How to gain and maintain ISO 27001 certification
GÉANT SIG ISM 1st Workshop, 2015-05-12, imperial.ac.uk
Urpo Kaila, Head of Security CSC – IT Center for Science ltd. urpo.kaila@csc.fi, security@csc.fi Public
How to gain and maintain ISO 27001 certification GANT SIG ISM 1 st - - PowerPoint PPT Presentation
Public How to gain and maintain ISO 27001 certification GANT SIG ISM 1 st Workshop, 2015-05-12, imperial.ac.uk Urpo Kaila, Head of Security CSC IT Center for Science ltd. urpo.kaila@csc.fi, security@csc.fi Agenda Introduction
GÉANT SIG ISM 1st Workshop, 2015-05-12, imperial.ac.uk
Urpo Kaila, Head of Security CSC – IT Center for Science ltd. urpo.kaila@csc.fi, security@csc.fi Public
2
3
Employees
Services
Administration Services
Services
(IaaS)
administration
– Previously IT Manager – Later Presales manager/ Technical director in an IT security company
– Previously manager for Internal IT, Datacenters – Information Security Manager – In charge of risk management, information security, operational security, incidents, security agreements, physical security, cyber security
– A Collaborative Data Infrastructure for European researchers to preserve, find, access, and process data in a trusted environment
5
colleagues and team
synchronization of large files B2DROP is a secure and trusted data exchange service for researchers and scientists to keep their research data synchronized and up-to-date and to exchange with other researchers. An ideal solution to:
e-Science Data Factory
a network of collaborating, cooperating centres, combining the richness of numerous community-specific data repositories with the permanence and persistence of some of Europe’s largest scientific data centres
8
– a building block of quality
10
11
– IT-Grundschutzhandbuch
12
13
14
productive ISMS and achieve certification
15
in use to achieve certification
achieving it – requires continuous improvement
16
A.6.1.5 Information security in project management A.12.6.2 Restrictions on software installation A.14.2.1 Secure development policy A.14.2.5 Secure system engineering principles A.14.2.6 Secure development environment A.14.2.8 System security testing A.15.1.1 Information security policy for supplier relationships A.15.1.3 Information and communication technology supply chain A.16.1.4 Assessment of and decision on information security events A.16.1.5 Response to information security incidents A.17.2.1 Availability of information processing facilities
17
A.5: Information security policies (2 controls) A.6: Organization of information security (7 controls) A.7: Human resource security – (6 controls) A.8: Asset management (10 controls) A.9: Access control (14 controls) A.10: Cryptography (2 controls) A.11: Physical and environmental security (15 controls) A.12: Operations security (14 controls) A.13: Communications security (7 controls) A.14: System acquisition, development and maintenance (13 controls) A.15: Supplier relationships (5 controls) A.16: Information security incident management (7 controls) A.17: Business continuity management (4 controls) A.18: Compliance; (8 controls)
18
– Approval of SOA – Internal audits/reviews – (Pre-audit)
– A systematic enquiry if SOA is compliant with the standard and implanted comprehensively – Management and staff are interviewed – Auditors gather systematically evidence to verify compliance with the standard – Verifying skills and security culture also a crucial part of the audit
19
20
21
22
23
24
25
– NOW we suddenly have very security conscious customers suggesting huge contract fines for security breaches
26
– The standard requires professional interpretation
– (contact me for improved templates)
least for some time (3-10 years)…
28
– TF-CSIRT, FIRST, (ISC)2, SANS, … – Currently a joint project with Finnish universities for security compliance and peer audits
– Cooperatin on service level, on organisational level and between infrastrucures (GÉANT/EUDAT/..) – Peer reviews? – Liaison with SCI?
29
30