Search (2)
  • There are no suggestions because the search field is empty.

Knowledge

13 April 2017
Information Security

Information Security Management Systems Explained in Plain English

employees sitting around desk with computers

 

ISO 27001 is the international standard for information security management systems. ISO 27001 outlines the criteria for an effective information security management system, including policies and procedures required for protection of an organisation’s assets. However, we understand there’s a bit more to it than that, below we explain the different functions and characteristics of information security management systems.

 

What is an Information Security Management System

Information security management systems are necessary in meeting the diversifying security threats facing businesses around the world. They are designed to negate and minimise potential risks to your company data. Information security management is the examination of a company’s information assets, instigating development and implementation of policies and procedures for protecting particularly confidential resources.

 

 

 

The ISO 27001 (Information Security Management) Standard

The ISO 27001 standard was created to help organisations implement an effective information security management system. We have simplified the key requirements outlined in the ISO 27001 standard:

 

Context of the organisation stresses the importance of understanding your organisational context. This stage is about identifying all of the internal issues in the organisational structure, roles and responsibilities, business strategy and objectives, as well as external issues from a political, economic, cultural, technological and competitive environment that could potentially influence your information security management system.

Leadership aims to encourage top management to demonstrate a commitment to maintaining an effective information security management system. Leadership must establish security procedures in the workplace by assigning information security roles and responsibilities.

Planning includes conducting activities such as risk assessments and risk treatments, routinely identifying possible weak properties in your company's information security management system.

Support aims to keep employees informed and ready for potential security breaches. Regular security training is necessary to achieve this.

Documented information refers to security-related documents and records. These stress the importance of implementing consistent practices when it comes to access and modification to avoid security breaches.

Operation is the about assessing and treating information risks, managing changes, and thorough documentation. 

Performance evaluation includes security monitoring, internal auditing, analysing and evaluating the information security controls, and creating reviews to find systematic improvements where needed. 

Improvement aims to address findings from the performance evaluation stage, by taking corrective actions, and making continual refinements to the information security management system.

 

Getting ISO 27001 Certification

Australian businesses of all shapes and sizes face threats to their company data. Implementing an information security management system compliant with ISO 27001 is an effective way to be proactive in the protection of your information assets.

To learn more about the information security threats facing Australian businesses, and how an information security management system can safeguard your data assets, download your free copy of our popular Whitepaper below:

Information Security and Australian businesses

 

Bottom Form Image (2)

Request a Complimentary Consultation