Asset Management
The control requirement is that all major information assets should be accounted for and has a nominated owner. Accountability for assets helps to ensure that appropriate protection is maintained. Owners should be identified for all major assets and the responsibility for the maintenance of appropriate controls should be assigned. Responsibility for implementing controls may be delegated. Accountability should remain with the nominated owner of the asset.
Human Resource Security
The requirement under this key control area includes attaching significant importance to the HR security aspects of ISMS. Controls should ensure that security responsibilities be addressed at the recruitment stage, included in contracts, and monitored during an individual’s employment. Potential recruits should be adequately screened, especially for sensitive jobs. All employees and third party users of information processing facilities should sign a confidentiality and non-disclosure agreement.
Physical and Environmental Security
The primary goal of this control measure is to prevent unauthorized access, damage and interference to business premises and information. This requirement is expected to be achieved by ensuring that critical or sensitive business information processing facilities be housed in secure areas, protected by a defined security perimeter, with appropriate security barriers and entry controls. They should be physically protected from unauthorized access, damage and interference. The protection provided should be commensurate with the identified risks. A clear desk and clear screen policy is recommended to reduce the risk of unauthorized access or damage to papers, media and information processing facilities.
Communications and Operations Management
Given that the primary goal of this branch of ISMS is to ensure the correct and secure operation of information processing facilities, various technical controls are discussed in this segment of ISMS. Responsibilities and procedures for the management and operation of all information processing facilities are required to be established. This includes the development of appropriate operating instructions and incident response procedures. Segregation of duties is recommended for implementation, where appropriate, to reduce the risk of negligent or deliberate system misuse.
Access Controls
Within the broad objective of wanting to control access to business information, this covers policies and practices for information dissemination and authorization.
This covers both technical and organizational controls governing access to business assets at the user level, network level, in mobile computing and data in storage and in transit.
Information System Acquisition, Development and Maintenance
This will include infrastructure, business applications and user-developed applications. The design and implementation of the business process supporting the application or service can be crucial for security. Security requirements should be identified and agreed prior to the acquisition or development of information systems. All security requirements, including the need for fallback arrangements, should be identified at the requirements phase of a project and justified, agreed and documented as part of the overall business case for an information system.
Information Security Incident Management
The primary purpose of the set of controls in this domain is to ensure that information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken. It also requires that appropriate controls be put in place to ensure that a consistent and effective approach be applied to the management of information security incidents
Business Continuity Management
The primary goal is counteracting interruptions to business activities and to protect critical business processes from the effects of major failures or disasters. To achieve this, businesses must establish a business continuity management process.
This should be implemented to reduce the disruption caused by disasters and security failures (which may be the result of, for example, natural disasters, accidents, equipment failures, and deliberate actions) to an acceptable level through a combination of preventative and recovery controls.
Compliance
The principal goal of controls in this area is to avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements. |