top of page

ISO 27001 - Annex A: Organisational Controls Explored

Understanding ISO 27001:2022 Annex A Section 5 - Organisational Controls


The ISO 27001:2022 standard is an internationally recognised framework for managing information security risks.


Annex A of this standard contains comprehensive controls that help organisations manage and mitigate risks effectively.


Section A.5 of Annex A focuses on the ISO 27001 Organisational Controls, essential for establishing a secure information security environment.


This article will delve into each control from A.5.1 to A.5.37, discussing their purpose and how organisations can meet them.

 

5.1 Policies for Information Security


Purpose

The requirement for policies for information security is foundational in establishing a structured approach to managing information security within an organisation. This control emphasises the need for a formal, documented information security policy that outlines the organisation's approach to managing its information security risks.


The policy serves as a high-level directive from management, setting the tone for the entire organisation regarding the importance of protecting information assets. It should articulate the organisation's commitment to maintaining the confidentiality, integrity, and availability of information.


Additionally, topic-specific policies might be required to address specific areas such as data classification, incident management, and access control, ensuring that all aspects of information security are addressed comprehensively.


Implementation

An organisation should first engage senior management to draft and approve the primary information security policy to implement this control. This policy should be aligned with the organisation’s strategic goals and legal obligations.


Once approved, the policy should be communicated across all levels of the organisation to ensure awareness and understanding.


Employees and relevant stakeholders should acknowledge receipt and understanding of the policy to ensure accountability.


The organisation should also develop additional, topic-specific policies to address particular risk areas. These policies should be reviewed regularly or when significant changes occur, ensuring they remain relevant and effective in managing emerging threats.



 

5.2 Information Security Roles and Responsibilities


Purpose

Clearly defining and assigning information security roles and responsibilities ensures that all aspects of information security are managed appropriately within the organisation. This control is crucial for establishing accountability and ensuring that specific tasks related to information security are performed by individuals with the appropriate authority and expertise.


Without clearly defined roles and responsibilities, security tasks can be overlooked or mishandled, leading to vulnerabilities in the organisation's security posture.


Implementation

To meet this requirement, an organisation should thoroughly analyse its information security

needs and the associated roles required to meet those needs.


Each role should have clear responsibilities, authority levels, and reporting structures. The organisation should document these roles within job descriptions, organisational charts, and security policies.


Training should be provided to individuals in these roles to ensure they have the necessary skills and knowledge.


Additionally, a system of checks and balances should be implemented to ensure these responsibilities are fulfilled, and regular audits should be conducted to confirm compliance with the defined roles and responsibilities.

 

5.3 Segregation of Duties


Purpose

The segregation of duties is a critical control that reduces the risk of errors and fraud by dividing responsibilities among individuals. This principle ensures that no single individual controls all aspects of a critical process, which could lead to abuse or oversight.


For example, separating the roles of initiating a transaction, authorising it, and reviewing it helps prevent conflicts of interest and ensures that errors or malicious activities are more likely to be detected.


Implementation

Organisations can implement this control by identifying critical processes that require segregation of duties, such as financial transactions, system administration, and data processing.


Once identified, responsibilities should be divided among different personnel to ensure no single person has undue control. For instance, in financial management, one person might be responsible for initiating transactions, another for approving them, and a third for auditing them.


The organisation should document these segregated duties in policies and procedures and train employees.


Regular reviews and audits should be conducted to ensure that duties are segregated and that no single individual performs conflicting tasks.

 

5.4 Management Responsibilities


Purpose

This control emphasises the role of management in fostering a culture of information security throughout the organisation.


Management's commitment is crucial for ensuring that information security policies and procedures are followed consistently.


This control ensures that information security is integrated into the organisation's overall management framework and that employees are aware of and comply with security requirements by holding management accountable.


When management actively promotes information security, it sets a precedent for the entire organisation and reinforces the importance of safeguarding information assets.


Implementation

To implement this control, management should actively develop and promote the organisation’s information security policies. This includes ensuring that all employees know the policies and understand their importance.


Management should regularly communicate the organisation's commitment to information security through meetings, training sessions, and internal communications.


Additionally, management should establish monitoring and reporting mechanisms to track compliance with security policies.


