Information Security Standards in Government The journey towards ISO/IEC 27001



Similar documents
ISO/IEC 27001: Case Study Data Centre Implementation

Ministry of Information and Communication Technology

Need to protect your information? Take action with BSI s ISO/IEC

NSW Government Digital Information Security Policy

Information Security Policy

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

NSW Government Digital Information Security Policy

Information Technology Security Program

ISO Information Security Management Services (Lot 4)

Standardising privacy and security for the cloud

ISO/IEC 27001:2013 webinar

ISMS Implementation Guide

An Overview of ISO/IEC family of Information Security Management System Standards

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report.

Security Standards BS7799 and ISO17799

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS

Information Security Awareness Training

005ASubmission to the Serious Data Breach Notification Consultation

Information Security Management System Policy

Information Security Management System Information Security Policy

Log management and ISO 27001

Practical Overview on responsibilities of Data Protection Officers. Security measures

AUDIT REPORT, SUMMARY. Summary. Information security in the civil public administration (RiR 2014:23) SWEDISH NATIONAL AUDIT OFFICE

The new Family of Standards & ISO/IEC 27001

HSCIC Audit of Data Sharing Activities:

Need to protect your information? Take action with BSI s ISO/IEC

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

University of Sunderland Business Assurance Information Security Policy

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT

Governance and Management of Information Security

Preparing yourself for ISO/IEC

Using Information Shield publications for ISO/IEC certification

How To Implement An Oiso Medical Device Quality Management System

Information Security Incident Management Policy September 2013

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

ISO27001 Controls and Objectives

How do I gain confidence in an Inspection Body? Do they need ISO 9001 certification or ISO/IEC accreditation?

Information Security Management Systems

INFORMATION TECHNOLOGY SECURITY STANDARDS

Integrated Information Management Systems

Information security policy

Using Insight Auditing SWOT Analysis to Drive Business Excellence

How To Implement An Information Security Management System

A Risk Management Standard

Enabling Compliance Requirements using ISMS Framework (ISO27001)

1.0 Policy Statement / Intentions (FOIA - Open)

ISO 9001 It s in the detail Your implementation guide

How to gain and maintain ISO certification

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

3 Keys to Preparing for CRM Success: Avoid the Pitfalls and Follow Best Practices

Correspondence between ISO 9001:2008 and 14001:2004, OHSAS 18001:2007, ISM and the SeaBird Management System

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

Outsourcing and Information Security

(Draft) Transition Planning Guidance for ISO 9001:2015

Bottom line a priority? Make ISO 9001 from BSI your first choice.

VISION FOR LEARNING AND DEVELOPMENT

ETSI TS V1.1.1 ( ) Technical Specification

INFORMATION SECURITY INCIDENT REPORTING POLICY

ISO/IEC Information Security Management. Securing your information assets Product Guide

National Cyber Security Policy -2013

Auditing data protection a guide to ICO data protection audits

Information Security Management System (ISMS) Policy

DOCUMATION S PURCHASE TO PAY (P2P) SUITE

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Better secure IT equipment and systems

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Government of India Ministry of Women and Child Development National Mission for Empowerment of Women (NMEW)

COMMERCIALISM INTEGRITY STEWARDSHIP. Security Breach and Weakness Policy & Guidance

Network Security Policy

Rotherham CCG Network Security Policy V2.0

A Generic Security Template for information system security arguments

INTRODUCTION TO ISO 9001 REVISION - COMMITTEE DRAFT

Central Information Systems Division ICT Manual

Preparing for and Responding to an OCR HIPAA Audit

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS

Tasmanian Government Information Security Framework

WILTSHIRE POLICE FORCE POLICY

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements

Cyber Security and Critical Information Infrastructure

for Information Security

ISO 27001:2005 & ISO 9001:2008

Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012

Customer Centric Cloud Based CRM Pricing

AUDITOR GUIDELINES. Responsibilities Supporting Inputs. Receive AAA, Sign and return to IMS with audit report. Document Review required?

ISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Protecting your business interests through intelligent IT security services, consultancy and training

IT SECURITY POLICY (ISMS 01)

Environmental Management Systems. A brief introduction to the nature and benefits of ISO14001:2015

NHS Business Services Authority Information Security Policy

The PMO as a Project Management Integrator, Innovator and Interventionist

Microsoft s Compliance Framework for Online Services

G-Cloud Definition of Services Security Penetration Testing

BOTSWANA PUBLIC SERVICE CUSTOMER SERVICE STANDARDS

Information Governance Strategy :

Highland Council Information Security Policy

Corporate Information Security Management Policy

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Navigating ISO 14001:2015

ICS-SCADA testing and patching: Recommendations for Europe

Transcription:

Information Security Standards in Government The journey towards ISO/IEC 27001 Mrs R.Awotar-Mauree IT Security Unit Ministry of IT & Telecommunications 14 March 2006

