guarantees adherence to regulations, and thoroughly reduces risks by tackling the
detected vulnerabilities and executing the suggested enhancements. In addition to safeguarding the company, this alignment will increase
stakeholder trust and reputation.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
The Sigma Institute of Health is highly dependent on data protection to secure confidential information, fulfill regulatory requirements, and
uphold the trust of stakeholders such as staff, students, and others. The relevant data protection policies and procedures that Sigma Institute
must abide by are covered in this section.
Procedure: List all the data kinds that the institute handles and categorize them according to their level of sensitivity (e.g., personal data, financial
data, health information).
Application: A thorough data inventory must be made by Sigma Institute, and information must be divided into three categories: very sensitive
(like health records), sensitive (like contact information), and non-sensitive (like general announcements).
Procedure: Reduce the quantity of data gathered and only get the information required for particular goals.
Application: Sigma needs to examine all procedures for gathering data and make sure that only pertinent data is obtained from patients,
employees, and students.
Procedure: Strictly limit access to sensitive data so that only individuals with permission can access it.
Application: Use role-based access control (RBAC) to limit access to the HR servers, SIS, and other vital systems by assigning access privileges
based on roles and responsibilities.
Encryption of Data
Procedure: To avoid unwanted access during storage and transmission, encrypt sensitive data both in transit and at rest.
Application: Sigma should use robust encryption mechanisms for data transfers, emails, and databases holding student and staff information.
Procedure: Establish timeframes for data retention and safely remove data that is no longer required.
guaranteeing that personal information is only kept for as long as is required and that it is then safely deleted.
Procedure: To promptly handle any data breaches, create and implement a data breach response strategy.
Application: Sigma has to develop a thorough incident response strategy that outlines the procedures for investigating, notifying, containing, and
fixing data breaches.
Overview: With an emphasis on the rights of data subjects and the duties of data processors, this act establishes the guidelines for protecting
personal information in Sri Lanka.
Crucial phrases:
Consent: The data subject must provide their explicit consent in order for personal data to be processed legally.
Restrictions on Use: Data may only be acquired for clear, reasonable, and legitimate purposes.
Data Security: Implement the required organizational and technical protections in order to ensure data security.
The capacity to access, amend, remove, and object to data processing is one of the rights of data subjects.
Application to Sigma: The Sigma Institute must ensure that personal data is used only for intended purposes, obtain express consent before
processing it, and implement robust security measures. The institute must also uphold the rights of data subjects to data correction and access.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Overview: This law covers charges pertaining to illegal access, data manipulation, and system interference.
Key Provisions:
Application to Sigma: Sigma Institute must guarantee act compliance by securing its IT system against illegal access and data manipulation. These
covers using robust authentication methods and keeping an eye on systems for illegal activity.
Identify a person to serve as a DPO, who will be in charge of overseeing data protection measures and making sure that legal requirements are
followed.
Application: The DPO will oversee the development of data protection policies, provide training, and handle requests from data subjects.
Procedure: Staff members receive regular training on corporate policies, legal requirements, and data protection principles.
Application: Ensure that all employees receive the needed training so they are aware of their responsibilities for safeguarding personal
information and abiding by the law.
Process: To detect and reduce privacy problems, perform DPIAs for any new procedures or initiatives that use personal data.
Utilizing robust data protection methods and adhering to applicable regulations are essential for Sigma Institute of Health. Building
comprehensive data management rules, ensuring compliance with the Computer Crimes Act and Sri Lankan Personal Data Protection Act, and
securely safeguarding data are all important steps Sigma may take to protect its sensitive information, maintain compliance, and inspire trust in its
partners. By taking these actions, the institute will be able to lower the risks associated with data leaks while also ensuring the privacy and
security of personal data.
Organizational Context
Headship
Organizing
Encouragement
Function
Assessment of Performance
Application: Sigma Institute needs to be conscious of issues affecting its information security management system (ISMS) from the inside as well
as the outside. This includes being aware of the expectations and needs regarding data security and IT protection held by staff, students, and
other interested parties.
Headship
Use:
Top Management Commitment: To demonstrate their commitment to information security, Sigma's senior leadership should establish and
support the ISMS.
Information Security Policy: Draft and implement an information security policy that reflects the institution's objectives and legal requirements.
Organizing
Use:
Risk assessment: To assist lessen discovered threats, develop a risk treatment plan using the appropriate ISO/IEC 27002 controls. To do this, a risk
matrix must be constructed in order to rank hazards based on probability and impact.
Function
Use:
Operational Controls: These controls aid in reducing the risks to information security. This includes encryption, safe data storage, regulations for
access control, and regular updates for both the operating system and software.
Establish a system for incident management to locate, record, and respond to security occurrences in a timely manner.
Assessment of Performance
Use:
Monitoring and Measuring: Regular monitoring and assessment of the ISMS's effectiveness contributes to ensuring its effectiveness. This includes
internal audits and management reviews that ensure ISO/IEC 27001 compliance.
Continuous Improvement: Identify problem areas and make the necessary corrections to strengthen the ISMS.
Enhancement
Use:
Establish protocols to manage nonconforming behavior and put corrective measures in place to prevent recurrence.
Continuous Improvement: The ISMS can be made better all the time by incorporating new technologies, methods, audit and review feedback.
Application: List all possible hazards to Sigma's information security, including those pertaining to employee and student data, IT infrastructure,
and outside threats.
Evaluation of Risk
Use:
Create a risk matrix to classify hazards according to their impact and likelihood. As an illustration:
High Probability, High Impact: Give certain dangers (such ransomware and DDoS assaults) top priority and take prompt action.
Low Impact, High Probability: Take steps to lessen the chance (e.g., student PCs infected with viruses).
Risk Management
Use:
DDoS prevention: Set up tools for network monitoring and DDoS prevention.
Prevent ransomware by using anti-malware software, making frequent backups, and informing employees about the dangers of phishing emails.
Residual Risk Management: Transfer residual risks via insurance or accept them if they are within reasonable bounds.
Application: Keep an eye out for potential threats and evaluate how well the measures you've put in place are working. As the danger landscape
or operational environment changes, make the required adjustments to the risk management plan.
Sigma Institute of Health can significantly enhance its IT security condition by implementing ISO/IEC 27001 and creating a comprehensive risk
management plan. This approach ensures that all potential dangers are identified, assessed, and minimized while continuously improving the
ISMS to address new issues. In addition to maintaining legal compliance and fostering confidence among interested parties, this will protect
private data.
Findings: Inadequate role-based access control, a lack of multi-factor authentication (MFA), and weak passwords all contributed to inadequate
access limitations that allowed for possible illicit access.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Unauthorized access to student and staff private data may result in data breaches, loss of personal information, and perhaps legal repercussions.
Findings: There were inadequate firewall configurations and no intrusion detection/prevention systems (IDS/IPS) due to the outdated network
design.