Any non-compliance or security breaches should be addressed promptly, with corrective actions taken as necessary. By leading by example and consistently reinforcing the importance of information security, management can create a culture where security is a top priority.

 

5.5 Contact with Authorities


Purpose

Establishing and maintaining contact with relevant authorities is essential for ensuring an organisation can respond effectively to security incidents, especially those requiring legal intervention or regulatory reporting. This control recognises that some security incidents may have legal implications or require coordination with law enforcement, regulatory bodies, or other governmental agencies.


By maintaining a proactive relationship with these authorities, an organisation can ensure that it is prepared to act swiftly and in compliance with legal requirements when an incident occurs.


Implementation

To implement this control, an organisation should first identify the relevant authorities to contact in case of a security incident. This may include local law enforcement, national cybersecurity agencies, industry regulators, and other governmental bodies.


The organisation should establish communication protocols and ensure key personnel know how and when to contact these authorities.


Regularly updating contact information and reviewing procedures will ensure the organisation can quickly and effectively engage with authorities when needed. Participating in information-sharing initiatives or joint exercises with these authorities may also strengthen the relationship and improve readiness.

 

5.6 Contact with Special Interest Groups


Purpose

Maintaining relationships with special interest groups, security forums, or professional associations provides an organisation with the latest information on security trends, threats, and best practices. This control underscores the importance of staying informed about the evolving threat landscape and leveraging external expertise to enhance the organisation's security posture.


By engaging with these groups, an organisation can gain insights into emerging risks, benefit from shared experiences, and adopt best practices that have been proven effective in similar environments.


Implementation

To implement this control, the organisation should identify relevant special interest groups, forums, and professional associations that align with its industry and security needs.


Designate individuals within the organisation to participate in these groups, attend meetings, and engage in discussions. The information gathered from these groups should be regularly shared within the organisation and used to inform security policies, procedures, and risk assessments.


Additionally, the organisation can contribute to these groups by sharing its experiences and challenges, fostering a collaborative environment where members benefit from collective knowledge and expertise.

 

5.7 Threat Intelligence


Purpose

Collecting and analysing threat intelligence is critical for staying ahead of potential security threats. This control focuses on the need for organisations to actively gather information about emerging threats, vulnerabilities, and attack vectors.


By understanding the threat landscape, organisations can anticipate potential attacks, strengthen their defences, and respond more effectively to incidents.


Threat intelligence allows organisations to be proactive rather than reactive, reducing the likelihood of successful attacks.


Implementation


Organisations should establish processes for collecting threat intelligence from various sources, including internal monitoring systems, industry reports, security vendors, and public threat intelligence platforms. This intelligence should be analysed to identify patterns, trends, and threats that could impact the organisation.


The findings should be integrated into the organisation's risk management process and used to update security controls, policies, and procedures.


Regularly disseminating threat intelligence to relevant personnel ensures that everyone knows the latest threats and how to mitigate them.

 

5.8 Information Security in Project Management


Purpose

Integrating information security into project management ensures that security considerations are addressed throughout the lifecycle of a project, from planning to execution and closure. This control is vital because projects often introduce new systems, processes, or changes that can impact the organisation's security posture.


By embedding security into project management, organisations can prevent the introduction of vulnerabilities and ensure that new initiatives are secure from the outset.


Implementation

Organisations should establish guidelines for incorporating security into the project management process to implement this control. This includes conducting security risk assessments during the planning phase, defining security requirements, and integrating these into project objectives.

Project managers should be trained on the importance of information security and how to apply security principles throughout the project lifecycle.


Security reviews should be conducted at key project stages, and any identified risks should be addressed before proceeding.


Organisations can ensure that new projects do not compromise their overall security posture by treating security as a fundamental component of project management.

 

5.9 Inventory of Information and Other Associated Assets


Purpose

Maintaining a comprehensive inventory of information and associated assets is crucial for ensuring that all assets are adequately protected. This control recognises that an organisation cannot protect what it does not know it has.


Cataloguing all assets, including hardware, software, data, and intellectual property, can help an organisation implement appropriate security measures and manage risks effectively.


Implementation

To implement this control, organisations should develop a detailed inventory including all information assets, owners, and security classifications. This inventory should be regularly updated to reflect changes in the asset base, such as the addition of new systems or the decommissioning of old ones.


Asset owners should be responsible for the security of their assets, ensuring that appropriate controls are in place.


