Implementing BS7799-2:2002
Kalpesh Doshi Feb 2001
WHAT IS BS7799 ?
Aim • Build on a Common Basis for Organisational Security Standards Development • Enhance Security Management Practice • Increase Confidence and Trust in Inter-Organisational Dealings Defines • Desired Best Practice Methods for Controlling (Protecting) Information a. Confidentiality b. Integrity c. Availability Consists of Two Parts • Part 1 – Code of Practice for Information Security Management • Part 2 – Specification for Information Security Management Systems
Benefits of BS7799 Certification
Improved security throughout the organisation Improved security planning Demonstrates company’s commitment in protecting information Security management effectiveness Ongoing protection over Information Less risk when dealing with partners Improved e-commerce security Improved customer, employee and partner confidence More realistic and manageable auditing Reduced liability over information
C I A Traid
Approach to Implement ISMS
Activities to establish ISMS
Plan • • • • •
Define the ISMS Scope Define the ISMS Policy Identify and Assess the Risk Select Control Objectives and controls for treatment of risk Prepare Statement of Applicability
Check Execute incident and handling Regularly review the ISMS effectiveness Review the level of residual risk and acceptable risk Conduct ISMS audits at regular intervals
Do •
Formulate and implement Risk Treatment Plan Implement Controls selected to meet the control objectives
•
ACT • • • •
Implement and identify improvements in the ISMS Take appropriate corrective and preventive actions Communicate the results and actions taken Ensure that the improvements achieve their objectives
ISO 17799 Structure 1. 2. 3. 4. 5.
Security Policy Security Organization Asset Classification Personnel Security Physical & Environmental Security 36 Control Objectives
1.
2.
3.
4.
5.
Communications and operations management Access Control Security System development maintenance Business Continuity Planning Compliance 127 Controls
What is BS 7799? BS 7799 is a standard setting out the requirements for an Information Security Management System. It helps identify, manage and minimize the range of threats to which information is regularly subjected. Annex A of BS 7799 identifies 10 controls:
Security policy - This provides management direction and support for information security Security Organization - To help you manage information security within the organization Asset classification and control - To help you identify your assets and appropriately protect them Personnel security - To reduce the risks of human error, theft, fraud or misuse of facilities Physical and environmental security - To prevent unauthorized access, damage and interference to business premises and information Communications and operations management - To ensure the correct and secure operation of information processing facilities Access control - To control access to information Systems development and maintenance - To ensure that security is built into information systems Business continuity management - To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters Compliance - To avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations, and any security requirement
Steps for BS7799-2:2002 Certification
Step1: Define the organizations information security policy Step 2: Define the scope of the ISMS Step 3: Conduct risk assessment Step 4: Develop risk management strategy Step 5: Selection of the controls Step 6: Statement of applicability
Steps……….
Conduct current state assessment of IS security Define Security Policies and detailed procedures Conduct Risk Assessment Develop Risk Treatment Plan Implement Controls , Security policies Develop Business Continuity Plan for IT systems Conduct Security awareness workshops Conduct Internal security audits Prepare for Certification Audit
Challenges
Management Commitment
• IT security is not a One time activity, it is about creating a Security Culture in the organization
Budget
• Budget approved only on event of security breach
User Awareness and adoption
• Information security is more than just technological fixes. At the end of the day, the weakest link is always about people
Security Challenges
• Technology and threat are increasing at a alarming rate
So How do we address the above concerns?
Security Trends
Requirements
Management commitment Ongoing process, cannot be one time activity Consultant who Understand your business processes Working with your team to refine issues and concerns Develop and implement measurable Action Plan Knowledge and Skill of your Security resources Professionals with integrated background of information systems and financial auditing
BS7799-2:2002 Certification
THANK YOU Q&A