A higher susceptibility to ransomware, malware infestations, and distributed denial of service (DDoS) assaults might potentially undermine data
integrity and disrupt operations.
Results: An attacker's ability to intercept and access private data was facilitated by inadequate encryption of data while it was in transit and at
rest.
Unauthorized access to protected information on storage or communication devices results in data breaches and confidentiality violations.
Results: System and software updates and patches were not applied on a regular basis, nor were regular security assessments performed.
Impact: Increased vulnerability to exploitation due to vulnerabilities that are already known can lead to system intrusions and security lapses.
Consequences of insufficient incident response plans: Insufficient information or an outdated plan made it difficult to handle potential security
incidents.
Reactions to security events that are either insufficient or delayed will exacerbate the consequences of breaches and increase recovery costs and
times.
Weak backup systems and inadequately defined, frequently validated recovery procedures were among the findings.
Administrative and instructional activities will be impacted by a higher chance of data loss and longer downtime from a cyberattack or system
failure.
Enhancing network architecture, implementing robust encryption methods, and tightening access controls are ways to improve audit results and
fortify security posture.
Tighter security regulations will contribute to a reduction in vulnerabilities, which will make it harder for hackers to access systems and data.
Enhanced Obedience
Improved Compliance: Aligning security guidelines with relevant legislation, such as the Sri Lankan Personal Data Protection Act and the Computer
Crimes Act Maintaining legal compliance will reduce the likelihood of fines from the law and boost stakeholder trust in the institute's commitment
to data protection.
Frequent security awareness training ensures that employees and students understand their role in maintaining security. Improved awareness will
help to minimize the probability of human blunders triggering security incidents as unintended data releases or phishing campaigns.
Enhancing incident response and recovery implementation requires developing a comprehensive incident response plan and regularly testing
backup and recovery systems. Fast and efficient reaction to security incidents will help to limit the impact of breaches, lower downtime, and
assure continuity of operations. Cost Consequences Investing in contemporary security technologies, frequent audits, and continuing monitoring
systems helps to achieve this. The long-term benefits of averting data breaches, fines from the law, and reputational harm will outweigh the early
and ongoing expenditures associated with these updates.
Confidence of Stakeholders
One can demonstrate their commitment to high security standards by keeping lines of communication open and providing regular updates on
security improvements.
Impact: Staff, parents, students, and law enforcement agencies will all be more confident in the institute's ability to protect personal data, which
will contribute to the development of a secure and reliable environment.
The Sigma Institute of Health's IT security audit reveals significant flaws that, if addressed, would significantly strengthen the organization's
security posture. By implementing the suggested improvements, Sigma may reduce the risk of cyberattacks, ensure compliance with data
protection regulations, and create a culture of security awareness. The benefits of increased security, decreased chance of data leaks, and
increased stakeholder confidence outweigh the associated costs and make these investments profitable.
Significant flaws in Sigma Institute's pre-existing ISMS were revealed, which aided in the catastrophic ransomware assault. A summary of
the vulnerabilities is provided below:
Limited Access Control: A simple firewall and reliance on single-factor authentication provided very little defense against unwanted access.
Through firewall flaws or credentials that were stolen, malicious actors may have easily gained access to the network.
Insufficient Data Classification: A "one-size-fits-all" approach to security was adopted as a result of the absence of a data sensitivity
evaluation. Financial and medical details of students, among other sensitive data, were left unencrypted, making them easy targets for
hackers.
Weak Incident Response: The lack of a clear procedure for recognizing and handling security events caused a delay in action and increased
the severity of the attack. The institute did not have protocols in place to isolate compromised systems, stop the ransomware from
spreading, and start the recovery process.
Limited Security Awareness Training: Employees were exposed to phishing assaults because they were not seen as security threats. Staff
members might have unwittingly introduced malware into the network by clicking on harmful links or attachments if they hadn't received
the necessary training.
Inadequate Backups: The institute made a disastrous mistake by storing all of its data on a single local backup device. The primary data and
the local backup were both encrypted during the ransomware assault, making recovery impossible.
Assets include the campus PCs, backup NAS drive, Network Domain Server, email exchange server, HR servers, and public access file server.
Information includes staff and student personal information, academic records, medical histories, attendance records, financial information, and
email correspondence.
Possible Dangers:
Risk Matrix: A risk matrix aids in illustrating the probability and seriousness of hazards that have been discovered. Two factors are used to grade
each risk: the impact if the risk materializes (also on a 1 to 5 scale) and the likelihood of occurrence (also on a 1 to 5 scale).
Unauthorized access to 3 4 12
sensitive data
Data breach from external 4 5 20
cyber-attacks
Ransomware attacks 3 5 15
Development of Policy
Policy for Acceptable Use
IT resources are made available by the Sigma Institute of Health (SIH) to assist with the organization's administrative and instructional functions.
The purpose of this Acceptable Use Policy (AUP) is to provide guidelines and expectations for the responsible, ethical, and legal use of online
resources. This policy is applicable to all employees, contractors, and students.
Goals
Make that the resources provided by IT are used for what they are meant to.
Range
This policy is applicable to everyone who uses SIH IT resources, such as:
Computer laboratories
Email correspondence
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Internet connectivity
Appropriate Application
IT resources are made available for use in academic and administrative settings as well as for research and instruction. Personal use need to be
kept to a minimum and shouldn't get in the way of fulfilling duties related to work or school.
Network and Internet Usage: One must utilize the internet and the SIH network in a way that aligns with the organization's objectives and
guidelines.
Email Usage: Official correspondence should be the main purpose of SIH email accounts. Email usage for personal use shouldn't impede
institutional activities or contravene other SIH guidelines.
Unacceptable Use
The usage of SIH IT resources for the following purposes is deemed inappropriate:
Participating in actions that are prohibited by municipal, state, federal, or international laws is known as illegal activity. This covers, among other
things, hacking, piracy, unapproved access, and cyberbullying.
Producing, accessing, or disseminating content that is derogatory, pornographic, or impure is known as offensive content. This covers content that
can be seen as libelous, harassing, or discriminatory.
The act of duplicating, distributing, or utilizing software, audio, films, photographs, or other intellectual property without the required permission
is known as copyright infringement.
Security violations include trying to get around or breach security measures, installing malware, or gaining access to other people's accounts or
data without authorization.
Resource misuse refers to intentional activities such as excessive bandwidth use, unlawful streaming, gaming, or downloading big files that
squander employee time or network resources.
Privacy violations include gaining unauthorized access to, using, or revealing another person's documents, information, or communications.
Disruption: Taking part in actions, such as denial-of-service assaults and network spamming, that interfere with other people's work or impair
system performance.
Unauthorized Equipment: Linking unapproved gadgets or add-ons to the SIH PCs or network without express IT Services permission.
Observance
User Responsibilities: Users are expected to make every effort to ensure that this policy is followed. It is their duty to notify the IT Services team of
any known or suspected violations.