The inventory should be accessible to relevant personnel, and regular audits should be conducted to verify its accuracy.


By maintaining an up-to-date inventory, organisations can ensure that all assets are protected and that security measures are proportionate to each asset's value and sensitivity.

 

5.10 Acceptable Use of Information and Other Associated Assets


Purpose

Defining acceptable use policies for information and associated assets helps prevent misuse and ensures all employees understand their responsibilities in protecting organisational resources. This control is essential for setting clear expectations about how information and assets should be used, reducing the risk of accidental or intentional misuse that could lead to data breaches or other security incidents.


Implementation

Organisations should develop and document an acceptable use policy that outlines the appropriate use of information and assets to implement this control. This policy should cover aspects such as the use of company email, internet access, data handling, and physical devices.


Employees should receive training on the acceptable use policy and be required to acknowledge their understanding and agreement to comply.


The organisation should also implement monitoring mechanisms to detect and respond to any violations of the policy.


Regular reviews of the acceptable use policy should be conducted to ensure it remains relevant and effective in addressing emerging risks.

 

5.11 Return of Assets


Purpose

The return of assets control is crucial for safeguarding organisational assets when employees or contractors leave or change roles. This requirement ensures that all assets, such as laptops, mobile devices, data storage devices, and intellectual property, are returned to the organisation when an individual no longer needs them. This control is vital in preventing data loss, theft, or unauthorised access to sensitive information after an individual’s employment or contract ends.


By ensuring that all assets are returned, the organisation can maintain control over its resources and reduce the risk of data breaches.


Implementation

Organisations should establish a formal exit procedure that includes a checklist for returning all organisational assets to implement this control. This checklist should be part of the offboarding process for employees, contractors, and other third parties accessing the organisation’s assets.


The checklist should include all hardware, software, access credentials, and documentation or data. It’s essential to ensure that the return of assets is documented and that returned items are checked to confirm they are intact and free from unauthorised modifications.


The organisation should also revoke any access rights associated with the returned assets to ensure that former employees or contractors can no longer access the organisation’s systems and data.

 

5.12 Classification of Information


Purpose

Information classification is a fundamental control that ensures that data is categorised based on its sensitivity and the level of protection it requires.


By classifying information, organisations can determine the appropriate security controls to protect different data types, such as confidential, internal use only, or public information. This control is critical in ensuring that sensitive information receives the necessary level of protection to prevent unauthorised access, disclosure, or misuse.


Implementation

To implement this control, an organisation should develop a classification scheme that defines the different sensitivity levels for its information.


Each classification level should have corresponding security controls, such as encryption, access controls, and handling procedures. Employees should be trained on the classification scheme and how to apply it to the information they work with.


All information, whether digital or physical, should be labelled according to its classification level to ensure that it is handled appropriately.


Regular audits should ensure that the classification scheme is followed and that classified information is protected according to its assigned level.

 

5.13 Labelling of Information


Purpose

Labelling information according to its classification is essential for ensuring that everyone within the organisation understands how to handle different types of information.


Proper labelling helps prevent the accidental disclosure or misuse of sensitive data by clarifying the required level of protection. This control reinforces the organisation’s information classification scheme by providing a visual or digital cue that guides users in handling the information appropriately.


Implementation


To implement this control, the organisation should develop labelling standards that align with its information classification scheme. These standards should specify how different levels of classified information should be labelled, including physical labels on documents, digital tags in electronic systems, or metadata in files.


Employees should be trained on how to apply and recognise these labels.


The organisation should also implement automated tools, where possible, to assist in labelling digital information based on its classification.


Regular checks should ensure that information is labelled correctly and the labelling process is consistently applied across the organisation.

 

5.14 Information Transfer


Purpose

Information transfer control protects data during transmission, whether transferred within the organisation or to external parties.


The risk of data being intercepted, altered, or lost during transfer is significant, particularly with the increasing use of electronic communication channels. This control ensures that information remains secure and its integrity is preserved during transfer, preventing unauthorised access or disclosure.


Implementation

Organisations should implement secure methods for transferring information, such as encryption for electronic communications and secure couriers for physical documents.


Policies should be established that define acceptable methods of transferring information based on its classification level.


Employees should be trained on these methods and the importance of securing information during transfer.


