ISO/IEC 27002 - Outline

Outline

After the 3 introductory sections, the standard contains the following twelve main sections:

4. Risk assessment
5. Security policy - management direction
6. Organization of information security - governance of information security
7. Asset management - inventory and classification of information assets
8. Human resources security - security aspects for employees joining, moving and leaving an organization
9. Physical and environmental security - protection of the computer facilities
10. Communications and operations management - management of technical security controls in systems and networks
11. Access control - restriction of access rights to networks, systems, applications, functions and data
12. Information systems acquisition, development and maintenance - building security into applications
13. Information security incident management - anticipating and responding appropriately to information security breaches
14. Business continuity management - protecting, maintaining and recovering business-critical processes and systems
15. Compliance - ensuring conformance with information security policies, standards, laws and regulations

Within each section, information security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since:

  1. Each organization is expected to undertake a structured information security risk assessment process to determine its specific requirements before selecting controls that are appropriate to its particular circumstances. The introduction section outlines a risk assessment process although there are more specific standards covering this area such as ISO/IEC 27005. The use of information security risk analysis to drive the selection and implementation of information security controls is an important feature of the ISO/IEC 27000-series standards: it means that the generic good practice advice in this standard gets tailored to the specific context of each user organization, rather than being applied by rote. Not all of the 39 control objectives are necessarily relevant to every organization for instance, hence entire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggested', leaving the door open for users to adopt alternative controls if they wish, just so long as the key control objectives relating to the mitigation of information security risks, are satisfied. This helps keep the standard relevant despite the evolving nature of information security threats, vulnerabilities and impacts, and trends in the use of certain information security controls.
  2. It is practically impossible to list all conceivable controls in a general purpose standard. Industry-specific implementation guidelines for ISO/IEC 27001 and ISO/IEC 27002 offer advice tailored to organizations in the telecomms industry (see ISO/IEC 27011) and healthcare (see ISO 27799), with additional guidelines for the financial services and other industries in preparation.

Read more about this topic:  ISO/IEC 27002

Famous quotes containing the word outline:

    The outline of the city became frantic in its effort to explain something that defied meaning. Power seemed to have outgrown its servitude and to have asserted its freedom. The cylinder had exploded, and thrown great masses of stone and steam against the sky.
    Henry Brooks Adams (1838–1918)

    I am fooling only myself when I say my mother exists now only in the photograph on my bulletin board or in the outline of my hand or in the armful of memories I still hold tight. She lives on in everything I do. Her presence influenced who I was, and her absence influences who I am. Our lives are shaped as much by those who leave us as they are by those who stay. Loss is our legacy. Insight is our gift. Memory is our guide.
    Hope Edelman (20th century)

    The beginning of an acquaintance whether with persons or things is to get a definite outline of our ignorance.
    George Eliot [Mary Ann (or Marian)