Enforcement and Monitoring: SIH retains the right to keep an eye on and record network activity.
behavior, such as email and internet use, to guarantee adherence to this policy. Discipline up to and including the suspension or termination of
access to IT resources may be applied for violations.
Disciplinary Actions: Infractions of this policy may lead to warnings, the loss of access rights, and in extreme situations, legal action.
Methods
User Contract
Before being permitted to utilize SIH IT resources, all users must sign an Acceptable Use Agreement.
Signing the agreement signifies that users have read, understood, and agreed to abide by the AUP.
Notifying Violations
Reporting Procedure: Users are required to notify the IT Services staff right away of any infractions or questionable activity.
Incident Response: In compliance with SIH disciplinary processes, IT Services will look into alleged violations and take appropriate action.
Policy Review: To make sure the AUP is still relevant and useful, it will be examined once a year.
Updates: All users will be informed of any changes to the policy, and they could be asked to confirm their comprehension and adherence once
again.
The Sigma Institute of Health (SIH) encourages remote work options in order to maintain business continuity and encourage flexibility and work-
life balance. To guarantee that remote work is done safely and efficiently, this policy describes the standards, requirements, and processes.
Goals
Make sure your data is secure and private when working remotely.
Range
All SIH workers who are permitted to work remotely, whether frequently or infrequently, must abide by this guideline.
Qualifications
Criteria: In order to be qualified for remote work, employees must fulfill a number of requirements, such as having the right job function, having a
clean performance record, and having the resources they need.
Work Schedule: As decided upon with their supervisor, remote workers are expected to have a regular work schedule.
Availability: Workers must be accessible during regular business hours and participate in online meetings as needed.
Performance metrics: Workers are required to fulfill deliverables and performance standards as specified by their managers.
Communication: To guarantee agreement on duties and objectives, supervisors must get updates and check-ins on a regular basis.
Equipment Provided: SIH will supply the required hardware, including software licenses, laptops, and VPN access.
Setup of a Home Office: Workers are in charge of creating a suitable workspace at home, which includes internet access and comfortable
furnishings.
Data Security
Data Handling: Workers are required to treat all confidential data in accordance with applicable laws and SIH's data protection policies.
Data Storage: Instead of being kept on personal devices, all work-related data must be kept on platforms authorized by SIH.
Use of VPN: In order for employees to safely access the institute's network, they must use SIH's VPN.
Wi-Fi Security: Workers are responsible for making sure their home network is encrypted and protected with strong passwords.
Security of Devices
Antivirus Software: The most recent version of antivirus software must be installed on all devices used for remote work.
Access Control: To prevent unwanted access, devices should be locked when not in use.
Application Process: Staff members need to send a request form for remote work to HR and their supervisor.
Approval Process: In accordance with departmental requirements and eligibility standards, requests will be examined and authorized.
First Setup: IT will help with the essential hardware and software setup.
Instruction: Workers will get instruction on security procedures and remote work equipment.
Performance Reviews: To make sure remote work is productive, supervisors will carry out regular performance reviews.
Policy Compliance: Adherence to this policy will be tracked, and any violations will be dealt with right away.
Ergonomics: In order to prevent injuries, employees should make sure their home office is set up correctly.
Work-Life Balance: To preserve a healthy work-life balance, employees should schedule regular breaks and manage their workload.
Notice Period: The remote work agreement may be terminated with fair notice by either the employee or SIH.
Return of Equipment: Upon ending the remote work arrangement, employees are required to return any equipment given by SIH in good working
order.
Policy Adherence: All relevant SIH policies as well as this one must be followed by employees.
Disciplinary Action: Failure to comply may result in disciplinary action, which may include dismissal from the company.
Goals
Make sure that data protection rules and regulations are followed.
Range
All employees, students, contractors, and outside service providers who handle personal data on SIH's behalf are covered by this policy. It includes
any type of personal data that SIH processes, irrespective of the format or media.
Lawfulness, Fairness, and Transparency: With regard to the data subject, personal data processing must be done in a way that is lawful,
equitable, and transparent.
Purpose Limitation: Personal information may only be gathered for clear, unambiguous, and permissible objectives. It may not be used for
purposes other than those for which it was originally intended.
Minimization of Data: Personal information must be sufficient, pertinent, and kept to a minimum in respect to the purposes for which it is
processed.
Accuracy: Personal information must be true and, when required, updated. All reasonable measures must be implemented to guarantee
that erroneous personal data is promptly removed or corrected.
Storage Restrictions: Personal information must be retained for as long as is required to fulfill the purposes for which it is processed, and
only in a format that makes it possible to identify the data subjects.
Integrity and Confidentiality: Processing of personal data must provide suitable security, including defense against unauthorized or illegal
processing as well as against unintentional loss, destruction, or damage, by utilizing suitable organizational or technical safeguards.
Accountability
SIH is in charge of adhering to these standards and must be able to prove it.
Data Protection Officer (DPO): In charge of managing the strategy and execution of data protection to guarantee adherence to data
protection regulations. The primary point of contact for both regulatory agencies and data subjects is the DPO.
The IT Services Team is responsible for monitoring IT infrastructure and systems for security, putting technical safeguards in place to
protect personal information, and handling data breaches.
Department heads: Make sure your staff follows the rules and guidelines regarding data protection.
Workers and Contractors: You are in charge of following data protection guidelines and informing the DPO of any potential problems or
breaches.
Right of Access: Individuals are entitled to see their personal data and learn about the manner in which it is being used.
Right to Rectification: Individuals who are the subjects of data are entitled to seek that
Right to Erasure: Subjects may, in certain circumstances, request that their personal data be erased.
Right to Restriction of Processing: Under certain circumstances, data subjects are entitled to request that the processing of their personal
data be restricted.
Right to Data Portability: Individuals have the right to transfer their personal information to another controller and to get it in a commonly
used, machine-readable, structured format.
Right to Object: Under certain circumstances, data subjects are entitled to object to the processing of their personal data. Rights Regarding
Automated Decision-Making: Individuals who provide information have the right to be free from decisions that are made exclusively on
the basis of automated processing, including profiling, that have a substantial impact on them or that have legal ramifications.
Data Inventory: Keep track of all the personal information that SIH processes, together with the reasons for processing and the duration of
data retention.
Legal Basis: Verify that, in accordance with any applicable data protection regulations, every data processing activity has a legitimate basis.
Consent: When necessary, get the data subjects' express consent and make sure they are aware of the uses to which their data will be put.
Information Security
Strict access controls should be implemented to guarantee that only individuals with permission can access personal information.
Data Breach Response: Create a plan that outlines the steps to take in order to report, look into, and mitigate data breaches.
Third-Party Agreements: Make sure that any agreements you have with third parties for data sharing have data protection provisions.
International Transfers: Make sure sufficient security measures are in place and adhere to the regulatory requirements for the
transmission of personal data outside of Sri Lanka.