Additionally, the organisation should implement digital signatures, access controls, and monitoring systems to detect and prevent unauthorised access during the transfer process.


Regular reviews should be conducted to ensure that transfer methods remain secure and effective, particularly as new technologies and threats emerge.

 

5.15 Access Control


Purpose

Access control is a critical component of information security. It ensures that only authorised individuals can access specific information and systems. This control helps prevent unauthorised access, which could lead to data breaches, loss of sensitive information, or disruptions to operations.


Organisations can protect their information assets from internal and external threats by establishing strict access controls.


Implementation

To implement this control, organisations should define access control policies that determine who can access what information based on their role and responsibilities. This involves setting up user accounts with appropriate permissions and implementing technical controls such as passwords, biometrics, or multi-factor authentication (MFA) to enforce these permissions.


Access should be granted on a need-to-know basis, and users should only have the minimum access required to perform their duties.


Regular audits should be conducted to review access rights and adjust them as necessary, particularly when employees change roles or leave the organisation.


Access control systems should also be monitored for signs of unauthorised access attempts, and appropriate actions should be taken in response to any detected incidents.

 

5.16 Identity Management


Purpose

Identity management involves administering user identities and ensuring that they are properly managed throughout their lifecycle—from creation to deactivation. This control ensures access to systems and information is granted only to verified and authorised individuals.


Effective identity management reduces the risk of unauthorised access and helps to maintain the security and integrity of an organisation’s information systems.


Implementation

To implement identity management, organisations should develop a process for managing the lifecycle of user identities, including account creation, role assignment, password management, and deactivation. This process should be automated where possible to reduce the risk of human error and ensure consistency.


The organisation should also implement strong authentication methods to verify user identities, such as MFA. User identities should be regularly reviewed to ensure that only current and authorised users have access to the organisation's systems.


When employees leave or change roles, their identities should be deactivated or adjusted to prevent unauthorised access.

 

5.17 Authentication Information


Purpose

Authentication information, such as passwords, tokens, and biometrics, is a key component of verifying a user's identity before granting access to systems and data.


Proper management of this information is essential for maintaining security, as weak or compromised authentication information can lead to unauthorised access and potential security breaches.


Implementation

Organisations should implement robust policies for creating, storing, and managing authentication information. This includes enforcing strong password policies, requiring regular password changes, and using encryption to protect stored authentication information.


For sensitive systems, MFA should be implemented to provide an additional layer of security.


Employees should be trained to securely create and manage their authentication information, including recognising phishing attempts and other social engineering attacks.


The organisation should also monitor for signs of compromised authentication information and respond promptly to any detected threats, such as requiring password resets or deactivating affected accounts.

 

5.18 Access Rights


Purpose

Access rights management ensures that employees and other stakeholders have appropriate access to information and systems based on their roles and responsibilities. This control is essential for preventing unauthorised access and ensuring that individuals only have access to the information necessary for their job functions.


Proper access rights management helps minimise the risk of data breaches and internal threats.


Implementation

To implement this control, organisations should establish procedures for granting, reviewing, and revoking access rights.


Access rights should be assigned based on the principle of least privilege, meaning users only have the access they need to perform their duties.


Regular reviews should be conducted to ensure that access rights remain appropriate, particularly when an employee changes roles or leaves the organisation.


Automated systems can help streamline the management of access rights, ensuring that changes are promptly and accurately applied.


The organisation should also monitor access rights to detect and respond to anomalies, such as unusual access patterns, that may indicate a potential security breach.

 

5.19 Information Security in Supplier Relationships


Purpose

Managing information security in supplier relationships is crucial as suppliers often access the organisation’s information or systems. This control aims to ensure that the organisation’s security posture is not compromised by third-party suppliers, who may present additional risks if their security practices are not aligned with the organisation’s standards.


By managing these relationships carefully, organisations can mitigate the risks of outsourcing, supply chains, and third-party services.


Implementation

To implement this control, organisations should conduct due diligence when selecting suppliers, assessing their information security practices and ensuring they align with the organisation’s requirements.


Contracts with suppliers should include specific clauses related to information security, such as data protection requirements, access controls, and incident response procedures.


Regular audits and assessments should be conducted to ensure suppliers comply with these requirements.


The organisation should also establish clear communication channels with suppliers to ensure that security issues can be addressed promptly.


