ISO 27001 Policies And Procedures | ISMS Documentation Guide

by Benson Thomas

Introduction

Have you ever questioned how sensitive information of an organization never finds its way into the hands of cyber threats, the answer would always simply come down to one aspect good governance that is backed by clear policies and procedures. That is the very thing about the ISO 27001 (International standard of Information Security Management Systems (ISMS)). The ISO 27001 may not be an amiable solution yet at the end of it all it is a methodical way of ensuring that information of your company is secured.

ISO 27001 Policies and Procedures | ISMS Documentation Guide

The relevance Of Policies And Procedures In ISO 27001.

Take ISO 27001 as the rule book as far as information security is concerned. Nevertheless, the installation of the firewalls and antivirus software is not the only thing that is significant, but also a security culture within an organization. Policies and procedures make complex security goals into daily undertakings that the employees can do. 

ISO 27001 Policies and Procedures | ISMS Documentation Guide

Policies Of Core ISO 27001 That You Need.

The ISO 27001 does not specify the list of documents that should be universal and include all of them, yet there are several policies that are supposed to be possessed by all certified organizations. Let's look at the major ones:

1. The policy of information security.
This document forms the basis of your ISMS. It identifies the overall commitment that your organization has to information protection. It includes:

    • Your security work regarding purpose and scope.

    • Conformity by the management.

    • Top level goals, such as, having confidentiality, integrity and data availability.

      It dictates the sense of security in the entire business - just like a business mission statement except that it is all about information protection.

2. Access Control Policy
Access control is interested in the fact that right people must receive access to right information at the right time. This policy is a specification in the handling of access to information within the organization. A good access control policy does not only protect information.

3. Asset Management Policy
The data is not only stored in the databases but also in the laptops, servers, USB drives and occasionally even in the paper files. All the information will be identified using the asset management policy. 

4. Risk Management Policy
Every business is threatened, phishing, system failures. This policy outlines how your organization identifies, evaluates and addresses information security risks.
Typical steps include:

    • Risk assessment.

    • Assigning risk ownership

    • Installing risk mitigation controls.

    • Risk register review and update.

The ISO 27001 certification is highly concerned with demonstrating a procedural approach of risk management.

5. Incident Management Policy
In spite of the best controls, there are incidences that are taking place. The speed and efficiency of response is the most significant aspect.

This policy explains:

    •  Detection and notification of an incident.

    •  Roles and responsibilities of incident.

    • Containment, investigation and resolution.

    •  Lessons learnt and follow-ups.

In place of this, the damage is reduced to a minimum, trust is maintained and legal and contractual requirements are followed.

6. Disaster Recovery Policy and Business Continuity.
Take the case of a data centre crash, ransomware or natural disaster. What is the survival of your business? It is in this that this policy comes in.
It covers:

    • Restoring and recovery procedures.

    • Emergency communications.

    • Adjustable hours of work.

    • Continuity plans: Testing and updating.

This policy ensures resilience - the ability to be able to return and resume business despite the situation.

7. Supplier Security Policy
Many businesses outsource IT, cloud or data processing to third parties. This policy provides a guideline on how you can approach your suppliers in order to ensure that they are at the same level as you are as far as security is concerned. It entails conducting due diligence before the vendor is taken in and regular assessment after that. 

8. Acceptable Use Policy
It is also the manual which the employees refer to on a daily basis when they are using the company devices, either email or the internet. It helps in preventing maltreatment and unintentional security violations.

It might cover:

    • Processes of company software and hardware usage.

    • Restriction of downloading unlawful applications.

    • Best practices of data sharing and email.

A friendly and well-written acceptable use policy can go a long way to help avoid security mishaps.

9. Data Protection Policy and Cryptography.
Cryptography is used to encrypt and regulate data in transit and data at rest. In this policy, the creation, handling and revocation of encryption keys is explained. It is also a promise of compliance with privacy laws like the GDPR and a trust building action as sensitive data.

Essential ISO 27001 Procedures

The intention is policies whereas the means is procedures. The ISO 27001 compliance is made easier by the following procedures that are mandatory:

1. Risk Evaluation and Management Process.
The process will guide groups on how to identify the threats, identify the risks, and choose the relevant controls. It usually results in two significant documents, the Risk Assessment Report and the Statement of Applicability (SoA), which are also necessary for certification.

2. Record Control Procedure Document and Record Control Procedure.
ISO 27001 is big on documentation. This process defines the process of creation, approval, revision and archiving of documents. It is applied to ensure that everybody is always operating with the latest version of any policy or record.

3. Internal Audit Procedure Auditing helps to make your ISMS healthy.
This process will outline how an audit planning and performance is done, reporting and ensuring that corrective measures are taken. It is not fingers pointing, it is continuous improvement.

4. Corrective Action Procedure.
It should be applied when something is wrong, there was a nonconformity, a control was not made, or an audit failed, this is done to ensure that this problem is properly investigated, the root cause is located, and the cure successfully implemented.

5. Awareness Procedure and Training.
 Without intelligent people, the best systems will not perform well. It will ensure that all the employees are aware of their role when it comes to information security.

ISO 27001 Policies and Procedures | ISMS Documentation Guide

Conclusion

In the era where the violations of data are announced almost every day, ISO 27001 offers organizations a proven framework to become resilient. Policies and procedures are not just a bureaucratic requirement, but it is the blood that flows in your information security system. They bring sanity, uniformity and responsibility. Of greatest importance, they help organizations to demonstrate to clients, partners and regulators that security is not an after-thought, but rather a promise.