top of page
Search
Writer's pictureScott Naisbett

How does ISO 27001 help to protect your organisation?


Data and information protection is now a hot topic for the government, businesses and the public, particularly after significant cyber-attacks have drawn attention to the security weaknesses of large businesses and organisations such as NHS hospitals and local councils.


To help all organisations, large and small, keep their information safe and their reputations intact, the ISO (International Organisation for Standardisation) developed ISO 27001, the Standard for information security management.


This Standard helps organisations to create a framework for an information security management system (ISMS), which helps to protect your information from cyber-attack, hacks, theft and data leaks by developing best practice.


But ISO 27001 goes beyond IT. To give organisations the security they need, this comprehensive Standard encompasses all aspects of a business, developing risk management throughout for a robust culture of security.


This means that you will develop processes that cover the legal, physical, human and technical aspects of your organisation, protecting both digital and physical assets.

To do this, the Standard includes a diverse set of controls.


What controls does ISO 27001 include?

The wide and in-depth scope of this Standard contains 114 separate controls. Each control has been developed to help businesses cover the various aspects of information protection. All controls are implemented unless they are not relevant to your organisation’s particular activities.


These controls are gathered together in a section known as Annex A, which is then split up into 14 categories. These categories cover everything from developing an information policy to creating access processes.


You can see the full list of categories below:

Annex A.5: Information security policies

Annex A.6: Organisation of information security

Annex A.7: Human resource security

Annex A.8: Asset management

Annex A.9: Asset control

Annex A.10: Cryptography

Annex A.11: Physical and environmental security

Annex A.12: Operations security

Annex A.13: Communications security

Annex A.14: System acquisition, development and maintenance

Annex A.15: Supplier relationships

Annex A.16: Information security incident management

Annex A.17: Information security aspects of business continuity management

Annex A.18: Compliance


By applying these controls, you can ensure that your organisation remains compliant with the latest regulations and legislation, stays up to date through continual improvement and boasts robust risk management.


To find out more about the controls of ISO 27001 and what they involve, head over to our dedicated web page.


If you wish to discuss your information security requirements, you can contact our ISMS Lead Implementer Scott Naisbett - https://www.isosystems.org.uk/contact

Comentarios


bottom of page