If a supplier’s security practices do not meet the organisation’s standards, corrective actions should be taken, or the relationship should be reconsidered.

 

5.20 Addressing Information Security within Supplier Agreements


Purpose

Incorporating information security requirements into supplier agreements ensures suppliers are contractually obligated to adhere to the organisation’s security standards. This control is important for legally binding suppliers to maintain appropriate levels of security when handling the organisation’s information or accessing its systems.


Addressing information security in supplier agreements can protect organisations from potential legal and financial repercussions if a supplier fails to maintain adequate security.


Implementation

To implement this control, organisations should work with their legal teams to develop standard contract clauses that address information security requirements. These clauses should cover data protection, access controls, confidentiality, and incident response.


When negotiating contracts with suppliers, these clauses should be included and agreed upon before any work begins.


Organisations should also ensure a mechanism for monitoring and enforcing compliance with these contractual obligations, such as through regular audits or assessments.


If a supplier fails to meet the agreed-upon security requirements, the organisation should have provisions to address these deficiencies, including potential penalties or contract termination.

 

5.21 Managing Information Security in the ICT Supply Chain


Purpose

The ICT supply chain involves various suppliers and service providers contributing to the organisation’s information technology and communication infrastructure.


Managing information security within this supply chain is crucial because any weakness or breach at any point in the supply chain can compromise the entire organisation’s security. This control focuses on ensuring that all components of the ICT supply chain adhere to the organisation’s security requirements, thereby reducing the risk of supply chain attacks.


Implementation

To implement this control, organisations should first map out their entire ICT supply chain, identifying all suppliers and service providers involved.


Each supplier should be assessed for their security practices, and those that meet the organisation’s security requirements should be approved.


Security requirements should be communicated to suppliers, and contracts should include specific clauses related to supply chain security.


The organisation should also implement continuous monitoring and auditing of the supply chain to detect and address any security issues promptly.


In addition, organisations should collaborate with suppliers to enhance their security posture, providing guidance and support where necessary to ensure that security is maintained throughout the supply chain.

 

5.22 Monitoring, Review and Change Management of Supplier Services


Purpose

Ongoing monitoring and review of supplier services are essential to ensure that suppliers continue to meet the organisation’s information security requirements. This control is important for maintaining the integrity of the organisation’s security posture, particularly as changes in supplier services or practices could introduce new risks.


By regularly reviewing and managing changes in supplier services, organisations can promptly address any security concerns and ensure that suppliers remain compliant with their security obligations.


Implementation

To implement this control, organisations should establish a process for continuously monitoring supplier services, including regular security assessments and audits.


Any changes in supplier services, such as updates to software, changes in personnel, or modifications to service delivery, should be reviewed for potential security implications.


The organisation should work closely with suppliers to manage these changes and ensure that security controls are adjusted to address new risks.


Clear communication channels should be maintained with suppliers to facilitate the timely exchange of information about any changes or security issues.


Additionally, organisations should document all monitoring and review activities to provide an audit trail and support ongoing compliance efforts.

 

5.23 Information Security for the Use of Cloud Services


Purpose

Cloud services introduce unique security challenges, as data and applications are often hosted on third-party platforms outside the organisation’s direct control. This control emphasises the need to establish robust security measures for the acquisition, use, management, and termination of cloud services to ensure that information security is maintained.


By addressing these challenges, organisations can take advantage of the benefits of cloud services while minimising the associated risks.


Implementation

To implement this control, organisations should develop a comprehensive cloud security strategy covering the entire cloud service use lifecycle. This includes assessing the security practices of cloud service providers before engaging them, ensuring that they meet the organisation’s security requirements.


Contracts with cloud providers should include specific security clauses, such as data encryption, access controls, and incident response procedures. The organisation should also implement monitoring tools to track the security of cloud services continuously.


Regular audits and assessments should be conducted to ensure that the cloud service provider is maintaining the required security standards.


When terminating cloud services, the organisation should ensure that all data is securely transferred or deleted and that access to the cloud services is properly revoked.

 

5.24 Information Security Incident Management Planning and Preparation


Purpose

Planning and preparing for information security incidents is essential for ensuring that an organisation can respond quickly and effectively to mitigate the impact of any security breaches. This control focuses on the need for a structured approach to incident management, including defining roles, responsibilities, and processes.


By being well-prepared, organisations can minimise the damage caused by security incidents and recover more swiftly.


Implementation

To implement this control, organisations should develop an incident management plan that outlines the procedures for identifying, reporting, and responding to security incidents. This plan should include clearly defined roles and responsibilities, ensuring that everyone knows what to do in the event of an incident.


If necessary, the organisation should also establish communication protocols for reporting incidents to internal and external stakeholders, including regulatory bodies.


Regular training and exercises should be conducted to ensure that employees are familiar with the incident management plan and can respond effectively.


The organisation should also establish a process for regularly reviewing and updating the incident management plan to reflect changes in the threat landscape and organisational structure.

 

5.25 Assessment and Decision on Information Security Events


Purpose

Not all security events are equal, and this control emphasises the importance of assessing and categorising security events to determine whether they should be classified as incidents.


Proper assessment is critical for ensuring that resources are allocated appropriately and that serious threats are addressed promptly while less critical events are managed with the appropriate level of response.


Implementation

To implement this control, organisations should establish criteria for assessing and categorising security events. These criteria may include factors such as the potential impact on the organisation, the likelihood of exploitation, and the criticality of the affected systems or data.


Once an event is detected, it should be assessed according to these criteria to determine whether it should be escalated to an incident and, if so, what level of response is required.


The organisation should document the assessment process and ensure that all relevant personnel are trained to apply it consistently.


Regular reviews of the assessment criteria should be conducted to ensure they remain aligned with the organisation’s risk management strategy.

 

5.26 Response to Information Security Incidents


Purpose

Responding effectively to information security incidents is crucial for minimising the damage caused by breaches and ensuring that the organisation can recover quickly. This control focuses on the need for a documented and well-practised response plan that enables the organisation to manage incidents in a structured and controlled manner.


Implementation

To implement this control, organisations should develop a detailed incident response plan that outlines the steps to be taken when an incident occurs.


This plan should include procedures for containment, eradication, recovery, and communication.


The organisation should ensure that incident response teams are well-trained and equipped to handle incidents according to the plan.


Regular incident response exercises, such as tabletop simulations, should be conducted to test the plan's effectiveness and identify areas for improvement.


After an incident, the response should be reviewed to determine what went well and what could be improved, and the incident response plan should be updated accordingly.

 

5.27 Learning from Information Security Incidents


Purpose

Learning from information security incidents is essential for continuously improving an organisation’s security posture. This control recognises that incidents provide valuable insights into vulnerabilities and threats and that by analysing incidents, organisations can strengthen their defences and prevent similar incidents from occurring.


Implementation

Organisations should conduct post-incident reviews after every security incident to implement this control. These reviews should involve a thorough analysis of what happened, how the incident was managed, and what could have been done differently.



The review findings should be documented and shared with relevant stakeholders to ensure lessons are learned across the organisation.


Based on the insights gained, the organisation should update its security controls, policies, and procedures to address any identified weaknesses.


Regularly reviewing and updating the incident management process based on lessons learned ensures that the organisation’s security practices evolve in response to emerging threats.

 

5.28 Collection of Evidence


Purpose

The collection of evidence is critical for supporting investigations into security incidents. It enables the organisation to understand what happened, take appropriate legal action if necessary, and improve its security measures.


Proper evidence collection ensures that the organisation can preserve the integrity and availability of data related to an incident, which is vital for both internal analysis and potential legal proceedings.


Implementation

Organisations should establish procedures for collecting, handling, and preserving evidence related to security incidents to implement this control. This includes identifying what types of evidence should be collected (e.g., logs, files, communications), how it should be collected (e.g., using forensic tools), and how it should be stored to maintain its integrity.


Personnel involved in evidence collection should be trained in forensic principles and legal requirements to ensure that the evidence is admissible in court if needed.


The organisation should also document the chain of custody for all evidence to demonstrate that it has been handled correctly.


The evidence-collection process should be regularly reviewed to ensure that it remains effective and up-to-date with current best practices and legal standards.

 

5.29 Information Security During Disruption


Purpose

Information security during disruption is critical for ensuring that an organisation can continue to protect its information assets even in the face of adverse events, such as natural disasters, cyber-attacks, or system failures. This control focuses on maintaining information security during disruption to prevent additional damage and support recovery efforts.


