How to plan the implementation of an ISMS

Information security objectives and planning to achieve them

The organization shall establish information security objectives at the relevant functions and levels.

Information security objectives shall:

1.            Be consistent with the information security policy.

2.            Be measurable (if possible) by calculating economic, personnel and execution time costs.

3.            Take into account the applicable information security requirements, the results of the risk assessment and the risk treatment.

4.            Be communicated.

5.            Be updated, as appropriate. Normally, the security objectives are defined annually after the meeting of the Security Committee and usually include training, application of new controls to reduce the level of risk and improvements of the controls already applied.

The organization will retain documented information on the information security objectives.

When planning how to achieve its information security objectives, the organization must determine, as follows:

1.            What will be done.

2.            What resources will be needed.

3.            Who will be responsible.

4.            When the objectives will be considered achieved.

5.            How the results will be evaluated.

Measures to address risks and opportunities

When planning the Information Security Management System , the organization must take into account the context, both internal and external, and the problems that derive from it and that may affect its ability to achieve the proposed objectives. In addition, it will take into account the interested parties and the requirements of each of them in relation to information security.

Based on this, you will be able to determine the risks and opportunities of your Information Security Management System, taking into account that the fundamental objectives when addressing risks and opportunities are:

1.            Ensure that the Information Security Management System can achieve the objectives set.

2.            Prevent or reduce unwanted effects.

3.            Achieve continuous improvement.

Once the risks and opportunities of the ISMS have been defined, the following can be planned:

1.            Actions to deal with risks and opportunities.

2.            The way of:

1.            Integrate and implement corrective actions.

2.            Evaluate the effectiveness of these actions.

3.            Know the fundamental aspects of risk assessment.

Planning and operational control

The organization must:

1.            Plan, execute and control the processes necessary to meet information security requirements and to implement actions to address risks and opportunities:

1.            Ensuring that the Information Security Management System can achieve its result.

2.            Preventing or reducing unwanted effects.

3.            Achieving continuous improvement.

4.            Actions to address these risks and opportunities.

2.            Implement plans to achieve information security objectives. The organization must establish information security objectives at the relevant functions and levels, which must:

1.            Be consistent with the information security policy.

2.            Be measurable.

3.            Take into account the applicable information security requirements and the results of risk assessment and risk treatment.

4.            Be communicated and updated, as appropriate.

3.            Maintain documented information to the extent necessary to have confidence that processes have been carried out as planned.

4.            Monitor planned changes and review the consequences of unwanted changes, taking steps to mitigate potential adverse effects, as necessary.

5.            Ensuring that outsourced security processes are determined and controlled.

  menshealthupdates   womensdayblog  usweeklyblog  myfavouriteceleb  technologydominator

Popular posts from this blog

Government defense and security

Benefits & Limitations of Laptops

COMPUTERS AND OUR LIVES: HOW HAVE COMPUTERS CHANGED OUR LIVES?