Solved

enterprise security policy, ISMS

Posted on 2014-02-19
4
460 Views
Last Modified: 2014-03-11
i was asked to deploy a  ISMS,although i`ve never done this before. if anyone has some templates ready,id be very grateful.
0
Comment
Question by:DukewillNukem
  • 2
4 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 39871947
What is ISMS ?? Need more details
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 39872069
i believe ISMS is referring to the ISO 2700x stuffs, meaning the information security mgmt system.

http://www.iso27001standard.com/en/free-downloads
http://www.iso27001security.com/
http://www.iso27001security.com/html/iso27k_toolkit.html

Below are useful resources you can tap to but note that the latest is ISO 27001:2013 instead of the 27001:2005. Organizations currently certified should not expect much difficulty in transitioning from the 2005 version to the 2013 version. So good to focus on 2013 instead..

Some question to ask oneself first..
a) How long does it take to implement ISO 27001 / BS 25999? @ http://blog.iso27001standard.com/2011/11/08/how-long-does-it-take-to-implement-iso-27001-bs-25999/

b) Do you really need a consultant for ISO 27001 / BS 25999 implementation?
http://blog.iso27001standard.com/2011/12/06/do-you-really-need-a-consultant-for-iso-27001-bs-25999-implementation/

The above is pretty nice article from a writer whom is quite experience and share tips in implementing and achieving the certification. Another is the differences on 2005 and 2013 version.

http://blog.iso27001standard.com/2013/01/28/a-first-look-at-the-new-iso-27001-2013-draft-version/ 

A big change here: these are not mentioned within some other requirements, but now there are separate clauses with very concrete rules. The rules are that you need to set clear objectives, you need to define who will measure them and when, and you need to define who should analyze and evaluate those results. Further, comprehensive plans need to be developed that will describe how the objectives will be achieved.

The biggest change is there are no preventive actions anymore, at least not at first sight – they are basically merged in risk assessment and treatment, where they naturally belong.

Note the new controls and those retired one ...

http://blog.iso27001standard.com/2013/02/11/main-changes-in-the-new-iso-27002-2013-draft-version/

naturally, controls from ISO 27001 Annex A cannot change without changing ISO 27002 because the essence of these two standards is to be aligned. Since the structure of ISO 27002 is completely aligned with controls from ISO 27001, all these changes are also valid for new ISO 27001 Annex A.
0
 

Author Comment

by:DukewillNukem
ID: 39920081
this looks good.does anyone have a template which i can directly use?
0
 
LVL 62

Expert Comment

by:btan
ID: 39920246
So far, no public template but the ISO document would already serves as general baseline to chart further customisation to your need and environment
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now