Implementation

To implement this control, organisations should develop a business continuity plan that includes specific measures for maintaining information security during disruptions. These may include establishing alternative communication channels, implementing backup systems, and ensuring critical information is accessible and secure.


The organisation should conduct regular tests of its continuity plan, including simulations of different disruptions, to ensure that security measures are effective and can be activated quickly.


Employees should be trained on their roles in maintaining security during a disruption, and regular reviews should be conducted to update the plan based on lessons learned from tests and real-world incidents.

 

5.30 ICT Readiness for Business Continuity


Purpose

ICT readiness for business continuity ensures that the organisation’s information and communication technology (ICT) systems can support essential business operations during and after a disruptive event. This control is critical because ICT systems often form the backbone of modern business processes, and their failure can result in significant operational and financial losses.


Organisations can minimise downtime and maintain critical functions even in adverse conditions by ensuring that these systems are resilient and can recover quickly from disruptions.


Implementation


Organisations should develop and maintain a comprehensive business continuity plan that includes detailed ICT continuity measures to implement this control. This involves identifying critical ICT systems and processes that must be maintained during a disruption and ensuring that appropriate redundancy, backup, and recovery mechanisms are in place.


Organisations should regularly test their ICT continuity plans through simulations and drills to ensure that systems can be restored quickly and that employees are familiar with their roles in the recovery process.


Additionally, ICT systems should be regularly updated and maintained to reduce the risk of failure. All continuity measures should be documented and reviewed periodically to ensure they remain effective and aligned with the organisation’s business continuity objectives.

 

5.31 Legal, Statutory, Regulatory and Contractual Requirements


Purpose

This control is focused on ensuring that the organisation complies with all applicable legal, statutory, regulatory, and contractual requirements related to information security.


Compliance is not only a legal obligation but also a critical aspect of managing the risks associated with information security. Failure to meet these requirements can result in legal penalties, financial losses, and damage to the organisation's reputation.


Implementation

To implement this control, the organisation should first identify all relevant legal, statutory, regulatory, and contractual requirements related to information security. This might include data protection laws, industry regulations, and contractual obligations with clients or partners.


The organisation should document these requirements and integrate them into its information security management system (ISMS).


Compliance measures should be implemented, such as specific security controls, policies, and procedures that align with these requirements.




The organisation should also establish a process for regularly reviewing and updating its compliance efforts, ensuring that any changes in the legal or regulatory landscape are promptly addressed.


Regular audits and assessments should also be conducted to verify compliance and identify areas where improvements are needed.

 

5.32 Intellectual Property Rights


Purpose

Protecting intellectual property (IP) rights is essential for safeguarding the organisation’s creations, innovations, and proprietary information. This control ensures that the organisation implements measures to prevent the unauthorised use, disclosure, or theft of its intellectual property. By securing IP, organisations can maintain their competitive advantage, avoid legal disputes, and protect valuable assets contributing to their overall success.


Implementation

Organisations should develop and enforce policies that protect intellectual property rights to implement this control. This includes identifying all intellectual property assets, such as patents, trademarks, copyrights, and trade secrets, and applying appropriate security measures to protect them.


Access to IP should be restricted to authorised personnel, and confidentiality agreements should be used to prevent unauthorised disclosure.


The organisation should also monitor for potential IP infringements and take appropriate legal action when necessary.


Employees should receive regular training to ensure they understand the importance of protecting IP and are familiar with the organisation’s policies and procedures.


Additionally, the organisation should stay informed about changes in IP law and adjust its protection strategies accordingly.

 

5.33 Protection of Records


Purpose

Records protection is vital for ensuring an organisation’s data and documents are preserved and secure from loss, destruction, falsification, unauthorised access, or unauthorised release.


Records in physical or electronic form are crucial for operational continuity, legal compliance, and historical reference. This control is essential to maintaining the integrity and availability of records, particularly those critical to the organisation’s operations and compliance obligations.


Implementation

To implement this control, organisations should first identify the records that require protection and categorise them based on their importance, sensitivity, and retention requirements.


Security measures should then be applied to these records, including access controls, encryption, and secure storage solutions.


Backup procedures should be implemented to ensure that records can be recovered during a loss or disaster.