Agenda The first steps Consultancy services Achievements What is Next

The first steps (I) NITSP 1998 SHOCKING framework Standards & Practices WG - To develop and implement standards and practices identified IT Security to preserve and protect organisation information assets from intentional or unintentional acts or natural events which may result in their unauthorised disclosure, modification, destruction of information Why? Information is an essential resource Government generates and manages a huge amount of information Protecting such information is a major challenge Increasing risks posed by rapid technological development & the widespread opening up of networks

The first steps (II)- 2000 Cmtee Objective review existing security standards worldwide make recommendations for the adoption of a suitable standard for the Government Scope of the standard identify the weaknesses of government systems provide security measures to avoid financial losses, data losses and overall failure of systems Committee recommendations Adopt ISO/IEC 17799 standard Capacity Building on ISO/IEC 17799 Conduct pilot implementations CONSULTANCY

The first steps (III) February 2002- Govt. approval to implement ISO/IEC 17799 in Civil Service September 2002- a tender for consultancy services is floated Tender is awarded to E-Commerce Institute LLC Europe Mr W. List & Dr D. Brewer October 2003 to April 2004

Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Service

ISMS : Information Security Management System Implement effective information security that really meets business requirements Manage risks to suit the business circumstances Manage incident handling activities Build a security culture Conform to the requirements of the standards

Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Service

Approach ISMS built by people who will own it Training to ALL involved with the ISMS Use of Skeleton ISMS to fast Track creation of actual ISMS manual Standard elements are already provided customise them ISMS is in hypertext local web site with facility to refer to existing documents (hardcopies or softcopies) Templates to assist in internal audits, management reviews etc. Version control

Approach Skeleton ISMS Develop Risk Treatment Plans in very user friendly way Tell a story on what is identified as a critical security event/concern say what can cause it (threat) what assets are affected what is the consequential impact Then continue by elaborating how the chances of this event occurring is actually mitigated (risk treatment) until the risks are acceptable or the possibility of the event occurring is reduced to zero To-Do-List : a practical way to manage implementation of improvements and additional security requirements

Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Services

Training Teams developing ISMSs in pilot sites Drafting of ISMSs of pilot sites is initiated in training Management staff at pilot sites How to proceed with ISMS use & maintenance Team that will conduct Internal Audits Requirement of standards

2003/4 Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Services

Implementation at pilot sites Use skeleton ISMS drafted in training as starting point Team working sessions to complete RTPs Review of work by consultants Team working sessions to map the controls in the Statement of Applicability to RTPs Law or Government wide policy Organisation level policy Write down is done as a general rule Team working sessions to complete other aspects ISMS Consultants reviewed ISMS as a whole

2003/4 Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Services

Audit of pilot sites Internal audits Conducted by trained CIB/CISD staff MSB mock audit Passed desktop audit No major non conformities in implementation audit

Feedback from pilot sites Security Awareness Higher Confidence Security Culture Improved Security Enriching experience Feeling of Satisfaction

Objectives Provide a practical approach to implementing ISO/IEC 17799 in the Civil Service Train staff in standards implementation and auditing Implement standards at four pilot sites Audit and make recommendations on certification for pilot sites Recommend approach for rollout of standards in Civil Services

Some of the Recommendations Set up an institutional Framework IT Security Unit at MITT to facilitate ISMS development & conduct internal audits Higher instance at PMO Security Division level Establish a high level Civil Service Wide ISMS with all common functions Facilitate & speed up ISMS elaboration in Mins/Depts Easier to propagate changes in common functions Prioritise Mins/Depts sites for ISMS implementations Seek certification services from national bodies Adopt information security standards at National Level

Achievements IT Security Unit creation August 2004 Follow-up with pilot sites Additional ISMS site done in 2005 Liaise with other Government institutions PMO, CIB, CISD, NCB (GOC) National Audit Office, Internal Control, Police IT Unit, SLO Consultancy for Civil Service Wide ISMS - 2006 Civil Service wide ISF set up at highest instances priority sites for rollout 3 new ISMSs have been initiated National Standard ISO/IEC 17799 adopted in early 2005 ISO/IEC 27001 adoption is in progress Mauritius Standards Bureau is getting ready to certify sites

IT Security Unit Set up in August 2004 under the aegis of the Ministry of IT & Telecommunications Mandate Implement Government policies in regard to IT Security Assist Ministries/Departments in the implementation of security standards Disseminate information on IT security Carry out security audits

What is next Certification for 5-8 sites 4 pilot sites of 2004 to conform to ISO 27001 Facilitate ISMS development in priority sites identified at the level of the Civil Service Wide ISF Maintain the Civil Service wide ISMS Integrated management systems

End Note Information Security is not an IT issue it is a business issue There is no such thing as 100% security we can only strive to remain within the limits of acceptable risks Information security is a journey on which Government has embarked and is moving on smoothly