24
Copyright © 2012 BSI. All rights reserved. Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland

Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Embed Size (px)

Citation preview

Page 1: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved.

Informatiebeveiliging volgens ISO/IEC 27001:2013

Dave Hagenaars, directeur BSI Group Nederland

Page 2: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 2

Inhoud

• Wie zijn wij?

• Waarom informatiebeveiliging?

• Wat is de relevantie voor medische hulpmiddelen industrie?

• Introductie van de norm ISO 27001

• Andere mogelijk relevante normen

Page 3: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 3

Who is BSI? – 10 fast facts

Page 4: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 4

Waarom informatiebeveiliging? Wat zijn de risico’s?

Cyber crime

• Botnet

• Cyber afpersing

• Banking trojans

• Cyber stalking

• DDOS aanvallen

• E-Fraude

• Hacking

• Phising

• Rasom ware

• Virus

10/12/2014

… maar ook:

• Fysieke beveiliging / diefstal

• Gedrag van (ex-) medewerkers

• Becherming van data tegen externe invloeden, brand e.d.

Page 5: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 5

Cyber spionage

10/12/2014

Page 6: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 6

Relevantie voor de medische hulpmiddelen industrie

• Beveiliging van software als een medisch hulpmiddel

• Transparantie versus privacy aspecten bij klinisch onderzoek

• Bescherming van het intellectueel eigendom

• Voorkomen van hacken van medische hulpmiddelen / klinische monitoring (EN 62304)

• Beveiliging van data in supply chain communicatie als gevolg van nadruk op transparantie in toekomstige wetgeving

10/12/2014

Page 7: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 7

10/12/2014

Page 8: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 8

Benefits of ISO 27001

BSI clients have reported the following benefits:

• 67% increased sales

• 58% reduced costs

• 79% improved their speed of recovery following an incident

• 66% improved their ability to respond to tenders

• 73% reported an increase in competitive position

• 85% built stakeholder confidence

Page 9: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 9

Global growth in certification (ISO survey)

9

CAGR 18%

Page 10: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 10

2013 revision of ISO 27001 based on new high level structure

• ISO 27001 has been developed using Annex SL

• Annex SL is for standards writers and provides a standardised text suitable for all ISO management system standards

• The new structure of the standard is to become common to all management system standards

• The intention is to standardise terminology and requirements for fundamental Management System requirements

Page 11: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 11

ISO/IEC 27001:2013 structure

Page 12: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 12

4. Context of the organization

• Clause 4 requires the organization to determine its external and internal issues

• There is a clear requirement to consider interested parties and their requirements

• The requirements of interested parties may include legal and regulatory requirements and contractual obligations

• This will determine its information security policy and objectives and how it will consider risk and the effect of risk on its business

• Consideration of an appropriate scope for the ISMS is required

Page 13: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 13

5. Leadership

• Clause 5 of the standard summarizes the requirements specific to top management’s role in the ISMS

• The new standard requires that top management leadership be more demonstrable and active

• ISMS policy now referred to as information security policy, however original policy requirements still present

• Clause 5 contains a requirement that top management ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated

Page 14: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 14

How must management demonstrate its commitment?

10/12/2014

Page 15: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 15

6. Planning

• New section relating to establishment of information security objectives and guiding principles for the ISMS as a whole

• When planning the ISMS, the context of the organization should be taken into account through the consideration of the risks and opportunities

• The organizations information security objectives must be clearly defined with plans in place to achieve them

• The risk assessment requirements are more general reflecting an alignment of ISO/IEC 27001 with ISO 31000

• The SOA requirements are largely unchanged

Page 16: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 16

7. Support

• Clause 7 details the support required to establish, implement and maintain and continually improve an effective ISMS, including:

• Resource requirements

• Competence of people involved

• Awareness of and communication with interested parties

• Requirements for document management

• The new standard refers to “documented information” rather than “documents and records” and requires that they be retained as evidence of competence

• There is no longer a list of documents you need to provide or particular names they must be given

• The new revision puts the emphasis on the content rather than the name

Page 17: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 17

8. Operation

• ISO/IEC 27001 requires that organizations plan and control the operation of the processes needed to meet their information security requirements including:

• keeping documents

• management of change

• responding to adverse events

• the control of any outsourced processes

• Operation planning and control also mandates:

• The carrying out of information security risk assessments at planned intervals

• The implementation of an information security risk treatment plan

Page 18: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 18

9. Performance evaluation

• Internal audits and management review continue to be key methods of reviewing the performance of the ISMS and tools for its continual improvement

• The new requirements for measurement of effectiveness are more specific and far reaching than the 2005 version which referred to effectiveness of controls

• To ensure its continuing suitability, adequacy and effectiveness, management must consider any changes in external and internal issues

Page 19: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 19

10. Improvement

• The organization shall react to any non conformity identified, take action to control and correct it, and deal with the consequences

• Nonconformities of the ISMS have to be dealt with together with corrective actions to ensure they don’t recur or occur elsewhere

• As with all management system standards, continual improvement is a core requirement of the standard

Page 20: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 20

Controls (Annex A)

• 114 controls in 14 groups

• Each organisation should decide on the relevant controls

• List is not meant to be exhaustive

• Possibility to use other control frameworks

Page 21: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 21

Example: Controls ‘A.7 Human resource security’

10/12/2014

Page 22: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 22

Andere relevante normen

10/12/2014

Standard Title and purpose

ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls

NEN 7510:2011 Medische informatica - Informatiebeveiliging in de zorg

ISO 27799:2008 Health informatics — Information security management in health using ISO/IEC 27002

Page 23: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 23

Vragen?

Page 24: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 24