You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

SIG-ISM (Information Security Management) Working Group 2 is focusing on creating a guidance on setting up and running ISMS (information security management systems) for NRENs. 

This working group was set up in 2016 and is currently let by Robert Tofte (CISO, NORDUnet). 

The mailing list of this working group is <ism-wg2@lists.geant.org>

This is a closed confidential mailing list. If you would like to subscribe and join the working group, please contact Sigita Jurkynaite <sigita.jurkynaite@geant.org>


How to prepare the organisation for starting an implementation of ISMS.

This section will discuss what need to be in place before starting an implementation of a ISMS.

4. Context of the context of the organisation

4.1 Understanding the organization and its context

Determine external and internal issues that are relevant to the intended outcome of its ISMS.

4.2 Understanding the needs and expectations of interested parties

What interested parties are relevant to the ISMS and what are their requirements.

4.3 Determining the scope of the ISMS

The boundaries and applicability of the ISMS will determine the scope of the ISMS. The scope shall be available as documented information.

4.4 ISMS - Information Security Management System

The organization shall establish, implement, maintain and continually improve an information security management system, in accordance

with the requirements of this International Standard.

5. Leadership

5.1 Leadership and commitment

The top management shall committ to the ISMS by;

a) ensuring the information security policy;
b) ensuring the integration of the ISMS requirements into the organization’s processes;
c) ensuring that the resources needed for the information security management system are available;
d) communicating the importance of effective information security management and of conforming to
the ISMS requirements;
e) ensuring that the ISMS achieves its goals;
f) directing and supporting persons to contribute to the effectiveness of ISMS;
g) promoting continual improvement; and
h) supporting other relevant management roles to demonstrate their leadership as it applies to their
areas of responsibility.

5.2 Policy

Top management shall sign and ensure that the information security policy are/is:

a) appropriate to the purpose of the organization;
b) includes information security objectives (see 6.2) or provides the framework for setting information
security objectives;
c) includes a commitment to satisfy applicable requirements related to information security; and
d) includes a commitment to continual improvement of the information security management system.

The information security policy shall:

e) be available as documented information;
f) be communicated within the organization; and
g) be available to interested parties, as appropriate.

5.3 Organisational roles, responsibilities and authorities

Top management shall ensure rolebased and communicated roles and authorities to information
security.
Top management shall assign the responsibility and authority for:
a) ensuring that the information security management system conforms to the requirements of this
International Standard; and
b) reporting on the performance of the information security management system to top management.

6. Planning

6.1 Actions to address risks and opportunities

6.2 Information security objectives and planning to achieve them

7. Support

7.1 Rescources

7.2 Competence

7.3 Awareness

7.4 Communication

7.5 Documented information

8. Operation

8.1 Operational planning and control

8.2 Information security risk assessment

8.3 Information security risk treatment


The last two chapters, 9, performance evaluation and 10, Improvement will be discussed in the group later.



Meeting notes

The minutes of the SIG-ISM WG2 meetings are confidential - the viewing is restricted to the SIG-ISM mailing list members only.

2017-04-05 Meeting (VC)

2017-05-10 Meeting (VC)

SOA

SOA_Template_UNINETT_Engelsk.xlsx

Security Implementation SURFnet


  • No labels