Our client wanted to determine the extent to which it was following information security best practice to protect the data it processes, as a breach could have serious consequences both for the client and for the public.
It therefore commissioned an assessment of its current security practices, using the best-practice controls in Annex A of ISO 27001 as a benchmark.
ISO 27001 sets out the requirements for an information security management system (ISMS), a holistic approach to information security that comprises policies, procedures, guidelines, and associated resources and activities that protect an organisation’s information assets.
Annex A of ISO 27001 contains a comprehensive list of security controls, which are typically selected and implemented as part of the Standard’s risk management process.
Implementing an ISMS enables an organisation to secure its information in all forms, increase its resilience to cyber attacks, and, because it is based on a formally defined risk management process, adapt to evolving security threats and reduce the costs associated with information security.
It also helps an organisation demonstrate that it has implemented the “appropriate technical and organisational measures” required by the GDPR and DPA 2018.
(For organisations that want to go further, ISO/IEC 27701 was created with the aim of demonstrating compliance with data protection laws. Its requirements can be integrated with any ISMS.)
Independently audited certification to ISO 27001 is recognised around the world as an indication that an organisation has implemented and maintains information security best practice.
The first step of any ISO 27001 implementation project is to conduct a gap analysis to determine how far short of the Standard’s requirements your organisation’s existing information security practices fall.