Go Back

ISO/IEC 27001

What is ISO/IEC 27001?

ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It provides a structured framework for managing sensitive company information so that it remains secure. The standard encompasses people, processes, and IT systems by applying a risk management process. It was first published in 2005, revised in 2013, and updated again in 2022 to align with modern threats and business environments.

The core of ISO/IEC 27001 is the implementation of an ISMS, which involves assessing risks to information security and implementing controls to mitigate these risks. It also emphasizes continual improvement and alignment with the organization’s goals and compliance obligations.

Key Requirements

Benefits of Implementing ISO/IEC 27001

ISMS and the PDCA Model

ISO/IEC 27001 adopts the PDCA (Plan-Do-Check-Act) cycle as the foundation for establishing, implementing, operating, monitoring, and improving an Information Security Management System (ISMS). This approach ensures continuous improvement and alignment with organizational goals and risks.

Responsibilities at Each PDCA Stage

  1. Plan: Define ISMS policy, assess risks, and identify objectives and processes to ensure information security.
  2. Do: Allocate resources, implement controls, and conduct awareness training.
  3. Check: Perform internal audits, measure ISMS effectiveness, and analyze incidents.
  4. Act: Correct nonconformities and improve policies and procedures based on audit results and feedback.

ISO/IEC 27001 Clause Structure (Aligned with PDCA)

The following table outlines ISO/IEC 27001's major clauses grouped by each PDCA phase:

PDCA Clause Items
1. Scope
2. Normative references
3. Terms and definitions
Plan 4. Context of the organization
  4.1 Understanding of the organization and its context
  4.2 Understanding the needs and expectations of interested parties
  4.3 Determining the scope of the information security management system
  4.4 Information security management system
5. Leadership
  5.1 Management commitment
  5.2 Policy
  5.3 Organizational roles, responsibilities and authorities
6. Planning
  6.1 Actions to address risks and opportunities
  6.2 Information security objectives and planning to achieve them
Do 7. Support
  7.1 Resources
  7.2 Competence
  7.3 Awareness and training
  7.4 Communication
  7.5 Documentation
8. Operation
  8.1 Operational planning and control
  8.2 Information security risk assessment
  8.3 Information security risk treatment
Check 9. Performance evaluation
  9.1 Monitoring, measurement, analysis and evaluation
  9.2 Internal audit
  9.3 Management review
Act 10. Improvement
  10.1 Nonconformity control and corrective actions
  10.2 Continual improvement

Annex A: 18 Security Control Domains

Annex A of ISO/IEC 27001:2013 outlines 18 control domains that help organizations ensure comprehensive information security management:

These domains contain a total of 114 controls, which organizations can select and apply based on the outcome of their risk assessment.

Implementation Phases

  1. Project Initiation: Gain executive support, allocate resources, and define objectives for the ISMS.
  2. Define Scope: Clearly determine which parts of the organization and which information assets are covered by the ISMS.
  3. Risk Assessment: Identify information assets, evaluate threats and vulnerabilities, and assess potential impacts to determine risk levels.
  4. Risk Treatment Plan: Select appropriate controls from Annex A or others to mitigate identified risks and document the plan.
  5. Design ISMS: Develop the policies, procedures, and frameworks needed for operation, including incident management and access control.
  6. Training and Awareness: Conduct staff training to ensure everyone understands their role in maintaining security.
  7. Internal Audit: Conduct an internal audit to identify gaps and areas of improvement before certification.
  8. Certification Audit: Undergo an independent two-stage audit process from an accredited body to obtain ISO/IEC 27001 certification.
  9. Continuous Improvement: Use management reviews and incident lessons learned to continuously evolve and refine the ISMS.