ISO/IEC 27000-series

ISO/IEC 27002: Complete Guide for Information Security Management

ISO/IEC 27002 is a comprehensive international standard that provides guidelines for organizational information security standards and information security management practices. It is designed to help organizations implement, maintain, and improve information security controls and processes. The standard is structured to support the implementation of ISO/IEC 27001 by providing best practice recommendations for information security management.

Key Components of ISO/IEC 27002

  1. Introduction:
    • Purpose: Provides an overview of the standard, its objectives, and its relationship with ISO/IEC 27001.
    • Structure: Outlines the structure of the document and the approach taken to present the information security controls.
  2. Scope:
    • Applicability: Specifies the applicability of the standard to all types of organizations, regardless of size, industry, or sector.
  3. Normative References:
    • ISO/IEC 27000: Refers to the ISO/IEC 27000 standard for terms and definitions used throughout ISO/IEC 27002.
  4. Terms and Definitions:
    • Common Terms: Provides definitions for key terms and concepts used in the standard to ensure a common understanding.

Structure and Content

The main body of ISO/IEC 27002 is organized into 14 security control clauses, each containing several control objectives and controls. These controls are best practice recommendations that organizations can adopt based on their specific risk environment.

  1. Clause 5: Information Security Policies:
    • Management Direction: Ensures the organization has a set of policies for information security, reviewed and approved by management.
  2. Clause 6: Organization of Information Security:
    • Internal Organization: Establishes a framework for managing information security within the organization.
    • Mobile Devices and Teleworking: Provides guidance on securing mobile devices and teleworking environments.
  3. Clause 7: Human Resource Security:
    • Prior to Employment: Ensures that security responsibilities are addressed before employment.
    • During Employment: Maintains security awareness and training throughout the employment period.
    • Termination or Change of Employment: Manages security aspects when employment is terminated or changed.
  4. Clause 8: Asset Management:
    • Responsibility for Assets: Ensures assets are identified and assigned to responsible individuals.
    • Information Classification: Classifies information to ensure it receives an appropriate level of protection.
    • Media Handling: Provides guidelines for the handling, storage, and disposal of information-bearing media.
  5. Clause 9: Access Control:
    • Business Requirements: Restricts access to information based on business needs.
    • User Access Management: Manages user access rights and responsibilities.
    • User Responsibilities: Ensures users understand and comply with their access control responsibilities.
    • System and Application Access Control: Controls access to systems and applications.
  6. Clause 10: Cryptography:
    • Cryptographic Controls: Provides guidelines for the use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of information.
  7. Clause 11: Physical and Environmental Security:
    • Secure Areas: Protects physical areas that house critical or sensitive information.
    • Equipment Security: Ensures the secure use and maintenance of equipment.
  8. Clause 12: Operations Security:
    • Operational Procedures: Establishes and maintains secure operational procedures.
    • Protection from Malware: Protects against malware and other malicious software.
    • Backup: Ensures that backup copies of information are maintained.
    • Logging and Monitoring: Monitors and logs events to detect and respond to incidents.
    • Control of Operational Software: Controls the installation of software on operational systems.
    • Technical Vulnerability Management: Manages technical vulnerabilities.
    • Audit Considerations: Ensures systems are audited to verify their security status.
  9. Clause 13: Communications Security:
    • Network Security Management: Ensures the security of networks and the protection of information in networks.
    • Information Transfer: Protects information transferred within and outside the organization.
  10. Clause 14: System Acquisition, Development, and Maintenance:
    • Security Requirements: Ensures that security is considered in system acquisition, development, and maintenance.
    • Security in Development and Support Processes: Manages security in the development lifecycle.
    • Test Data: Protects test data used in development environments
  11. Clause 15: Supplier Relationships:
    • Information Security in Supplier Relationships: Manages security risks related to suppliers.
    • Supplier Service Delivery Management: Monitors and manages supplier services.
  12. Clause 16: Information Security Incident Management:
    • Incident Management Responsibilities and Procedures: Establishes a framework for managing information security incidents.
    • Reporting Information Security Events: Ensures incidents are reported in a timely manner.
    • Management of Information Security Incidents and Improvements: Manages and improves the incident response process.
  1. Clause 17: Information Security Aspects of Business Continuity Management:
  • Information Security Continuity: Ensures the continuation of information security during adverse situations.
  • Redundancies: Implements redundancies to ensure information availability.
  1. Clause 18: Compliance:
  • Legal and Contractual Requirements: Ensures compliance with legal, regulatory, and contractual requirements.
  • Information Security Reviews: Conducts reviews to ensure the effectiveness of the ISMS.

Implementation and Usage

  • Adaptability: Organizations can adapt the controls recommended by ISO/IEC 27002 to their specific needs and context.
  • Control Selection: Organizations should select controls based on their risk assessment and risk treatment plan.
  • Continuous Improvement: Encourages a culture of continuous improvement in information security practices.

Benefits of ISO/IEC 27002

  • Best Practices: Provides a comprehensive set of best practices for information security management.
  • Risk Management: Enhances the organization’s ability to manage information security risks.
  • Compliance: Supports compliance with various legal, regulatory, and contractual requirements.
  • Trust: Builds trust with customers, stakeholders, and partners by demonstrating a commitment to information security.
  • Operational Efficiency: Improves operational efficiency by integrating security practices into business processes.

ISO/IEC 27002 is a valuable resource for organizations seeking to enhance their information security posture by providing practical guidance on implementing effective security controls and practices.

Discover more from Cyber Risk Countermeasures Education (CRCE)

Subscribe now to keep reading and get access to the full archive.

Continue reading