New feature release, internal Vulnerabilities –

Explore Supported Frameworks

ISO/IEC 27001 : 2013

Select from a range of over 50 supported frameworks

This standard has been meticulously designed to aid organisations in establishing, implementing, maintaining, and continuously improving an information security management system (ISMS).

**Overview:**

Developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO/IEC 27001:2013 sets forth the gold standard for information security management practices. The purpose of this globally recognised framework is to help organisations protect their information assets through a systematic and risk-based approach. Primarily targeting Chief Information Security Officers (CISOs), security professionals, IT managers, and business leaders, it provides a structured framework to manage and mitigate information security risks effectively.

**Key Components/Pillars:**

ISO/IEC 27001:2013 is supported by several key components that serve as its backbone:

1. **Risk Assessment and Treatment:** Identifying, evaluating, and addressing risks to ensure they are within acceptable levels.
2. **Security Policy:** Establishing a clear direction of security efforts aligned with business objectives.
3. **Asset Management:** Identifying and classifying information assets for appropriate protection.
4. **Human Resources Security:** Ensuring that employees, contractors, and third-party users understand their responsibilities.
5. **Physical and Environmental Security:** Protecting the physical premises and the environments where information is processed.
6. **Access Control:** Restricting access to information and information processing facilities.
7. **Operations Security:** Ensuring the secure operation of information processing facilities.
8. **Communications Security:** Protecting information in networks and its supporting information processing facilities.
9. **Acquisition, Development, and Maintenance:** Ensuring that information security is an integral part of information systems across their lifecycle.
10. **Information Security Incident Management:** Ensuring a consistent and effective approach to the management of information security incidents.
11. **Compliance:** Audit and ensure compliance with the policies, laws, and regulations.

**Guidelines/Controls:**

The framework proposes an extensive set of controls, categorised under 14 control clauses, ranging from organisational contexts, leadership, planning, to support, operation, performance evaluation, and improvement. These controls offer comprehensive guidelines across various domains such as:

– **Governance and Risk Management:** Emphasising the importance of a risk-based approach and senior management engagement.
– **Personnel Security:** Guidelines for ensuring that employees and contractors understand their responsibilities before, during, and after employment.
– **Physical Security:** Measures to protect the organisation’s physical assets and information.
– **System Hardening and Configuration:** Ensuring systems are securely configured and regularly reviewed.
– **Access Control:** Mechanisms to limit access to information and systems only to authorised individuals.
– **Cryptography:** The proper use of encryption to protect the confidentiality, integrity, and availability of information.
– **Incident Response:** Establishing procedures to manage and recover from security incidents effectively.

**Implementation and Compliance:**

ISO/IEC 27001:2013 advocates for a phased, risk-based approach towards implementation and compliance. Organisations are encouraged to conduct comprehensive risk assessments to inform their ISMS implementation, ensuring it is proportionate to the threats they face. Certification against ISO/IEC 27001 is available and is carried out by accredited certification bodies, demonstrating an organisation’s commitment to information security management best practices.

**Additional Resources:**

The ISO provides a multitude of resources, including implementation guides, case studies, and training programs. For further details and resources, visit the official ISO website: [ISO Official Website](https://www.iso.org/standard/54534.html)

**Benefits and Adoption:**

Adopting the ISO/IEC 27001:2013 standard offers myriad benefits, including enhanced resilience to cyber threats, improved stakeholder confidence, and strengthened regulatory compliance. It has been widely adopted across various sectors, including financial services, healthcare, government, and IT. Notably, numerous Australian organisations have integrated ISO/IEC 27001 into their security strategies, demonstrating its effectiveness and applicability across diverse operational landscapes.

In conclusion, ISO/IEC 27001:2013 represents a keystone for organisations aiming to solidify their information security practices. Its comprehensive and flexible approach enables organizations to tailor their information security management efforts to their specific needs, fostering a culture of continuous improvement and resilience against information security threats.

Suggestions:
If you are starting your cyber maturity journey now, it is recommended that you adopt to ISO27001: 2022 version as this 2013 version will be removed by 2025. If you are already certified against ISO27001:2013 version, you should conduct a gap assessment against ISO27001:2022 and plan your transition roadmap.

TESTIMONIALS

What our clients are saying

50+ FRAMEWORKS

and growing, all mapped back to a common set of controls

GUIDE

70% of Organisations Faced Major Business Disruption from a Breach Last Year

A security incident is no longer just an IT issue. With 7 in 10 organisations experiencing significant or very significant disruption due to a breach, the need for a structured and strategic approach to cyber risk is more urgent than ever.

Our Ultimate Guide to Creating a Security Improvement Strategy provides a practical 12-step framework to help you assess risk, prioritise actions and build a resilient security posture that protects your operations, reputation and bottom line.

*Cost of a Data Breach Report 2024, IBM

Security Improvement Strategy

Submitting your request...