Training Programs: Ensure that all employees and contractors receive regular training on data protection.
Awareness programs: Run awareness programs inside the company to encourage a data protection culture.
Audits: Conduct frequent data protection audits to confirm compliance with this policy and identify areas for improvement.
Policy Review: Every year or as needed, review and amend this policy to take into account modifications to organizational procedures or
legal requirements.
The purpose of the Sigma Institute of Health (SIH) Access Control Policy is to safeguard information assets by making sure that only authorized
users have access to systems and data. This policy lays out the guidelines, practices, and protocols for controlling access control inside the
company in order to protect the privacy, availability, and integrity of data.
Goals
Make sure that only authorized users are able to access information and information systems.
Range
All SIH workers, contractors, students, and other parties with access to SIH data and information systems are covered by this policy. It includes all
information systems and data, including but not limited to computer systems, networks, applications, and databases, that are owned or
controlled by SIH.
Need to Know: The least privilege principle and the necessity of knowledge to carry out job duties are the foundations upon which access
to information is bestowed.
Role-Based Access Control (RBAC): Permissions to access resources are granted according to each user's role inside the company.
Authentication and Authorization: To confirm user identities, strong authentication procedures are needed. Authorization procedures
make sure users have the proper access permissions.
Accountability: To guarantee accountability, all access to data and information systems must be linked to a specific user.
The Chief Information Officer (CIO) is responsible for supervising the administration and execution of access control rules.
IT Security Manager: Oversees and keeps an eye on access control systems, performs routine audits, and makes sure that this policy is
followed.
Department heads should make sure that, in accordance with their roles and duties, their team members have the proper access rights.
Workers, Independent Contractors, and Pupils: Adhere to the policies and procedures governing access control, and report any security
incidents or breaches.
User Registration: Before being able to use SIH information systems, new users must finish the user registration process. Identity
verification and department head permission are part of this process.
Access Assignment: A user's role and duties inside the organization are taken into consideration when assigning access rights.
Access Review: To make sure that access is still suitable given current job functions, user access rights are regularly reviewed.
Verification
Each user is required to have their own unique user ID and password. Passwords need to be often updated and meet certain difficulty
requirements.
Multi-Factor Authentication (MFA): To improve security, MFA is necessary to access sensitive data and important systems.
Permission
The system of Role-Based Access Control (RBAC) assigns access rights according to pre-established roles. The degree of access to data and
systems that each role is allowed to have is determined by its permissions.
Access Requests: The department head and IT Security Manager must authorize requests for additional access, which must be made
through a proper process.
Activity Logging: Every access to data and information systems has to be recorded. User ID, access time and date, and resources visited
must all be included in logs.
Frequent Audits: To detect and address unauthorized access attempts and other security events, access logs are regularly audited.
Termination of Access
Deactivation of Accounts: Upon contract or employment termination, or when access is no longer needed, user accounts must be removed
right away.
Periodic Review: To find and deactivate accounts that are superfluous or inactive, regular reviews are carried out.
Safety Procedures
Network Security: Network access restrictions, including firewalls and intrusion detection/prevention systems, are installed to secure SIH
information systems.
Physical Security: Only authorized workers are allowed physical access to places holding sensitive data and vital systems.
Data Encryption: To prevent unwanted access, sensitive data must be encrypted both in transit and at rest.
Security Training: Best practices for access control and the significance of safeguarding sensitive data are covered in the security training
that all users are required to complete.
Awareness Campaigns: To emphasize the value of access control and user obligations, regular awareness campaigns are held.
Monitoring Compliance: Regular audits and reviews are used to keep an eye on whether this policy is being followed.
Non-Compliance: Failure to abide by this policy may lead to disciplinary action, which may include contract or employment termination.
Review of Policies
Every year or as appropriate, this policy is evaluated to make sure it still meets all legal and regulatory requirements and is still effective. All
pertinent parties are informed of updates to the policy.
Goals
Defend SIH's information assets against disclosure, alteration, destruction, and unauthorized access.
Observe all applicable laws and rules, such as the Sri Lankan Personal Data Protection Act.
Encourage all stakeholders to adopt a culture of information security knowledge and accountability.
Range
All SIH staff members, vendors, trainees, and other parties with access to SIH data assets are covered by this policy. It encompasses all types of
information, independent of format or medium, including but not limited to verbal, physical, and electronic forms.
In order to make sure that its information security procedures are effective, SIH follows these guidelines:
Integrity: There are safeguards in place to prevent illegal modification or alteration, and the information is accurate, comprehensive, and
dependable.
Availability: When necessary to support SIH operations, information is available to and useable by authorized personnel.
Authenticity: To avoid unwanted access and misuse, the veracity of the information and the identity of the people accessing it are
checked.
Accountability: There are procedures in place to track and audit an individual's activities regarding information security, and they are held
responsible for their actions.
In order to make sure that its information security procedures are effective, SIH follows these guidelines:
Integrity: There are safeguards in place to prevent illegal modification or alteration, and the information is accurate, comprehensive, and
dependable.
Availability: When necessary to support SIH operations, information is available to and useable by authorized personnel.
Authenticity: To avoid unwanted access and misuse, the veracity of the information and the identity of the people accessing it are
checked.
Accountability: There are procedures in place to track and audit an individual's activities regarding information security, and they are held
responsible for their actions.
Risk Assessment: To discover and assess information security risks and vulnerabilities, conduct periodical risk assessments.
Risk Mitigation: To reduce identified risks and guarantee the privacy, accuracy, and accessibility of information, put in place the necessary
controls and procedures.
Control of Access
User Access Management: Apply the least privilege concept to control user access to data and information systems.
Authentication and authorization: To confirm user identities and provide the proper access privileges, put strong authentication
procedures and role-based access controls in place.
Access Monitoring: Keep track of and audit user access in order to identify and address
Data Security
Data Encryption: To prevent unwanted access, encrypt critical data both while it's in transit and at rest.
Data Backup and Recovery: To guarantee the availability and integrity of data, put regular data backup practices into place and create a
disaster recovery strategy.
Response to Incidents
Incident Reporting: Create protocols for quickly reporting and handling information security breaches and incidents.
Investigation and Remediation: To reduce risks and stop recurrence, look into security incidents, evaluate the effects, and take the
necessary corrective action.
Network Security: To guard against malicious activity and illegal access to information systems, put intrusion detection/prevention
systems, firewalls, and other network security controls in place.
Endpoint Security: To safeguard endpoints and stop malware infestations, implement mobile device management (MDM) programs,
antivirus software, and endpoint detection and response (EDR) tools.
Physical Security: To safeguard tangible assets, data centers, and other vital facilities, put in place physical access controls, surveillance
systems, and security personnel.
Security Training: To educate staff members, subcontractors, and students about security risks and best practices, conduct frequent information
security training and awareness programs.
