Information security management system

"ISMS" redirects here. For other uses, see isms (disambiguation).

An information security management system (ISMS) is a set of policies concerned with information security management or IT related risks. The idioms arose primarily out of ISO 27001.

The governing principle behind an ISMS is that an organization should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk.

Contents

ISMS description

As with all management processes, an ISMS must remain effective and efficient in the long term, adapting to changes in the internal organization and external environment. ISO/IEC 27001 therefore incorporates the typical "Plan-Do-Check-Act" (PDCA), or Deming cycle, approach:

The best known ISMS is described in ISO/IEC 27001 and ISO/IEC 27002 and related standards published jointly by ISO and IEC.

Another competing ISMS is Information Security Forum's Standard of Good Practice (SOGP). It is more best practice-based as it comes from ISF's industry experiences.

Other frameworks such as COBIT and ITIL touch on security issues, but are mainly geared toward creating a governance framework for information and IT more generally. COBIT has a companion framework Risk IT dedicated to Information security.

There are a number of initiatives focused to the governance and organizational issues of securing information systems having in mind that it is business and organizational problem, not only a technical problem:

Need for a ISMS

Security experts say and statistics confirm that:

These facts inevitably lead to the conclusion that:

Security administration is a management and NOT a purely technical issue[4]

The establishment, maintenance and continuous update of an ISMS provide a strong indication that a company is using a systematic approach for the identification, assessment and management of information security risks. Furthermore such a company will be capable of successfully addressing information confidentiality, integrity and availability requirements which in turn have implications for: [4]

Chief objective of Information Security Management is to implement the appropriate measurements in order to eliminate or minimize the impact that various security related threats and vulnerabilities might have on an organization. In doing so, Information Security Management will enable implementing the desirable qualitative characteristics of the services offered by the organization (i.e. availability of services, preservation of data confidentiality and integrity etc.).[4]

Large organizations or organizations such as banks and financial institutes, telecommunication operators, hospital and health institutes and public or governmental bodies have many reasons for addressing information security very seriously. Legal and regulatory requirements which aim at protecting sensitive or personal data as well as general public security requirements impel them to devote the utmost attention and priority to information security risks.[4]

Under these circumstances the development and implementation of a separate and independent management process namely an Information Security Management System is the one and only alternative.[4]

As shown in Figure, the development of an ISMS framework entails the following 6 steps:[4]

  1. Definition of Security Policy,
  2. Definition of ISMS Scope,
  3. Risk Assessment (as part of Risk Management),
  4. Risk Management,
  5. Selection of Appropriate Controls and
  6. Statement of Applicability

Critical success factors for ISMS

To be effective, the ISMS must:[4]

See also

Notes and references

  1. ^ a b NIST: FISMA Overview
  2. ^ Caballero, Albert. (2009) "14" Computer and Information Security Handbook Morgan Kaufmann Pubblications Elsevier Inc p. 232 ISBN 978-0-12-374354-1 
  3. ^ CERT Governing for Enterprise Security Implementation Guide
  4. ^ a b c d e f g Enisa Risk management, Risk assessment inventory, page 8

External links