An ISMS is a systematic approach to managing sensitive company information so that
it remains secure. It includes people, processes and IT systems by applying a risk
management process.
An ISO 27001 information security management system is a systematic and pro-active
approach to effectively managing risks to the security of your company’s confidential
information. The system promotes efficient management of sensitive corporate information,
highlighting vulnerabilities to ensure it is adequately protected against potential
threats. It encompasses people, process and IT systems.
Like other ISO management system standards, certification to ISO/IEC 27001 is possible
but not obligatory. Some organizations choose to implement the standard in order
to benefit from the best practice it contains while others decide they also want
to get certified to reassure customers and clients that its recommendations have
been followed. ISO does not perform certification.
Information is an asset which, like other important business assets, has a value
to an organization and consequently needs to be suitably protected. This standard
helps organization to coordinate all security efforts both electronically and physically,
coherently, cost effectively and with consistency and prove to potential customers
that you take the security of their personal / business information seriously. The
main benefits include:
- Cost reductions due to avoiding incidents
- Smoother running operations as responsibilities and processes are clearly defined
- Improved business image in the marketplace – customers have peace of mind that the
company is trustworthy
- Working with a trustworthy provider maintains the company’s own integrity to the
safeguarding of its data
- Installs confidence further down the supply chain resulting in stronger customers
/ supplier relationships
ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating,
monitoring, reviewing, maintaining and improving a documented Information Security
Management System within the context of the organization's overall business risks.
It specifies requirements for the implementation of security controls customized
to the needs of individual organizations or parts thereof.ISO/IEC 27001:2005 is
designed to ensure the selection of adequate and proportionate security controls
that protect information assets and give confidence to interested parties.ISO/IEC
27001:2005 is intended to be suitable for several different types of use, including
the following:
- use within organizations to formulate security requirements and objectives;
- use within organizations as a way to ensure that security risks are cost effectively
managed;
- use within organizations to ensure compliance with laws and regulations;
- use within an organization as a process framework for the implementation and management
of controls to ensure that the specific security objectives of an organization are
met;
- definition of new information security management processes;
- identification and clarification of existing information security management processes;
- use by the management of organizations to determine the status of information security
management activities;
- use by the internal and external auditors of organizations to determine the degree
of compliance with the policies, directives and standards adopted by an organization;
- use by organizations to provide relevant information about information security
policies, directives, standards and procedures to trading partners and other organizations
with whom they interact for operational or commercial reasons;
- implementation of business-enabling information security;
- use by organizations to provide relevant information about information security
to customers.
- Information security management system
- Management responsibility
- Internal ISMS audit
- Management review of the ISMS
- ISMS improvement
|