Phishing Awareness: To assist staff in identifying and reporting phishing attempts and other social engineering attacks, provide phishing
awareness training.
Compliance Monitoring: Verify that information security policies, standards, and laws are being followed by conducting routine audits and
assessments.
Enforce information security policies by disciplining people or organizations who are discovered to be in breach of the guidelines.
Review of Policies
In order to make sure that this policy is functional and in line with organizational goals, technological advancements, and legal requirements, it is
evaluated either annually or as needed. Changes to the policy are shared with all pertinent parties.
Prioritization Table: The risks are ranked from highest to lowest risk level based on the risk matrix.
Priority: A numerical number is assigned in this column to represent the relative importance of tackling each risk. Diminished figures indicate
reduced hazards.
Risk Level: Each risk's overall severity is represented numerically in this column. It is likely that two elements are included in this value:
High Risk (15–20): Because of their high likelihood and serious consequences, these risks—ransomware and data breaches—pose the
biggest threat to Sigma Institute. They might cause serious financial losses, harm to one's reputation, and interruptions to educational
pursuits.
Medium Risk (10–14): Unauthorized access, data leaks, virus infections, out-of-date software, and insufficient backups are among the
hazards that still need to be taken seriously. They might result in compromised sensitive information confidentiality, data loss, and system
outages.
Low Risk (5–9): Compared to the higher-risk categories, these risks—such as insider threats, physical security breaches, and natural
disasters—are thought to be less likely to materialize or to have a less severe effect. They do, however, require some fundamental
mitigating techniques and should not be completely disregarded.
Important Notes:
Due to their significant potential for interruption and data loss, cyber threats (ransomware, data breaches) are prioritized in the chart.
There are serious risks associated with uncontrolled remote access and unsafe data handling procedures.
Even though physical breaches and insider threats are given a lower priority, security awareness training and preventative actions are still
necessary.
Make regular backups of your data and store it offline in various locations.
places.
Countermeasures:
External cyberattacks resulting in data breaches:
Make frequent backups of your data and save it offline in various places.
Use multi-factor authentication (MFA) to gain access to systems that are sensitive.
To restrict access based on job responsibilities, use role-based access control (RBAC).
For remote access, make use of a robust VPN with strong encryption.
Make sure logs are routinely examined and remote access systems are kept under observation.
Inform people of the dangers of utilizing USB devices that are not verified.
Establish a reliable backup plan and test backup restorations on a regular basis.
Backups should be kept in many locations, such as offsite and cloud-based services.
Verify the background of staff members and students who have access to private information.
Encourage a culture of security awareness by holding frequent training and awareness campaigns.
Access control systems and locks provide security for server rooms.
Update the disaster recovery plan (DRP) in light of lessons acquired from routine disaster recovery drills.
Make sure all-important data is backed up and that it can be easily restored in case of an emergency.
serves as the main point of contact for security-related issues with top management.
Team IT Security:
puts into practice technological security measures including encryption, intrusion detection systems, and firewalls.
Heads of Departments:
Work together with the IT security team to solve security requirements unique to each department.
Take part in security awareness and training programs to improve their knowledge of security dangers and recommended procedures.
Use role-based access control (RBAC) to limit access to confidential data according to employment roles.
For access to vital systems and data, enforce robust authentication measures like multi-factor authentication (MFA).
To make sure that only people with the proper authorization have access, regularly examine and adjust access rights.
Security of Networks:
Install network segmentation, intrusion detection/prevention systems, and firewalls to guard against malicious activity and unauthorized
access.
To find and fix network vulnerabilities, do routine security evaluations and vulnerability scans.
Data Security:
To prevent unwanted access, encrypt sensitive data both in transit and at rest.
Put data loss prevention (DLP) procedures in place to keep an eye on and manage the transfer of sensitive data.
To guarantee the availability and integrity of data in the event of data loss or corruption, establish backup and recovery methods.
Security of Endpoints:
To safeguard endpoints against malware and other security risks, implement host-based intrusion prevention systems (HIPS), endpoint
detection and response (EDR) solutions, and antivirus software.
To protect endpoints from unwanted access, enforce device encryption and strict password requirements.
Physical Safety:
To limit access to critical places, put in place physical access controls like access cards and biometric authentication.
Set up alarms and surveillance cameras to keep an eye on and prevent unwanted access.
Protect against physical dangers with environmental controls and monitoring systems installed in server rooms and data centers.
Constant Improvement: Examine occurrences to enhance security protocols and stop them from happening again.
Range
All SIH networks, data, and information systems are covered under this IRP. It includes all kinds of security incidents, such as denial-of-service
attacks, malware infections, data breaches, and unauthorized access.
serves as the main point of contact for communications and incident reporting.
Manager of IT Security:
Administrators of systems:
Administrators of networks:
Keep an eye on and examine network traffic for indications of security breaches.
makes certain that incident response measures adhere to all applicable laws and regulations.
Getting Ready
Policy and Procedure Development: Create and uphold protocols for handling incidents.
Training and Awareness: To guarantee preparedness and awareness, provide the IRT and staff with regular training.
Tools and Resources: Keep track of the resources and tools available for incident response.
Monitoring: Keep a close eye out for any indications of security problems on networks and systems.
Detection: To find possible incidents, use both manual and automated procedures.
Analysis: Examine notifications and occurrences to verify the existence of an incident and ascertain its extent and consequences.
Implement containment strategies to keep the problem from spreading and to isolate impacted systems.
Long-term containment: Taking steps to keep things running while dealing with the situation.
Eradication: Find and eliminate the primary cause of the problem, such as malware removal or vulnerability closure.
Recovery: Return impacted data and systems to regular operation. Make sure all systems are secure and keep an eye out for any
indications of a recurrence.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Debriefing: Examine the occurrence and the efficacy of the reaction after it has happened.
Reporting: Write up and send out an incident report that includes the conclusions, the steps you took, and suggestions for improvement.
Continuous Improvement: Apply lessons learned to update security protocols, policies, and processes.
Incident Reporting: Any suspected security incident must be reported right away to the IRC by all workers, subcontractors, and students.
Internal contact: The IRC will arrange for contact with pertinent stakeholders and within the IRT.
External Communication: If required, the public relations officer will oversee correspondence with law enforcement, government agencies,
and the media.
Events will be categorized according to their seriousness and effect on the company:
Low Severity: Small-scale events with little consequence, such a virus outbreak in a single user.
Events with a moderate level of severity include those that impact several users or systems, like a limited network outage.
High Severity: Serious events that have a big effect, such a large-scale malware epidemic or data breach.
Critical Severity: Events that result in significant interruption, including a widespread denial-of-service attack or significant data loss.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Frequent Testing: To make sure the IRP is working, test it frequently using simulations and tabletop activities.
Review and Update: To reflect changes in the organization, technology, and threat landscape, review and update the IRP on a regular
basis.
