SOA ISO 27001 2005 Statement of Applicability A.5 Security A.5.1 Information Security A.5.1.1 A.5.1.2 Information security policy document Review of the information security policy A.6 Organisation of Information Security Security has been approved by the Data Centre manager. The Security is reviewed for continuing applicability at intervals not exceeding 12 months. Security AGS Review of Information Security A.6.1 Internal Organization A.6.1.1 Management Commitment to Information Security Management have demonstrated their commitment to information security by the allocation of resources and investment in their people. Management commitment A.6.1.2 Information Security Co-ordination Within the data centre, all information security activities Information Security Reference: ISO27001:2005 1
A.6.1.3 A.6.1.4 Allocation of Information Security Responsibilities Authorisation Process for Information Processing Facilities are co-ordinated. All Staff need to fully understand their responsibilities and procedures related to information security. A change request is required for any new processing facilities A.6.1.5 Confidentiality Agreements Confidentiality Agreements for the protection of information are identified and regularly reviewed A.6.1.6 Contact with Authorities N Unnecessary owing to scope of registration N/A A.6.1.7 Contact with special interest groups N Unnecessary owing to scope of registration ( rely on automatic update for security and anti-virus protection ) A.6.1.8 Independent review of information security This is conducted at least once a year by an internal/ external independent body. Forum Roles And Responsibilities Change Request and Procedure Confidentially Agreement N/A Audit Procedure A.6.2 External Parties A.6.2.1 A.6.2.2 Identification of Risks related to external Parties Addressing security when dealing with customers External parties have access to the data centre. Security in Third Party Agreements Customers have access to the data centre. Dealing with Customer Access A.6.2.3 Addressing security in third party agreements Third party controls employed. Security in Third Party Agreements Reference: ISO27001:2005 2
A.7 Asset Management A.7.1 Responsibility for Assets A.7.1.1 Inventory of assets A record of all information assets are kept on-site Risk Assessment Report And Asset Register A.7.1.2 Ownership of assets All assets in the scope of this registration are owned by the Technical Director. A.7.1.3 Acceptable use of assets Acceptable use of assets is laid down in the policies & procedures of the system. Risk Assessment Report And Asset Register Acceptable Use of Assets A.7.2 Information Classification A.7.2.1 Classification guidelines All data is held electronically and is application specific Information Handling A.7.2.2 Information labelling and handling Impractical and unnecessary Information Handling Reference: ISO27001:2005 3
A.8 Human Resources Security A.8.1 Prior to employment A.8.1.1 Roles and responsibilities All employees have job descriptions defining their roles and responsibilities. Roles responsibilities A.8.1.2 Screening Data centre standards require independent references be sought prior to commencement of employment. Verification of the accuracy of CVs is also undertaken and identity checks. A.8.1.3 Terms and conditions of employment All employees have Job security responsibilities included in their terms and conditions of employment Screening. Terms And Conditions. A.8.2 During employment A.8.2.1 Management responsibilities All applicable personal made aware of their responsibilities with regard to security A.8.2.2 Information security awareness, education and training All staff receive on-site security training with regards to ISO27001 where needed A.8.2.3 Disciplinary process All staff have been made fully aware of their responsibilities regarding information security Roles and responsibilities Roles and Responsibilities Disciplinary Process Reference: ISO27001:2005 4
A.8.3 Termination or change of employment A.8.3.1 Termination responsibilities To prevent unauthorized access following termination of employment contract. Termination Of Employment. A.8.3.2 Return of assets To ensure return of all company assets Return of Assets A.8.3.3 Removal of access rights To ensure no unauthorized access following termination of employment contract. User Access Management A.9 Physical and environmental security A.9.1 Secure areas A.9.1.1 Physical Security Perimeter The building is situated in a business park and perimeter controls are in place. Physical Secure Perimeter A.9.1.2 Physical Entry Controls Controlled access to all areas is necessary Securing Offices Rooms and Facilities A.9.1.3 Securing Offices & Rooms and facilities To prevent unauthorised access to sensitive equipment Securing Offices Rooms and Facilities A.9.1.4 Protecting against external and environmental threats To ensure continuity of service Business Continuity Plan A.9.1.5 Working in Secure Areas Protection of both staff and equipment Working in Secure Areas A.9.1.6 Public access, delivery and loading areas Deliveries are made to the data centre. Delivery and Loading Areas Reference: ISO27001:2005 5
