Understanding ISMS: Scope and Key Clauses Explained

Scope and Applicability

It is applicable to all organisations whether commercial, government or Non profit.

It covers and specify the requirements for the following:

  • Establishing, Implementing, maintaining and Continuously improving an Information Security Management System
  • Includes requirements for the assessment and treatment of Information security Risks tailored to the needs of the organisation

PDCA Cycle

Clauses:

Clause 4: Context of Organization

  • Understand the external and internal issues that affect the information security
  • Identify interested parties and their requirements
  • Establish the scope of ISMS
  • Establish, implement, maintain and continually improve ISMS

Clause 5: Leadership

  • Top Management to demonstrate leadership and commitment by ensuring ISMS policy, objectives, processes are established, necessary resources are provided and continual improvement is carried out
  • Top Management to assign responsibility and authority for implementing and achieving conformance to ISMS

Clause 6: Planning

  • Establish criteria and plan for risk assessment and necessary treatment
  • Develop statement of applicability with identified controls as expected in Annex A of the standard
  • Identify risks and opportunities and address them accordingly
  • Establish ISMS objectives, responsibilities and timeline to achieve
  • Carry out changes to ISMS in a planned manner

Clause 7: Support

  • Provide resources for implementing ISMS
  • Identify and acquire necessary competency required for ISMS
  • Ensure awareness of ISMS, importance of conformance to it and consequences of non conformance
  • Establish communication system to handle internal and external communication

Clause 8: Operation

  • Conduct risk assessments and treatments as planned
  • Take actions to address risks and opportunities as planned
  • Keep record of documented information Establish criteria and plan for risk assessment and necessary treatment

Clause 9: Performance evaluation

  • Establish measurement and management reporting framework to assess the performance of ISMS
  • Plan and conduct internal audits to ensure compliance to ISMS and the applicable standards
  • Top management to review periodically to check continuing suitability, adequacy and effectiveness of ISMS
  • Organization to evaluate the information security performance and the effectiveness of the ISMS.

Clause 10: Improvement

  • Plan actions to continually improve suitability, adequacy and effectiveness of ISMS
  • Identify and respond to nonconformities as required
  • Identify and eliminate causes of nonconformities

Discover more from Information Security Blogs

Subscribe to get the latest posts sent to your email.

Leave a comment

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading