The key requirements of the standard
Organisation that implements ISO 27001-standard has to implement information security management system, as well as maintain and constantly improve it as required.2
For this purpose, it is required to create a management structure for the organisation in which information security is implemented and managed. In practice, this means organisation’s internal information security team, who takes care of the information security issues. Top management task is to ensure that the important role responsibilities and authorities related to information security are defined and communicated. Persons responsible must ensure the conformity of the information security and report on the performance of the information security management system. Information security work must be approached on a risk-based basis.
In addition, to ensure information security it is necessary to define protected property, for example those information systems, which are in use in the organisationthat and where the information security risk can occur. In the case of information systems, the user groups and persons responsible for the systems are also defined. Information security implementation plan illustrates the steps and follow-up of the practical implementation of the information security work, in order to ensure the achievement of the desired results. According to ISO 27001-standard, it is necessary to develop measures for the maintenance of information security as part of the continuous operation of the organisation. This is assisted by e.g. annual clock, to ensure that the information security is up-to-date at all times. For example, the future information security measures and their dates can be defined here.
Standard requirements also include preparing an information security policy . Preparing and documenting information security- and risk management policy take place separately, and ISO 27001 does not have requirements for them. Prepared information security policy will be available to stakeholders whenever needed, and it defines different practices to ensure information security. Instead, information security is done internally in two different ways. Information security instructions are prepared so that employees can behave securely. Employees may often be the “weakest link” in implementing information security, and even a good information security plan fails if employees can’t implement it. Information security guidelines have to be documented and available to everyone. Guidelines for information security management are prepared only for the information security team for more precise guiding in potential information security vulnerabilities.