A.9.2 Equipment Security A.9.2.1 Equipment siting and protection To protect against environmental and physical threats Equipment Siting And Protection Cabling security policy A.9.2.2 Supporting utilities Equipment running twenty four hours seven days a week Supporting Utilities A.9.2.3 Cabling security False floors to carry IT cabling Cabling Security A.9.2.4 Equipment maintenance Data centre requirement Equipment needs to be maintained to ensure continued availability. Maintenance schedules And Logs A.9.2.5 Security Of equipment off premises Home working by some staff. Mobile Computing A.9.2.6 Secure disposal or re-use of equipment All client data held electronically needs to be disposed of securely. Secure Disposal Reuse of Equipment A.9.2.7 Removal of property Authorised staff have removable IT equipment. Removal of Information/Property Reference: ISO27001:2005 6
A.10 Communications and operations management A.10.1 Operational procedures and responsibilities A.10.1.1 Documented operating procedures AGS employees will follow appropriate operating instructions Various Procedures/Polices as required by standard A.10.1.2 Change management Adopted as best practice. Change control procedure A.10.1.3 Segregation of duties To prevent unauthorised modification of IT systems or abuse of position A.10.1.4 Separation of development, test and operational facilities N No development done at/by the Data Centre. Segregation of Duties A.10.2 Third party service delivery management A.10.2.1 Service delivery 3 rd party services are used Contracts/SLA with providers A.10.2.2 Monitoring and review of third party services Monitoring & review take place to ensure continuity of service Security in Third Party Agreements A.10.2.3 Managing changes to third party services Managing changes to ensure continuity of service. Security in Third Party Agreements Reference: ISO27001:2005 7
A.10.3 System planning and acceptance A.10.3.1 Capacity management Growth is core to the business. Capacity management A.10.3.2 System acceptance To ensure all systems are acceptable prior to installation Change control policy A.10.4 Protection against malicious and mobile code A.10.4.1 Controls against malicious code Protection against malicious code Malicious Code Protection A.10.4.2 Controls against mobile code System administrators has access to DMZ zones DMZ zone A.10.5 Back- up A.10.5.1 Information back-up To prevent the permanent loss of important information assets Back-up A.10.6 Network security management A.10.6.1 Network controls Safeguarding of information in networks Network Usage A.10.6.2 Security of network services N Do not provide any network services Reference: ISO27001:2005 8
A.10.7 Media Handling A.10.7.1 Management of Removable Media There are times when information is stored temporary on removal media such as Laptops. A.10.7.2 Disposal of Media Need to make sure that no confidential information is leaked. Management Of Removal Media Disposal of media policy A.10.7.3 Information Handling Procedures To ensure business continuity and prevent disruption Information Handling A.10.7.4 Security of System Documentation Documentation held in both hard and electronic format Security of System Documentation A.10.8 Exchange of information A.10.8.1 Information exchange policies and procedures Contracts requirement Information Exchange Policies and Procedures A.10.8.2 Exchange agreements Contracts requirement Information Exchange Policies and Procedures A.10.8.3 Physical media in transit y Tape backup transported to AGS Fire Safe Backup policy A.10.8.4 Electronic messaging All staff have access to a company e-mail account Security in email documents policy A.10.8.5 Business information systems N No interconnected business systems N/A Reference: ISO27001:2005 9
A.10.9 Electronic commerce services A.10.9.1 Electronic Commerce N No E-commerce facilities used in ISMS A.10.9.2 On-line transactions N No E-commerce facilities used in ISMS A.10.9.3 Publicly available information All information has a security classification Information Handling A.10.10 Monitoring A.10.10.1 Audit logging User activities, exceptions, and information security events are recorded and kept for an agreed period to assist in future investigations and access control monitoring. Event Logging and Monitoring System Use. A.10.10.2 Monitoring system use Procedures have been developed for monitoring system use. A.10.10.3 Protection of log information Generated log information are well protected against tampering and unauthorized access A.10.10.4 Administrator and operator logs System/Database Administrator activities are monitored and logged Event Logging and Monitoring System Use Event Logging and Monitoring System Use Event Logging and Monitoring System Use A.10.10.5 Fault logging A log of all faults is kept in the IT department Reporting Faults A.10.10.6 Clock synchronization All clocks are synchronised to GMT AGS Clock Synchronisation Reference: ISO27001:2005 10