The organisation should also establish policies for the secure disposal of records that are no longer needed, ensuring that they are destroyed in a way that prevents recovery or unauthorised access.


Regular audits and reviews should be conducted to verify that records are adequately protected and that security measures remain effective. Employees should be trained on the organisation’s policies and procedures for record protection to ensure consistent application.

 

5.34 Privacy and Protection of PII

Purpose

This control addresses the need to protect personally identifiable information (PII) following applicable privacy laws and regulations.


Protecting PII is critical for maintaining the trust of individuals whose data is being processed and avoiding legal and regulatory penalties. This control ensures that the organisation implements measures to safeguard individuals' privacy and protect their data from unauthorised access, use, or disclosure.


Implementation

Organisations should first identify the PII they process to implement this control and assess the associated risks. Privacy impact assessments (PIAs) should be conducted to determine the potential impact of data processing activities on individuals' privacy.



Based on these assessments, appropriate security controls should be implemented, such as data minimisation, encryption, access controls, and secure data storage.


The organisation should also establish procedures for responding to data subject requests, such as access, correction, and deletion of PII.


Employees should be trained on privacy principles and the organisation’s policies for handling PII.


Regular reviews and audits should be conducted to ensure compliance with privacy laws and regulations. The organisation should also stay informed about changes in privacy requirements and adjust its practices accordingly.

 

5.35 Independent Review of Information Security

Purpose

An independent review of information security is essential for ensuring that the organisation’s information security management system (ISMS) is effective and that security controls are operating as intended. This control highlights the importance of having an external or impartial internal party assess the organisation’s security practices to evaluate their effectiveness and objectively identify areas for improvement.


Implementation

To implement this control, organisations should schedule regular independent reviews of their ISMS and security controls.


External auditors, internal auditors not involved in the day-to-day security management, or independent security consultants can conduct these reviews.


The review should cover the organisation’s entire ISMS, including policies, procedures, controls, and compliance with relevant standards and regulations.


The review's findings should be documented, and any identified weaknesses or areas for improvement should be addressed through corrective actions.


Management should review the results of the independent review and ensure that necessary changes are implemented to enhance the organisation’s security posture.


Regular follow-up reviews should be conducted to assess the effectiveness of the implemented improvements.

 

5.36 Compliance with Policies, Rules and Standards for Information Security


Purpose

Compliance with the organisation’s information security policies, rules, and standards is critical to consistently applying security practices. This control emphasises the importance of regular reviews and assessments to verify that all employees, systems, and processes adhere to the established security requirements.


Organisations can reduce the risk of security breaches by ensuring compliance and demonstrating their commitment to maintaining a robust security environment.


Implementation

Organisations should establish a compliance monitoring program that includes regular audits, assessments, and inspections of their information security practices to implement this control. This program should be designed to verify that all employees and systems are following the organisation’s security policies, rules, and standards.


Non-compliance issues should be identified and addressed promptly, with corrective actions implemented to prevent recurrence.


The organisation should also provide regular training and awareness programs to ensure employees understand and adhere to security requirements.


Compliance reports should be generated and reviewed by management to track progress and identify areas where additional support or enforcement may be needed.


Additionally, the organisation should regularly update its policies, rules, and standards to reflect changes in the threat landscape, technology, and regulatory requirements, ensuring that compliance efforts remain relevant and effective.

 

5.37 Documented Operating Procedures

Purpose

Documented operating procedures are essential for ensuring all information processing activities are carried out consistently and securely. This control requires organisations to develop and maintain detailed procedures for all key operations related to information security.


Documented procedures provide clear guidance to employees, reduce the risk of errors, and ensure that security practices are applied uniformly across the organisation.


Implementation

To implement this control, organisations should identify all critical information processing activities that require documented procedures.


These activities might include system administration, data backup and recovery, incident response, access management, and change management.


Once identified, detailed procedures should be developed for each activity, outlining the steps to be followed, the roles and responsibilities involved, and the security controls to be applied.


The procedures should be documented in a clear and accessible format, and all relevant employees should be trained to follow them.


Regular reviews and updates of the documented procedures should be conducted to ensure they remain accurate and effective, particularly as systems and processes evolve.


The organisation should also implement mechanisms for monitoring adherence to these procedures and take corrective actions if deviations are identified.

Comments


Never miss another article.

About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page