Goals
Range
The Sigma Institute of Health's whole IT infrastructure and data are covered by the DRP, including but not limited to:
infrastructure of networks
Databases
The DRP is carried out by the Disaster Recovery Team (DRT). The following roles are part of the team:
Constant Improvement: Examine occurrences to enhance security protocols and stop them from happening again.
Range
All SIH networks, data, and information systems are covered under this IRP. It includes all kinds of security incidents, such as denial-of-service
attacks, malware infections, data breaches, and unauthorized access.
serves as the main point of contact for communications and incident reporting.
Manager of IT Security:
Administrators of systems:
Administrators of networks:
Keep an eye on and examine network traffic for indications of security breaches.
makes certain that incident response measures adhere to all applicable laws and regulations.
Policy and Procedure Development: Create and uphold protocols for handling incidents.
Training and Awareness: To guarantee preparedness and awareness, provide the IRT and staff with regular training.
Tools and Resources: Keep track of the resources and tools available for incident response.
Monitoring: Keep a close eye out for any indications of security problems on networks and systems.
Detection: To find possible incidents, use both manual and automated procedures.
Analysis: Examine notifications and occurrences to verify the existence of an incident and ascertain its extent and consequences.
Implement containment strategies to keep the problem from spreading and to isolate impacted systems.
Getting Ready
Policy and Procedure Development: Create and uphold protocols for handling incidents.
Training and Awareness: To guarantee preparedness and awareness, provide the IRT and staff with regular training.
Tools and Resources: Keep track of the resources and tools available for incident response.
Monitoring: Keep a close eye out for any indications of security problems on networks and systems.
Detection: To find possible incidents, use both manual and automated procedures.
Analysis: Examine notifications and occurrences to verify the existence of an incident and ascertain its extent and consequences.
Implement containment strategies to keep the problem from spreading and to isolate impacted systems.
Long-term containment: Taking steps to keep things running while dealing with the situation.
Eradication: Find and eliminate the primary cause of the problem, such as malware removal or vulnerability closure.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Recovery: Return impacted data and systems to regular operation. Make sure all systems are secure and keep an eye out for any
indications of a recurrence.
Debriefing: Examine the occurrence and the efficacy of the reaction after it has happened.
Reporting: Write up and send out an incident report that includes the conclusions, the steps you took, and suggestions for improvement.
Continuous Improvement: Apply lessons learned to update security protocols, policies, and processes.
Incident Reporting: Any suspected security incident must be reported right away to the IRC by all workers, subcontractors, and students.
Internal contact: The IRC will arrange for contact with pertinent stakeholders and within the IRT.
External Communication: If required, the public relations officer will oversee correspondence with law enforcement, government agencies,
and the media.
Events will be categorized according to their seriousness and effect on the company:
Low Severity: Small-scale events with little consequence, such a virus outbreak in a single user.
Events with a moderate level of severity include those that impact several users or systems, like a limited network outage.
High Severity: Serious events that have a big effect, such a large-scale malware epidemic or data breach.
Range
The Sigma Institute of Health's whole IT infrastructure and data are covered by the DRP, including but not limited to:
infrastructure of networks
Databases
The DRP is carried out by the Disaster Recovery Team (DRT). The following roles are part of the team:
Evaluation of Risk
Determine any possible dangers, such as hardware malfunctions, cyberattacks, and natural disasters.
For every system, ascertain the Recovery Time Objectives (RTO) and Maximum Tolerable Downtime (MTD).
Data Restore
Contingent Systems
Use redundant network components and servers to reduce the number of single points of failure.
Replication of Data
For essential systems, use real-time data replication to make sure the copies are current.
Alternative Locations
Choose a different healing location (hot, warm, or cold) based on the demands of the company and available funds.
Initiation
When necessary, the CIO evaluates the circumstances and declares a disaster.
Tell employees, pupils, and other interested parties about the crisis and the measures being made to recover.
Data Recuperated
Observe the RTO and RPO criteria when restoring data from backups.
System Recuperation
Rebuild and set up the infrastructure and systems that are impacted.
Network Recuperation
If recovery was carried out at a different location, return activities to the main location.
After recuperation, review the information and record the lessons discovered.
Every year or following any significant modifications to the IT environment, review and update the DRP.
Record-keeping
Ensure that every DRP procedure, position, and responsibility is meticulously documented.
For easy access in the event of a disaster, keep copies of the DRP in several places—both on and off site.
Constant Observation
Goal: Ensuring the availability, integrity, and confidentiality of information assets by quickly identifying and responding to security problems.
Important Tasks:
Real-time Monitoring: Use cutting-edge security monitoring solutions to gather and examine logs from multiple sources instantly, such as Security
Information and Event Management (SIEM) systems.
Log Management: Gather and store logs from all important systems, including as servers, network equipment, software, and databases, centrally.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
Threat Identification: To spot and notify you of any unusual activity, use intrusion detection/prevention systems (IDS/IPS).
Anomaly detection: Use behavioral analytics to spot trends that deviate from the norm and could point to a security breach.
Integration of Monitoring Tools with Incident Response: To enable timely action, make sure monitoring tools are integrated with the incident
response process.
Automatic Alerts: Set up alerts to be notified of possible security breaches to the Incident Response Team (IRT).
Protocols for Handling Incidents: Adhere to established protocols for investigating and responding to incidents.
Frequent Monitoring Reviews: To spot patterns and opportunities for development, plan recurring evaluations of the monitoring results.
Quarterly Reviews: Evaluate security incidents and monitoring efficacy in-depth every quarter.
Internal Examinations
The aim of this study is to verify adherence to security protocols, guidelines, and legal mandates while pinpointing opportunities for
enhancement.
Important Tasks:
Audit Planning: Create an internal audit timetable that addresses each of the ISMS's essential components.
Establish the annual audit plan's goals, objectives, and audit frequency.
Team Audit: Assign experienced internal auditors who are not involved in the activities under audit.
Audit Execution: Carry out audits in accordance with the plan, giving higher-risk areas priority by applying a risk-based methodology.
Interviews: To gauge employees' and stakeholders' comprehension of and compliance with security measures, conduct interviews.
Testing: To confirm the efficacy of security measures, carry out technical tests like penetration tests and vulnerability assessments.
Audit Reports: Write thorough reports outlining the state of compliance, areas of nonconformity, and recommended changes.
Management Action Plan: To address audit findings, collaborate with management to create and carry out an action plan.
Follow-up: Confirm that the corrective measures have been put into place and are working.
Monitoring Remediation: Keep tabs on the status of remediation efforts until they are completed.
Re-audits: Perform additional audits in the areas where substantial discoveries were found.
Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53
Review of Management
Goal: To guarantee that the ISMS continues to be appropriate, sufficient, and successful in achieving the organization's security goals and
adjusting to shifts in the threat environment.
Important Tasks:
Review Meetings: Hold regular management review meetings to assess the ISMS's efficacy and performance.
