top of page

ISO 27001 Control 8.6: Capacity Management

Writer's picture: Alan ParkerAlan Parker

Understanding Capacity Management in Information Security

Capacity management is a crucial aspect of information security and business continuity. As outlined in ISO 27001 Control 8.6, organisations must monitor and adjust their resource usage to align with current and expected capacity requirements. This control ensures that information processing facilities, human resources, offices, and other critical infrastructures can meet business demands efficiently and securely.


Objective of Capacity Management

The primary goal of capacity management is to guarantee that the organisation’s resources remain sufficient to support operations without disruption. This includes:

  • Ensuring system availability and efficiency through proactive monitoring.

  • Scaling infrastructure in response to business growth and changes.

  • Mitigating risks associated with over-utilisation or under-provisioning of critical assets.


Key Components of Capacity Management


1. Identifying Capacity Requirements

Capacity planning should begin with an assessment of current and future needs. This includes:

  • Evaluating business-critical systems and processes.

  • Conducting stress tests to determine peak performance requirements.

  • Analysing trends in resource utilisation and business expansion.

  • Considering resources with long procurement lead times or high costs.


2. System Tuning and Monitoring

Regular monitoring of resource usage helps organisations optimise performance and prevent potential capacity issues. Key actions include:

  • Implementing detective controls to detect problems early.

  • Tuning systems to enhance efficiency and maintain performance levels.

  • Reviewing capacity reports to anticipate and mitigate resource constraints.


3. Future Capacity Planning

Capacity projections must account for:

  • Business growth and new system requirements.

  • Infrastructure expansion or modernisation needs.

  • Dependencies on key personnel and avoiding bottlenecks.

  • Regulatory and compliance requirements related to data storage and processing.


4. Strategies for Increasing Capacity

To accommodate growing business demands, organisations should consider:

  • Hiring additional personnel.

  • Expanding office space or data centres.

  • Upgrading processing power, memory, and storage.

  • Leveraging cloud computing for scalable and flexible resource management.


5. Strategies for Reducing Resource Demand

When resource constraints arise, reducing demand can be an effective solution:

  • Deleting obsolete data to free up disk space.

  • Disposing of outdated hardcopy records.

  • Decommissioning unused applications, databases, or environments.

  • Optimising batch processes, application code, and database queries.

  • Restricting bandwidth for non-critical resource-intensive services.


Capacity Management Plan for Mission-Critical Systems

For systems essential to business operations, a documented capacity management plan should be developed. This plan should:

  • Outline monitoring processes and performance benchmarks.

  • Define actions for scaling resources or mitigating potential failures.

  • Assign responsibilities for managing capacity risks and responses.

  • Establish review and update cycles to align with evolving business needs.


Leveraging Cloud Computing for Capacity Management

Cloud computing offers an efficient way to manage capacity dynamically due to its inherent elasticity and scalability. By utilising cloud-based solutions, organisations can:

  • Expand or reduce computing resources on-demand.

  • Reduce capital investment in physical infrastructure.

  • Enhance disaster recovery and business continuity capabilities.


Conclusion

Effective capacity management is vital for ensuring business continuity, optimising resource utilisation, and maintaining a secure and reliable IT infrastructure. By implementing proactive monitoring, strategic planning, and leveraging cloud computing, organisations can meet both current and future operational demands while aligning with ISO 27001 Control 8.6 requirements.

Comments


About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page