This section will discuss what need to be in place before starting an implementation of a ISMS.
Determine external and internal issues that are relevant to the intended outcome of its ISMS.
What interested parties are relevant to the ISMS and what are their requirements.
The boundaries and applicability of the ISMS will determine the scope of the ISMS. The scope shall be available as documented information.
The organization shall establish, implement, maintain and continually improve an information security management system, in accordance
with the requirements of this International Standard.
The top management shall committ to the ISMS by;
a) ensuring the information security policy;
b) ensuring the integration of the ISMS requirements into the organization’s processes;
c) ensuring that the resources needed for the information security management system are available;
d) communicating the importance of effective information security management and of conforming to
the ISMS requirements;
e) ensuring that the ISMS achieves its goals;
f) directing and supporting persons to contribute to the effectiveness of ISMS;
g) promoting continual improvement; and
h) supporting other relevant management roles to demonstrate their leadership as it applies to their
areas of responsibility.
Top management shall sign and ensure that the information security policy are/is:
a) appropriate to the purpose of the organization;
b) includes information security objectives (see 6.2) or provides the framework for setting information
security objectives;
c) includes a commitment to satisfy applicable requirements related to information security; and
d) includes a commitment to continual improvement of the information security management system.
The information security policy shall:
e) be available as documented information;
f) be communicated within the organization; and
g) be available to interested parties, as appropriate.
Top management shall ensure rolebased and communicated roles and authorities to information
security.
Top management shall assign the responsibility and authority for:
a) ensuring that the information security management system conforms to the requirements of this
International Standard; and
b) reporting on the performance of the information security management system to top management.
The last two chapters, 9, performance evaluation and 10, Improvement will be discussed in the group later.