A.11 Access control A.11.1 Business requirement for access control A.11.1.1 Access control policy For the protection of sensitive data and systems. Access control A.11.2 User access management A.11.2.1 User registration To prevent unauthorised access to information systems User Registration A.11.2.2 Privilege management Certain positions carry privileges Privilege Management A.11.2.3 User password management All applications need password protection Password Management A.11.2.4 Review of user access rights Required to be reviewed periodically User Access Management, Access Control A.11.3 User responsibilities A.11.3.1 Password use To ensure availability of systems Password Management A.11.3.2 Unattended user equipment By User Equipment we mean the administrators workstations. Clear Desk and Screening policy A.11.3.3 Clear desk and clear screen policy Although assets are sited in a secure area, information Clear Desk and Reference: ISO27001:2005 11
displayed on screen (or on paper) may be confidential. Screening policy A.11.4 Network access control A.11.4.1 on use of network services Networked services available to authorised personnel Network Usage A.11.4.2 User authentication for external connections Home workers use Dial in services for remote access Network Usage A.11.4.3 Equipment identification in networks Automatic identification is used for servers and networks Dell open managed A.11.4.4 Remote diagnostic and configuration port protection Remote diagnostic and configuration access, via Dell open managed A.11.4.5 Segregation in networks Networks segregated for the control of unauthorised access A.11.4.6 Network connection control To control access in accordance with the access control policy Dell open managed Network Usage Network Usage A.11.4.7 Network routing control To prevent unauthorised access in shared networks Network Usage A.11.5 Operating system access control A.11.5.1 Secure log on procedures To control and manage user access Password Management A.11.5.2 User identification and authentication To maintain records and monitor unauthorised activities Password Management A.11.5.3 Password management system N To control and manage user passwords N/A A.11.5.4 Use of system utilities N No utility programs are allowed to run on application N/A Reference: ISO27001:2005 12
servers A.11.5.5 Session time out N Only administrators can access the operating systems of the servers via their desk tops. The Desktop are sited in a secure environment with controlled access. Hence having a session time-out policy is not deemed necessary at this time. A.11.5.6 Limitation of connection time N Only administrators can access the operating systems of the servers via their desk tops. The Desktop are sited in a secure environment with controlled access. Hence having a connection time limit is not deemed necessary at this time. N/A N/A A.11.6 Application and information access control A.11.6.1 Information access restriction A need to know policy is employed Information Handling A.11.6.2 Sensitive system isolation All systems are treated as sensitive Access Control A.11.7 Mobile Computing and teleworking A.11.7.1 Mobile Computing and communications Used by system administrators to identify system failures and restart essential services after failure A.11.7.2 Teleworking N AGS staff do not do teleworking. N/A Mobile Computing Reference: ISO27001:2005 13
A.12 Information systems acquisition, development and maintenance A.12.1 Security requirements of information systems A.12.1.1 Security Requirements Analysis and Specification Data centre does not do any development maintenance or support of application system software. However any enhancements to hardware (i.e. extra disks, etc) require a change request. Change Request A.12.2 correct processing in applications A.12..2.1 Input Data Validation N Data centre does not do any development maintenance or support of application system software A.12.2.2 Control of Internal Processing N Data centre does not do any development maintenance or support of application system software A.12.2.3 Message integrity N Data centre does not do any development maintenance or support of application system software A.12.2.4 Output Data Validation N Data centre does not do any development maintenance or support of application system software A.12.3 Cryptographic controls A.12.3.1 on the Use of Cryptographic Controls N Cryptographic Controls are application specific and not supported by AGS A.12.3.2 Key Management N Cryptographic Controls are application specific and not supported by AGS Reference: ISO27001:2005 14
