Information Security Management System Overview
The latest version of the Information Security Management System (ISMS) is a risk-based system that considers the context of the organization concerning ISMS. It requires the organization to identify its internal issues, external issues, and the requirements of interested parties. These three elements lead to the identification of risks (uncertainties) and opportunities (a desirable twist of uncertainties into a favorable situation) within the organization's ISMS.
Assessing Risks and Opportunities
These risks need to be assessed based on predefined criteria (e.g., low risk, medium risk, high risk), and plans for actions on the risks and opportunities should be developed based on these criteria through appropriate controls. There are predefined controls in Annex A, following the ten clauses of the standard, which cover almost all types of InfoSec uncertainties. The organization can also choose to define and implement additional controls, although this is rarely required. Like any other management system, this standard also emphasizes a Plan-Do-Check-Act approach.
The latest version of the Information Security Management System (ISMS) is a risk-based system that considers the context of the organization concerning ISMS. It requires the organization to identify its internal issues, external issues, and the requirements of interested parties. These three elements lead to the identification of risks (uncertainties) and opportunities (a desirable twist of uncertainties into a favorable situation) within the organization's ISMS.
Assessing Risks and Opportunities
These risks need to be assessed based on predefined criteria (e.g., low risk, medium risk, high risk), and plans for actions on the risks and opportunities should be developed based on these criteria through appropriate controls. There are predefined controls in Annex A, following the ten clauses of the standard, which cover almost all types of InfoSec uncertainties. The organization can also choose to define and implement additional controls, although this is rarely required. Like any other management system, this standard also emphasizes a Plan-Do-Check-Act approach.