New feature release, internal Vulnerabilities –

Explore Supported Frameworks

ISO/IEC 27002 : 2013

Select from a range of over 50 supported frameworks

Discover the Integral Guide to Enhancing Your Cyber Security Posture: ISO/IEC 27002:2013 Framework

In the dynamic landscape of cyber security, safeguarding your organisation’s information assets is paramount. Developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), the ISO/IEC 27002:2013 framework stands as a cornerstone for organisations aiming to fortify their information security management practices. This globally recognised standard provides a comprehensive set of guidelines to enhance the security of information assets, making it an indispensable tool for Chief Information Security Officers (CISOs), security professionals, and IT managers.

### Key Components/Pillars

The ISO/IEC 27002:2013 framework is structured around several key principles that serve as the foundation of an effective information security management system (ISMS):

1. **Risk Assessment and Treatment**: Emphasises the importance of identifying, evaluating, and managing information security risks.
2. **Security Policy**: Development and implementation of policies tailored to protect information assets.
3. **Organization of Information Security**: Guides the allocation of responsibilities and coordination among organisational entities.
4. **Asset Management**: Focuses on identifying assets and applying appropriate protection measures.
5. **Human Resources Security**: Ensures that employees and contractors understand their responsibilities and are suitable for the roles they are considered for.
6. **Physical and Environmental Security**: Aims to protect physical assets and environments.
7. **Communications and Operations Management**: Manages technical operations and communications effectively to protect information.
8. **Access Control**: Restricts access to information assets to authorised individuals.
9. **Information Systems Acquisition, Development, and Maintenance**: Ensures security is integrated into information systems throughout their life cycle.
10. **Information Security Incident Management**: Prepares and responds to information security incidents to minimise their impact.
11. **Business Continuity Management**: Ensures information security continuity in the face of adverse events.
12. **Compliance**: Ensures legal and contractual information security requirements are met.

### Guidelines/Controls

ISO/IEC 27002:2013 delineates specific controls across various domains including:

– **Governance and Risk Management**: Establishing governance structures that align with business goals and managing risks based on valuation of assets.
– **Personnel Security**: Implementing practices for hiring, training, and managing employees to reduce internal threats.
– **Physical Security**: Safeguarding physical premises and equipment from unauthorized access or damage.
– **System Hardening and Configuration**: Ensuring systems are securely configured and regularly updated to mitigate vulnerabilities.
– **Access Control**: Managing access to information and computing facilities to ensure they are accessible only to authorised individuals.
– **Cryptography**: Applying cryptographic controls for protection of information integrity and confidentiality.
– **Incident Response**: Establishing procedures to detect, report, and analyse security incidents.

### Implementation and Compliance

The ISO/IEC 27002:2013 advocates a risk-based approach to implementation, encouraging organisations to assess their own risk environment and apply controls relevant to their specific challenges. While ISO/IEC 27002:2013 itself is not a certifiable standard, it supports organisations in achieving compliance with the ISO/IEC 27001 standard, which provides requirements for an ISMS. Organisations can pursue ISO/IEC 27001 certification to demonstrate their commitment to information security best practices.

### Additional Resources

The ISO and IEC provide supplementary resources, including advisories, alerts, and training programs. For more in-depth information regarding ISO/IEC 27002:2013, visit the official ISO website ([www.iso.org](https://www.iso.org)) for documentation and resources.

### Benefits and Adoption

Adopting the ISO/IEC 27002:2013 framework delivers substantial benefits, including enhanced risk management, improved compliance with legal and regulatory requirements, and a stronger information security posture. Its adoption is widespread across various sectors, including finance, healthcare, government, and technology, illustrating its versatility and effectiveness.

By leveraging the guidelines and controls outlined in the ISO/IEC 27002:2013, organisations can achieve a robust and resilient information security management system, instilling confidence among stakeholders and customers alike.

Suggestions:
If you are starting your cyber maturity journey now, it is recommended that you adopt ISO27002: 2022 version as this 2013 version will be removed by 2025. If you are already certified against ISO27002:2013 version, you should conduct a gap assessment against ISO27002:2022 and plan your transition roadmap.

TESTIMONIALS

What our clients are saying

50+ FRAMEWORKS

and growing, all mapped back to a common set of controls

GUIDE

70% of Organisations Faced Major Business Disruption from a Breach Last Year

A security incident is no longer just an IT issue. With 7 in 10 organisations experiencing significant or very significant disruption due to a breach, the need for a structured and strategic approach to cyber risk is more urgent than ever.

Our Ultimate Guide to Creating a Security Improvement Strategy provides a practical 12-step framework to help you assess risk, prioritise actions and build a resilient security posture that protects your operations, reputation and bottom line.

*Cost of a Data Breach Report 2024, IBM

Security Improvement Strategy

Submitting your request...