A.12.4 Security of system files A.12.4.1 Control of Operational Software To prevent unauthorised change control Change control policy A.12.4.2 Protection of System Test Data N Data centre does not do any development maintenance or support of application system software A.12.4.3 Access Control to Program Source code Source code held as back up only. Backup Procedure A.12.5 Security in development and support processes A.12.5.1 Change Control Procedures Any data centre asset change requires a change request. Change control policy A.12.5.2 A.12.5.3 Technical Review of applications after Operating System Changes Restrictions on Changes to Software Packages Not in remit of data centre but do inform owners of applications of when operating systems changes have been made. N Software packages are not used by AGS. ( Application software controlled by change control procedure ) A.12.5.4 Information leakage Opportunities for information leakage need to be prevented A.12.5.5 Outsourced Software Development N Software development is not done by AGS. N/a Maintenance schedules And Logs Access control policy A.12.6 Technical vulnerability management A.12.6.1 Control of technical vulnerabilities Technical vulnerabilities need to be managed Risk Assessment Reference: ISO27001:2005 15
A.13 Information security incident management A.13.1 Reporting information security events and weaknesses A.13.1.1 Reporting information security events All security problems are notified to the Data Centre Manager. A.13.1.2 Reporting security weaknesses All security problems are notified to the Data Centre Manager. Reporting Security Incidents Procedure Reporting Security Incidents Procedure A.13.2 Management of information security incidents and improvements A.13.2.1 Responsibilities and procedures Responsibilities and procedures need to be clearly defined Roles and Responsibilities Reporting Security Incidents Procedure A.13.2.2 Learning from information security incidents Lessons learned need evaluating to prevent further incidents Learning from Security Incidents A.13.2.3 Collection of evidence Collection of evidence is required Learning from Security Incidents Reference: ISO27001:2005 16
A.14 Business Continuity Management A.14.1 Information security aspects of business continuity management A.14.1.1 Including information security in the business continuity management process To counteract major failures or Catastrophes Business Continuity Plans A.14.1.2 Business continuity and risk assessment To know that the strategy adopted is feasible, planned and effective A.14.1.3 Developing and implementing continuity plans including information security To ensure a structured and managed approach to restoring business functionality A.14.1.4 Business continuity planning framework N Single BCP in place at Aimes Grid Services (CIC) A.14.1.5 Testing, maintaining and re-assessing business continuity plans For on-going verification and validation of an effective approach to BCP Risk Assessment Procedure Business Continuity Plans Business Continuity Plan Test A.15 Compliance A.15.1 Compliance with legal requirements A.15.1.1 Identification of applicable legislation Legal/Mandatory requirement Compliance with Legal Requirements A.15.1.2 Intellectual property rights (IPR) ISMS only uses legal / licensed software Compliance with Legal Requirements A.15.1.3 Protection of organizational records ISMS complies with industry, legal and contract Compliance with Legal Reference: ISO27001:2005 17
A.15.1.4 A.15.1.5 Data protection and privacy of personal information Prevention of misuse of information processing facilities requirements ISMS is legally required to register all personnel records under the data protection act 1998 To ensure that all employees are aware of the policy on the use of company information processing facilities A.15.1.6 Regulation of cryptographic controls N Cryptography not used N/a Requirements Compliance with Legal Requirements Compliance with Legal Requirements A.15.2 Compliance with security policies and standards, and technical compliance A.15.2.1 Compliance with security policies and standards Management ensure all security procedures are carried out to correctly to achieve compliance with security policies and standards A.15.2.2 Technical compliance checking Conducted by an Audit specialists to ensure compliance with security policies and standards Audit procedure Audit Compliance A.15.3 Information systems audit considerations A.15.3.1 Information systems audit controls Internal audit team conduct regular audits of all policies and procedures adopted by the company to ensure effective implementation A.15.3.2 Protection of information system audit tools Controlled by IT manager to prevent misuse or compromise Reference: ISO27001:2005 18