Quarterly Reviews: Every quarter, senior management evaluates metrics and key performance indicators (KPIs) associated with the ISMS.
Annual Review: An extensive evaluation conducted each year to evaluate the ISMS's overall condition and its strategic alignment with the
objectives of the organization.
Examine the conclusions drawn from both internal and external audits.
Examine security incident reports, taking into account the underlying reasons and corrective actions.
Conclusions of Risk Assessments: Consider any modifications to the risk profile as well as the results of most recent risk assessments.
Feedback: Take into account the opinions of all relevant parties, such as staff members, students, and government agencies.
Evaluate the outputs and make judgments and steps to enhance the ISMS.
Policy Modifications: Based on evaluation results, update security policies and procedures.
Resource Allocation: Provide the funds required to put the improvements into practice.
Plan for Continuous Improvement: Create a strategy for the ISMS's ongoing improvement.
Record-keeping:
Minutes of Management Reviews: Record the choices, talks, and actions from meetings for management reviews.
Improvement Plan: Keep track of all improvement projects and the progress of their execution.
Maintains Improvement
Goals
Combine the knowledge gained from exams with real-world disaster experiences.
Encourage a culture where catastrophe recovery procedures are always being improved.
Post-Incident Review: Conduct a thorough analysis to pinpoint achievements and opportunities for enhancement following any major incident or
catastrophic catastrophe.
Technology and Business Changes: Revise the DRP to account for modifications to the organizational structure, business procedures, or IT
environment.
Mechanisms of Feedback
Feedback from Stakeholders: Find out what the staff, students, and other stakeholders think about how effective the DRP is.
Incident Analysis: To find opportunities for improvement, examine the incident's reactions and underlying causes.
Recommendations and conclusions from both internal and external audits should be incorporated into the DRP.
Frequent Training: Give the Disaster Recovery Team (DRT) and other pertinent employees regular training.
Simulation Exercises: To evaluate the DRP and enhance response skills, regularly conduct disaster recovery exercises and simulations.
Awareness Campaigns: Conduct campaigns to educate all employees and students on the procedures involved in disaster recovery.
Define and track key performance indicators (KPIs) for disaster recovery, including recovery time objectives (RTO), recovery point objectives
(RPO), and incident response time.
• Incident Logs: Keep thorough records of every incident, including the steps taken in response and the results.
• Change Logs: Maintain a record of every modification made to the DRP, along with the rationale and the steps involved in getting approval.
• Audit Reports: Maintain a file of audit reports and make sure they are examined and addressed.
Evaluation of Management
• Schedule Regular Reviews: To make sure the DRP is in line with corporate aims and objectives, senior management should schedule regular
reviews of the document.
• Strategic Planning: Include catastrophe recovery planning in the organization's overall strategic planning procedure.
Sigma Institute of Health is implementing an Information Security Management System (ISMS) using a methodical, phased implementation
process. The main stages, assignments, and deadlines for ensuring a thorough and efficient deployment of the ISMS are described in this
implementation map.
2. Analysis of Gaps
o Create a thorough project plan that includes deadlines and completion dates.
4. Involvement of Stakeholders
o List the important parties (CIO, IT personnel, educators, staff members in administration, and students).
o Hold first meetings to explain the goals and scope of the project.
1. Evaluation of Risk
o Carry out a comprehensive risk analysis to find weaknesses and possible threats.
2. Selection of Controls
o Determine and choose the best controls to reduce risks that have been identified.
3. Inventory of assets
o Make a list of every essential asset, including servers, network devices, data, apps).
1. Development of Policies
1. Controls Technical
o Put in place intrusion detection/prevention systems (IDS/IPS), firewalls, and antivirus software.
1. Control testing
2. In-house Examination
3. Evaluation of Management
3. Evaluation of Management
o Update and enhance the ISMS frequently in response to user input and new threats.
The security plan that has been established for Sigma Institute of Health (SIH) takes a holistic approach to security, covering physical, virtual, and
policy elements. This is the method.
Physical Safety:
o Justification: Sensitive locations like server rooms and data centers are only accessible through physical access controls like access cards and
biometric verification. This lowers the possibility of physical theft or hardware damage and stops unauthorized individuals from accessing vital
infrastructure.
o Justification: Alarms and surveillance cameras aid in keeping an eye on and discouraging unwanted entry to physical locations. They serve as a
deterrent to possible intruders, offer visual proof of security occurrences, and support forensic investigations.
3. Environmental Management:
o Justification: Server rooms and data centers are protected against environmental risks by environmental controls, such as temperature and
humidity monitoring systems. Sustaining ideal conditions guarantees hardware dependability and guards against environmental variables causing
device failure.
Digital Safety:
o Justification: SIH's IT infrastructure is shielded from malware, cyber-attacks, and unwanted access by network security mechanisms such
firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation. These security measures guard against unwanted access
to private information, monitor and filter network traffic, and identify questionable activity.
o Justification: Sensitive data integrity and confidentiality are guaranteed by encryption, both during data transmission and at rest. SIH reduces
the possibility of data breaches and unauthorized access by encrypting data, particularly when data is sent over public networks or kept on
portable devices.
o Justification: End-user devices are shielded from malware, phishing scams, and other security risks by endpoint security solutions, which include
antivirus software, endpoint detection and response (EDR) tools, and mobile device management (MDM) systems. By identifying and addressing
security threats at the endpoint level, these solutions lessen the possibility that cyberattacks will be effective.
aspect of policy
1. Policy for Data Protection:
Reasoning
• Compliance: The Sri Lankan Personal Data Protection Act and other pertinent data protection laws and regulations are guaranteed to be
complied with by the Data Protection Policy. The policy assists SIH in avoiding legal penalties and reputational harm associated with non-
compliance by setting rules for the gathering, storing, processing, and sharing of personal and sensitive data.
• Confidentiality: The policy describes steps to protect data confidentiality, such as data classification, access limits, and encryption. The strategy
lowers the risk of data breaches and upholds stakeholder trust by shielding confidential information from unwanted access and dissemination.
• Integrity: To guarantee the correctness and dependability of data, data integrity controls, such as data validation and error-checking processes,
are put in place. The policy contributes to the preservation of information's quality and reliability by identifying and stopping illegal changes or
tampering.
• Availability: To guarantee the availability of crucial data and systems, the policy contains measures for data backup, disaster recovery, and
business continuity planning. SIH can lessen the effects of data loss or system outages and decrease downtime by putting backup and recovery
procedures in place.
Reasoning
• Asset Protection: Information about SIH is only accessible by means of the Access Control Policy.
systems and data, shielding priceless resources from theft, abuse, and unwanted access. The policy reduces the risk of insider threats and illegal
activities by adopting role-based access controls and applying the concept of least privilege.
