ISO 27001 FOR POLICYWRITING

ISO/IEC 27001 is one of the most widely recognized frameworks adopted by organizations worldwide. Even if your career path isn’t directly aligned with GRC, having a solid understanding of ISO 27001 is highly beneficial.
This standard was developed to define the requirements an Information Security Management System (ISMS) must meet. It provides organizations with a structured approach to establishing, implementing, and continuously improving their ISMS.

Compliance with ISO 27001 is crucial for organizations as it demonstrates their commitment to data protection, risk management, and cybersecurity best practices. Adhering to this standard ensures that businesses have robust security measures in place, effectively managing threats while aligning with international best practices.

THE ISO 27001: 2022 comprises of 4 controls

a) Organizational controls, the general name for other details that don’t fall under people, physical, or technological
b) People controls, if it concerns people
c) Physical controls, if it concerns physical objects or things
d) Technological controls deal with technologies

Also has Annexes A and B

ISO DOMAIN CHECKLIST
A.5 Information security policies
A.6 Organization of information security
A.7 Human resource security
A.8 Asset management
A.9 Access control
A.10 Cryptography
A.11 Physical and environmental security
A.12 Operations security
A.13 Communications security
A.14 System acquisition, development, and maintenance
A.15 Supplier relationships (vendor and third-party)
A.16 Information security incident management
A.17 Information security aspects of business continuity management
A.18 Compliance

POLICY WRITING IN COMPLIANCE WITH ISO 27001

When writing a policy in alignment with the ISO framework, start by identifying the subject of the policy and reviewing the relevant domain within ISO standards to determine where it fits. This ensures that your policy is structured according to the appropriate guidelines.

For instance, if you’re tasked with drafting an Access Control policy or reviewing an existing policy for gap analysis, refer to ISO 27001 Section A.9 (Access Control) as a primary source.

If you are writing a Vendor or Third Party-related Policy, you should consider Section A:15 of the ISO 27001 to draw out needed information.

Additionally, other GRC frameworks may also guide access control. It’s essential to cross-reference these frameworks and incorporate relevant standards to strengthen your policy.
That said, which other GRC frameworks address Access Control?

Any policy involving data must comply with GDPR, and other local policies involving data processing in your country should be added.

DIFFERENT TYPES OF ISO AS RELATED TO GRC

  • ISO 37000 — Governance of Organizations (Provides principles and practices for effective governance).
  • ISO 38500 — Corporate IT Governance (Guidelines for governing IT in organizations).

Risk-Related ISO Standards

Leave a Reply

Your email address will not be published. Required fields are marked *

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://discoverdsl.com.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.

Save settings
Cookies settings