informatiebeveiliging volgens iso/iec 27001:2013 revision of iso 27001 based on new high ... •the...

24
Copyright © 2012 BSI. All rights reserved. Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland

Upload: truongdan

Post on 25-Apr-2018

220 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved.

Informatiebeveiliging volgens ISO/IEC 27001:2013

Dave Hagenaars, directeur BSI Group Nederland

Page 2: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 2

Inhoud

• Wie zijn wij?

• Waarom informatiebeveiliging?

• Wat is de relevantie voor medische hulpmiddelen industrie?

• Introductie van de norm ISO 27001

• Andere mogelijk relevante normen

Page 3: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 3

Who is BSI? – 10 fast facts

Page 4: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 4

Waarom informatiebeveiliging? Wat zijn de risico’s?

Cyber crime

• Botnet

• Cyber afpersing

• Banking trojans

• Cyber stalking

• DDOS aanvallen

• E-Fraude

• Hacking

• Phising

• Rasom ware

• Virus

10/12/2014

… maar ook:

• Fysieke beveiliging / diefstal

• Gedrag van (ex-) medewerkers

• Becherming van data tegen externe invloeden, brand e.d.

Page 5: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 5

Cyber spionage

10/12/2014

Page 6: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 6

Relevantie voor de medische hulpmiddelen industrie

• Beveiliging van software als een medisch hulpmiddel

• Transparantie versus privacy aspecten bij klinisch onderzoek

• Bescherming van het intellectueel eigendom

• Voorkomen van hacken van medische hulpmiddelen / klinische monitoring (EN 62304)

• Beveiliging van data in supply chain communicatie als gevolg van nadruk op transparantie in toekomstige wetgeving

10/12/2014

Page 7: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 7

10/12/2014

Page 8: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 8

Benefits of ISO 27001

BSI clients have reported the following benefits:

• 67% increased sales

• 58% reduced costs

• 79% improved their speed of recovery following an incident

• 66% improved their ability to respond to tenders

• 73% reported an increase in competitive position

• 85% built stakeholder confidence

Page 9: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 9

Global growth in certification (ISO survey)

9

CAGR 18%

Page 10: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 10

2013 revision of ISO 27001 based on new high level structure

• ISO 27001 has been developed using Annex SL

• Annex SL is for standards writers and provides a standardised text suitable for all ISO management system standards

• The new structure of the standard is to become common to all management system standards

• The intention is to standardise terminology and requirements for fundamental Management System requirements

Page 11: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 11

ISO/IEC 27001:2013 structure

Page 12: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 12

4. Context of the organization

• Clause 4 requires the organization to determine its external and internal issues

• There is a clear requirement to consider interested parties and their requirements

• The requirements of interested parties may include legal and regulatory requirements and contractual obligations

• This will determine its information security policy and objectives and how it will consider risk and the effect of risk on its business

• Consideration of an appropriate scope for the ISMS is required

Page 13: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 13

5. Leadership

• Clause 5 of the standard summarizes the requirements specific to top management’s role in the ISMS

• The new standard requires that top management leadership be more demonstrable and active

• ISMS policy now referred to as information security policy, however original policy requirements still present

• Clause 5 contains a requirement that top management ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated

Page 14: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 14

How must management demonstrate its commitment?

10/12/2014

Page 15: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 15

6. Planning

• New section relating to establishment of information security objectives and guiding principles for the ISMS as a whole

• When planning the ISMS, the context of the organization should be taken into account through the consideration of the risks and opportunities

• The organizations information security objectives must be clearly defined with plans in place to achieve them

• The risk assessment requirements are more general reflecting an alignment of ISO/IEC 27001 with ISO 31000

• The SOA requirements are largely unchanged

Page 16: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 16

7. Support

• Clause 7 details the support required to establish, implement and maintain and continually improve an effective ISMS, including:

• Resource requirements

• Competence of people involved

• Awareness of and communication with interested parties

• Requirements for document management

• The new standard refers to “documented information” rather than “documents and records” and requires that they be retained as evidence of competence

• There is no longer a list of documents you need to provide or particular names they must be given

• The new revision puts the emphasis on the content rather than the name

Page 17: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 17

8. Operation

• ISO/IEC 27001 requires that organizations plan and control the operation of the processes needed to meet their information security requirements including:

• keeping documents

• management of change

• responding to adverse events

• the control of any outsourced processes

• Operation planning and control also mandates:

• The carrying out of information security risk assessments at planned intervals

• The implementation of an information security risk treatment plan

Page 18: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 18

9. Performance evaluation

• Internal audits and management review continue to be key methods of reviewing the performance of the ISMS and tools for its continual improvement

• The new requirements for measurement of effectiveness are more specific and far reaching than the 2005 version which referred to effectiveness of controls

• To ensure its continuing suitability, adequacy and effectiveness, management must consider any changes in external and internal issues

Page 19: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 19

10. Improvement

• The organization shall react to any non conformity identified, take action to control and correct it, and deal with the consequences

• Nonconformities of the ISMS have to be dealt with together with corrective actions to ensure they don’t recur or occur elsewhere

• As with all management system standards, continual improvement is a core requirement of the standard

Page 20: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 20

Controls (Annex A)

• 114 controls in 14 groups

• Each organisation should decide on the relevant controls

• List is not meant to be exhaustive

• Possibility to use other control frameworks

Page 21: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 21

Example: Controls ‘A.7 Human resource security’

10/12/2014

Page 22: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 22

Andere relevante normen

10/12/2014

Standard Title and purpose

ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls

NEN 7510:2011 Medische informatica - Informatiebeveiliging in de zorg

ISO 27799:2008 Health informatics — Information security management in health using ISO/IEC 27002

Page 23: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 23

Vragen?

Page 24: Informatiebeveiliging volgens ISO/IEC 27001:2013 revision of ISO 27001 based on new high ... •The new structure of the standard is to become common to all ... •ISMS policy now

Copyright © 2012 BSI. All rights reserved. 24