• Confidentiality and Privacy: By restricting access to authorized individuals only who have a need-to-know basis, access controls help to ensure
the confidentiality and privacy of sensitive information. The policy safeguards individual privacy rights and avoids unauthorized disclosure of
personal data by allocating access privileges based on employment positions and responsibilities.
• Compliance: The policy assists SIH in meeting regulatory obligations pertaining to access control, such as the need to put access controls in place
to safeguard personal information in accordance with data protection regulations. SIH establishes its credibility and reputation as a reliable
company by proving compliance with industry norms and laws.
Reasoning
• Comprehensive Security Framework: To manage information security risks and safeguard SIH's information assets, a thorough framework is
provided by the information security policy. The policy guarantees a comprehensive approach to security management by covering many security
domains, such as risk management, governance, compliance, and incident response.
• Risk Management: The policy lays out procedures for locating, evaluating, and reducing risks related to information security. SIH can manage
security risks proactively and stop security incidents and breaches by carrying out routine risk assessments and putting in place the necessary
measures.
• Security Awareness: By outlining security roles and expectations, the policy fosters a culture of security awareness and accountability among
staff members, subcontractors, and students. The policy gives stakeholders the tools they need to improve the security posture of the company
by offering guidelines on security best practices, training needs, and reporting protocols.
• Continuous Improvement: The policy contains guidelines for information security processes and controls that are monitored, reviewed, and
improved continuously. SIH can improve its security posture and resilience over time by routinely assessing the efficacy of security measures and
making adjustments in response to changing threats and vulnerabilities.
In summary, the designed security plan for Sigma Institute of Health integrates physical, virtual, and policy elements to establish a multi-layered
defense against security threats. By implementing a combination of access controls, surveillance systems, encryption technologies, network
security measures, and comprehensive security policies, SIH strengthens its overall security posture, mitigates risks, and protects its information
assets, infrastructure, and stakeholders from potential security breaches and disruptions.
Analyzing the Sigma Institute's envisioned ISMS critically in comparison to important global
standards
o Alignment with ISO/IEC 27001: Using the ISO/IEC 27001 framework guarantees a thorough approach to information security by methodically
handling risks.
o Risk Management: To lessen vulnerabilities and possible threats, the proposed ISMS includes comprehensive risk assessment and management
procedures.
o Comparison: NIST and other frameworks offer strong methodology, but ISO/IEC 27001 offers an organized approach to risk management. But
the international recognition of ISO/IEC 27001 lends legitimacy.
o Regulatory Compliance: The ISMS will assist Sigma Institute in adhering to pertinent data protection laws, including the Computer Crimes Act
and the Sri Lankan Personal Data Protection Act.
o Audit Readiness: By preparing the company for external audits and inspections, an ISO/IEC 27001 certified ISMS builds stakeholder trust and
credibility.
Downloaded by Hishma Izamy (hishmaaa.i@gmail.com)
lOMoARcPSD|52531729
o Comparison: While ISO/IEC 27001 emphasizes compliance, COBIT offers a more comprehensive governance framework by concentrating more
on IT governance.
3. Structural Adjustment
o Business Continuity and Disaster Recovery: The ISMS has a disaster recovery plan in place to guarantee both business continuity and a prompt
recovery from catastrophes.
o Incident Response: Strictly specified incident management protocols allow for efficient handling and impact-minimization of security incidents.
o Comparison: The NIST framework offers comprehensive incident response rules, improving operational resilience, whereas ISO/IEC 27001
requires business continuity planning.
o Reputation management: Showing a dedication to information security increases stakeholders' trust in the institution's ability to safeguard
confidential data, including employees and students.
o Competitive Advantage: A strong ISMS can set an institution apart and draw in additional partners and students because of their confidence in
the security measures in place.
o Comparison: While ISO/IEC 27001 and COBIT both increase stakeholder confidence, ISO/IEC 27001 may have a greater competitive advantage
due to its international certification.
o Resource Optimization: The ISMS can result in a more effective use of resources by streamlining security procedures and minimizing effort
duplication.
o Cost Avoidance: By averting data breaches and other security disasters, the organization can save a substantial amount of money on repairs,
fines, and reputational harm.
o Initial Costs: Investing in technology, training, and possibly outside consulting can be costly when establishing an ISMS.
· Resource-intensive: Staff time and effort are needed to implement and maintain an ISMS, which might be difficult for an institution with little
funding.
o Comparison: Frameworks such as NIST can be adopted gradually, thereby lowering upfront costs, but ISO/IEC 27001 has substantial beginning
costs.
o Complex Processes: The precise and structured nature of ISO/IEC 27001 can lead to complexity, which can slow down operations by making
processes laborious.
o Administrative Overhead: Upholding ISMS standards compliance may result in more administrative labor, which could tax staff members.
o Comparison: COBIT's governance-focused approach can potentially add complexity, but if properly integrated, it offers a strategic perspective
that could reduce procedures.
3. Opposition to Change
o Cultural Barriers: Employees and students may object to the adjustments needed to follow the new security rules and guidelines, which could
result in resistance and non-compliance.
o Training Requirements: It might be difficult and time-consuming to make sure that all stakeholders have received the necessary training on the
ISMS procedures.
o Comparison: NIST's adaptable methodology, which permits a more gradual adoption compared to ISO/IEC 27001's inflexible framework, may
lessen resistance to change.
o Changing Threats: Cyber threats are ever-evolving, necessitating constant awareness and adaptation on the part of the ISMS to meet emerging
vulnerabilities.
o False Sense of Security: Relying too much on the ISMS may cause stakeholders to become complacent and think that the ISMS is enough to
minimize all threats.
o Comparison: When compared to ISO/IEC 27001, NIST's focus on adaptive measures and ongoing improvement offers a more dynamic approach
to developing risks.
Strict risk assessment and Reduced start-up expenses improves the ISMS's strategic
control and simpler incremental alignment with corporate
adoption objectives
Ideal for changing threat Enhances ISO/IEC 27001
Stakeholder confidence and environments
legal compliance
Disadvantages high starting costs and primarily created for US- A wide scope may result in
intricacy based companies complexity.
References
Institution for British Standards (BSI). (2023). The PDCA cycle is Plan-Do-Check-Act. taken
from the pdca-cycle page at https://asq.org/quality-resources
TUV SUD. May 18, 2023. A Comprehensive Guide to the Information Security Management
System (ISMS). Information security management was taken from
https://www.tuvsud.com/en/services/auditing-and-system-certification
ISACA, 2018. Information security with COBIT 5. Association for Information Systems Audit
and Control.
2020: NIST, the National Institute of Standards and Technology. ISO/IEC 27001 and the
NIST Cybersecurity Framework are compared.
ISACA (2019). The introduction and methodology of the COBIT 2019 framework. Association
for Information Systems Audit and Control.
NIST, 2018. National Institute of Standards and Technology, Framework for Improving
Critical Infrastructure Cybersecurity, Version 1.1.