home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
  Information Security Management Practice (ISMP)


 
 
ISO 27001 Consulting

Information Security Policy:

The primary objective of this broad control area is to provide management with direction and support for information security in accordance with business requirements and relevant laws and regulations.  Recommended processes include –



 


  • Setting out the organization’s policy for the protection of confidentiality, integrity and availability of its information assets, viz., hardware, software and information handled by information systems, networks and applications.
  • Establish the responsibilities for information security
  • Provide reference to documentation, which comprises the complete ISMS.
Organization of Information Security

The primary control requirement is that a management framework be established to initiate and control the implementation of information security within the organization. Suitable management forum with appropriate leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security across the organization.

If necessary, a source of specialist information security advice should be established and made available within the organization. Contacts with external security specialists should be developed to keep up with industrial trends, monitor standards and assessment methods and provide suitable liaison points

 

when dealing with security incidents. A multi-disciplinary approach to information security should be encouraged, eg. involving the co-operation and collaboration of managers, users, administrators, application designers, auditors and security staff, and specialist skills in areas such as risk management.


Asset Management

The control requirement is that all major information assets should be accounted for and has a nominated owner. Accountability for assets helps to ensure that appropriate protection is maintained. Owners should be identified for all major assets and the responsibility for the maintenance of appropriate controls should be assigned. Responsibility for implementing controls may be delegated. Accountability should remain with the nominated owner of the asset.

Human Resource Security

The requirement under this key control area includes attaching significant importance to the HR security aspects of ISMS.  Controls should ensure that security responsibilities be addressed at the recruitment stage, included in contracts, and monitored during an individual’s employment. Potential recruits should be adequately screened, especially for sensitive jobs. All employees and third party users of information processing facilities should sign a confidentiality and non-disclosure agreement.


Physical and Environmental Security

The primary goal of this control measure is to prevent unauthorized access, damage and interference to business premises and information.  This requirement is expected to be achieved by ensuring that critical or sensitive business information processing facilities be housed in secure areas, protected by a defined security perimeter, with appropriate security barriers and entry controls. They should be physically protected from unauthorized access, damage and interference. The protection provided should be commensurate with the identified risks.

 


A clear desk and clear screen policy is recommended to reduce the risk of unauthorized access or damage to papers, media and information processing facilities.

Communications and Operations Management

Given that the primary goal of this branch of ISMS is to ensure the correct and secure operation of information processing facilities, various technical controls are discussed in this segment of ISMS.  Responsibilities and procedures for the management and operation of all information processing facilities are required to be established. This includes the development of appropriate operating instructions and incident response procedures. Segregation of duties is recommended for implementation, where appropriate, to reduce the risk of negligent or deliberate system misuse.


Access Controls

Within the broad objective of wanting to control access to business information, this covers policies and practices for information dissemination and authorization.  
This covers both technical and organizational controls governing access to business assets at the user level, network level, in mobile computing and data in storage and in transit.

Information System Acquisition, Development and Maintenance

This will include infrastructure, business applications and user-developed applications. The design and implementation of the business process supporting the application or service can be crucial for security. Security requirements should be identified and agreed prior to the acquisition or development of information systems.

 


All security requirements, including the need for fallbackarrangements, should be identified arrangements, should be identified at the requirements phase of a project and justified, agreed and documented as part of the overall business case for an information system.

Information Security Incident Management

The primary purpose of the set of controls in this domain is to ensure that information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken.  It also requires that appropriate controls be put in place to ensure that a consistent and effective approach be applied to the management of information security incidents

Business Continuity Management

The primary goal is counteracting interruptions to business activities and to protect critical business processes from the effects of major failures or disasters.  To achieve this, businesses must establish a business continuity management process. 

This should be implemented to reduce the disruption caused by disasters and security failures (which may be the result of, for example, natural disasters, accidents, equipment failures, and deliberate actions) to an acceptable level through a combination of preventative and recovery controls.

Compliance

The principal goal of controls in this area is to avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements.

ISO27001 Preparedness Audit and Compliance Assessment

As customers seek greater assurance that they are dealing with a secure organization, they are seeking the assurance against globally relevant benchmarks. ISO-27001 defined ISMS can be regarded as a benchmarking for security policies, practices and procedures in the organization. While the accredited certification body provides the certification of compliance with the standard, the pre-certification task is detailed and time consuming.

After the gap analysis results indicate what needs to be done further to move towards creating a fully compliant ISMS, V-Tech consultants will work with client security personnel on creating the appropriate ISMS covering all the ten broad areas of security and controls addressed in ISO-27001. The service goes all the way till the accreditation auditor who can certify the client for compliance with the standard meets the client.
 
 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.