ISO 27001 Information Security Management Standard - Clause 6.1

Posted by Craig Thornton

Part 17: Clause 6.1 Actions to address Risks and Opportunities

The ISO 27001 standard is built on a foundation of managing risks and opportunities.  Right there on page 1 of the standard, right in the introduction, it states:

The information security management system preserves the confidentiality, integrity and availability of information by applying a risk management process and gives confidence to interested parties that risks are adequately managed.

In other words, to give your clients the confidence that you are managing your information security well, you need to demonstrate that you have robust systems for managing risks and opportunities.

risk and opportunity

Make sure you spend time getting it right though!

You’re going to have to apply a lot of thought and foresight. The best way to make this happen is to spend time getting with your people to devise a system that works well for your business. 

A great place to start is to study ISO 31000.  This standard “ISO 31000:2018, Risk management – Guidelines” provides you with the principles, the framework and the process for managing risk.  Jump onto the www.ISO.org  store and grab a copy.  At USD90 it’s a bargain because it gives you all that you need to get started on your risk management journey.  This version has just been released (2018) and has best practice written right through it.

The risk process that it describes is straight forward.  At a high level it is:

  1. Define the scope, content and the risk criteria
  2. Ensure that staff are involved and participate.
  3. Conduct the risk assessment:
    1. Risk identification
    2. Risk Analysis
    3. Risk Evaluation.
  4. Determine the risk treatments.
  5. Monitor and continuously review progress.
  6. Make sure that it’s easy to record and report risks and opportunities.

Here at Mango we were fortunate that we had our risk management system was already in place.  We had developed one when we created our quality management system.  See how we did it in this blog

So using those same fundamentals we created a risk process for information security that used a risk criteria based on likelihood and consequences.  This helped create a list of risks based on priority.  The higher the likelihood and the higher the consequences, the higher the priority for that risk. 

Our opportunities were listed in our improvement module. These opportunities were then reported through our corrective and preventive action process.

You will find that the risk treatments are straight forward. This is because the ISO 27001 standard helps you greatly with this.  Annex A of the standard lists the controls for you.  There are 114 controls listed.  How easy is that!  The authors of this standard had great foresight to create that list just for you.  All you have to do is just flesh out some more detail for each control.

So, using Mango, we listed the risks in the Risk Management module and linked the controls to any necessary documented policy or procedure.  We then created an Information Security Risk Register. Our risk register has about 60 listed risks with applicable controls (risk treatments).  This register will be annually reviewed and audited.

This register provides a foundation for the rest of the information security management system.  It summarises a bunch of ISO 27001 clauses in one document.  Now all you need is the implement and maintain it.  Job done!

And there you have it.  ISO 31000 gives you both the fundamentals and the process of a great risk management system, and ISO 27001 Annex A gives you the controls you need.

Don’t over think it.  But work hard to get it right.

 

Takeaways

Here is a list of takeaways that will help you achieve this clause:

  1. Grab a copy of ISO 31000 and study it hard.
  2. Create a risk process using that standard.
  3. Put your opportunities into your improvement process.
  4. Create an easy-to-use risk criteria.
  5. List your risks and apply the risk criteria.
  6. Use ISO 27001 Annex A to help determine the risk treatments.
  7. Re-evaluate risks and opportunities on a regular basis.

 

Integrated_Management_System_manuel.jpg

 

View previous blogs in this series "ISO 27001 Information Security Management Standard":

ISO 27001 Information Security Management Standard: Principle 1 - Analysing the Protection of Your Information and then Applying Controls

ISO 27001 Information Security Management Standard: Principle 2 - Awareness of the Need for Information Security 

ISO 27001 Information Security Management Standard: Principle 3 - Assignment of Responsibility for Information Security

ISO 27001 Information Security Management Standard: Principle 4 - Incorporating Management Commitment and the Interests of Stakeholders

ISO 27001 Information Security Management Standard: Principle 5 - Enhancing Societal Values

ISO 27001 Information Security Management Standard: Principle 6 - Risk assessments determining appropriate controls to reach acceptable levels of risk

ISO 27001 Information Security Management Standard: Principle 7 - Security incorporated as an essential element of information networks and systems

ISO 27001 Information Security Management Standard: Principle 8 - Active prevention and detection of information security incidents

ISO 27001 Information Security Management Standard: Principle 9 - Ensuring a comprehensive approach to information security management 

 ISO 27001 Information Security Management Standard: Principle 10 - Continual reassessment of information security and making of modifications as appropriate

ISO 27001 Information Security Management Standard: Clauses 0, 0.1, 0.2, 1, 2 and 3 of ISO 27001:2013

ISO 27001 Information Security Management Standard: Clauses 4.1, 4.2, 4.3 and 4.4 of ISO 27001:2013 

ISO 27001 Information Security Management Standard: Clause 5.1 of ISO 27001:2013

ISO 27001 Information Security Management Standard: Clause 5.2 of ISO 27001:2013

ISO 27001 Information Security Management Standard: Clause 5.3 of ISO 27001:2013

Tags: Cybersecurity, ISO 27001, information security, ISO 27001 Certification