IT ISMS Workshop
IT ISMS Workshop
AGENDA
Rising security
threats, incidents
Need for
Information
Explosion
Need to
demonstrate higher
assurance to key
stake holders
An Information
Security
Information Security Management
Management
Enterprise today manages terabytes and
system enables
peta bytes of data
an organization to
Information exists in many forms including
databases, physical documents, electronic
implement a
files
process driven
Protection is a complex task
approach towards
consistent results
& improvements
Need to demonstrate that business
process integrity is protected
Need to demonstrate that organization has
adopted global best practices
Increased accountability for security
* As of November-2011 (http://www.iso27001certificates.com/)
What is Information?
Information is an asset which, like other important business assets, has
value to the organization and consequently needs to be suitably protected.
Information assets are not limited to computers and hard disks.
They can be in any form..
Information Overview
Information Security
is more than
IT security
Information Risk
Information Assets are susceptible to risks which can impact confidentiality, integrity and/or
availability, impacting business operations
Information Overview
Availability
Information
Printed
Electronic
Written
Spoken
Stored
Discarded
Integrity
Confidentiality
Stealing of classified
documents
Loss of laptops
Social Engineering attacks
Phishing
Information Leak
Network Attacks
Unrestricted access
User Error
Theft
Information SecurityHuman
Management
System
Resource Security
Physical & Environment Security
Communication & Operation Management
Information System Acquisitions,
Development, Maintenance
Access Control
Information Security & Incident
Management
Business Continuity Management
Compliance
Domains 11
Control Objectives 39
Controls -- 133
Asset
Paper Documents
Configuration Files
(Routers, Switches etc)
Risk
Unauthorized Access
Tampering
Reason
Controls
Lack of Classification
Guidelines
Data Classification
Policy
Absence of Shredders
Install Shredders
Loss of data
Environmental hazards
Implementation of
redundancy of data
storage systems.
(Backup Management)
Benefits
Kahramaa Implementation
Scope Diagram
Phase-I
Phase-II Implementation
Phase-III
Phase-IV
Kahramaa
Project
Initiation and
System
Study
Risk
Assessment
& Risk
Treatment
Policy &
Procedure
Development
Implementation
Support &
Knowledge
Transfer
ISMS Implementation
Phase-V
Internal Audit
ISO 27001
Certification
Kahramaa Implementation
Kahramaa Implementation
Network Administrator Client Support &
Netwroks
System Analyst System Support
Phase-I & II
Kahramaa Implementation
Phase-III & IV
Phase-V
Work completed
System study
Scope finalization
Identification of SPOCs
Interviews with sections & units within scope
What is next?
Asset collection
Risk assessment methodology
Risk assessment
Security Testing (Vulnerability Assessment & Penetration Testing)
Risk treatment
SOA
&
Thank You..!!!