Implementing Bs7799-2:2002

  • Uploaded by: kalpeshdoshi
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Implementing Bs7799-2:2002 as PDF for free.

More details

  • Words: 759
  • Pages: 15
Implementing BS7799-2:2002

Kalpesh Doshi Feb 2001

WHAT IS BS7799 ? 





Aim • Build on a Common Basis for Organisational Security Standards Development • Enhance Security Management Practice • Increase Confidence and Trust in Inter-Organisational Dealings Defines • Desired Best Practice Methods for Controlling (Protecting) Information a. Confidentiality b. Integrity c. Availability Consists of Two Parts • Part 1 – Code of Practice for Information Security Management • Part 2 – Specification for Information Security Management Systems

Benefits of BS7799 Certification   

    

 

Improved security throughout the organisation Improved security planning Demonstrates company’s commitment in protecting information Security management effectiveness Ongoing protection over Information Less risk when dealing with partners Improved e-commerce security Improved customer, employee and partner confidence More realistic and manageable auditing Reduced liability over information

C I A Traid

Approach to Implement ISMS

Activities to establish ISMS 

Plan • • • • •

  







Define the ISMS Scope Define the ISMS Policy Identify and Assess the Risk Select Control Objectives and controls for treatment of risk Prepare Statement of Applicability

Check Execute incident and handling Regularly review the ISMS effectiveness Review the level of residual risk and acceptable risk Conduct ISMS audits at regular intervals

Do •

Formulate and implement Risk Treatment Plan Implement Controls selected to meet the control objectives





ACT • • • •

Implement and identify improvements in the ISMS Take appropriate corrective and preventive actions Communicate the results and actions taken Ensure that the improvements achieve their objectives

ISO 17799 Structure 1. 2. 3. 4. 5.

Security Policy Security Organization Asset Classification Personnel Security Physical & Environmental Security 36 Control Objectives

1.

2.

3.

4.

5.

Communications and operations management Access Control Security System development maintenance Business Continuity Planning Compliance 127 Controls

What is BS 7799? BS 7799 is a standard setting out the requirements for an Information Security Management System. It helps identify, manage and minimize the range of threats to which information is regularly subjected. Annex A of BS 7799 identifies 10 controls: 











 





Security policy - This provides management direction and support for information security Security Organization - To help you manage information security within the organization Asset classification and control - To help you identify your assets and appropriately protect them Personnel security - To reduce the risks of human error, theft, fraud or misuse of facilities Physical and environmental security - To prevent unauthorized access, damage and interference to business premises and information Communications and operations management - To ensure the correct and secure operation of information processing facilities Access control - To control access to information Systems development and maintenance - To ensure that security is built into information systems Business continuity management - To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters Compliance - To avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations, and any security requirement

Steps for BS7799-2:2002 Certification 

  

 

Step1: Define the organizations information security policy Step 2: Define the scope of the ISMS Step 3: Conduct risk assessment Step 4: Develop risk management strategy Step 5: Selection of the controls Step 6: Statement of applicability

Steps………. 



   

  

Conduct current state assessment of IS security Define Security Policies and detailed procedures Conduct Risk Assessment Develop Risk Treatment Plan Implement Controls , Security policies Develop Business Continuity Plan for IT systems Conduct Security awareness workshops Conduct Internal security audits Prepare for Certification Audit

Challenges 

Management Commitment

• IT security is not a One time activity, it is about creating a Security Culture in the organization



Budget

• Budget approved only on event of security breach



User Awareness and adoption

• Information security is more than just technological fixes. At the end of the day, the weakest link is always about people



Security Challenges

• Technology and threat are increasing at a alarming rate

So How do we address the above concerns?

Security Trends

Requirements   



  

Management commitment Ongoing process, cannot be one time activity Consultant who Understand your business processes Working with your team to refine issues and concerns Develop and implement measurable Action Plan Knowledge and Skill of your Security resources Professionals with integrated background of information systems and financial auditing

BS7799-2:2002 Certification

THANK YOU Q&A

Related Documents

Implementing Strategy
November 2019 25
Implementing 5s
November 2019 18
Implementing Itil
May 2020 9
Implementing Agile
October 2019 23
Implementing Gis
April 2020 13
Implementing Tqm
May 2020 9

More Documents from "Gabriel"