Get in Touch Close Menu

ISO 27001 Certification: Now is the Time to Consider the Benefits

19 November 2021

ISO/IEC 27001 is a standard set out by the International Standards Organisation that helps your organisation to manage the security of your information assets. This can be electronic/paper, reputational, applications, infrastructure, third parties, and more.

Additionally, the certification helps organisations formulate an information security management system (ISMS). This helps to mitigate the growing number of information and cyber attacks.

Sapphire: iso 27001 provides risk management via an iso certification

ISO/IEC 27001 Requirements

ISO/IEC 27001 requires an organisation to:
  • Define the scope of certification and examine the information security risks.
  • Design and implement a set of information security controls to mitigate these risks based on ISO 27002 (code of practice based on 14 guiding principles & up to 114 controls).
  • Adopt an information security forum (senior management process) to ensure that the information security risks and controls continue to meet the organisation’s information security needs on an ongoing basis.
  • Ensure that the ISMS framework has pragmatic policies and procedures undertaken consistently.

IT Governance suggests that:

The two most important activities when implementing ISO 27001 are:

Scoping your ISMS (clause 4.3), in which you define what information needs to be protected; and

Conducting a risk assessment and defining a risk treatment methodology (clause 6.12), in which you identify the threats to your information.

https://www.sapphire.net/iso-27001-compliance-standards/

ISO/IEC 27001 Deployment

The organisation can deploy ISO27001 to ensure the controls selected are appropriate to the risks and proportionate to organisational needs. Therefore, a growing number of SMEs are choosing to go through the certification process. This demonstrates to r trading partners that they take information and cyber security seriously and can prove that they are trustworthy because of the objective and rigour of the external certification.

ISO/IEC 27001 Process

The process can best be seen over several phases:
  1. A Current State Analysis of the policies & processes in place against the standard’s requirements to establish the gaps emerging that need to be addressed.
  2. Draw up a complete asset inventory of information related assets that can be risk assessed to understand the threats and vulnerabilities that need to be protected.
  3. Based on the gaps identified in the current state analysis, a security improvement needs to be established to guide the organisation towards building an effective ISMS.
  4. Undertake tailored training and awareness. Programme to guide senior managers and staff on what the standard demands to create an appropriate information and cyber security culture. This phase also needs to establish an internal audit certification process to ensure that internal assurance on the maintenance of the policies and procedures is maintained on an ongoing basis.
  5. Finally, a mock certification process needs to ensure the organisation is ready to face external certification.
Sapphire : iso 27001 provides stringent information security measures

Benefits of ISO 27001

IT Governance suggests that:

At the heart of an ISO 27001-compliant ISMS are business-driven risk assessments, which means you will be able to identify and treat security threats according to your organisation’s risk appetite and tolerance.

  1. Reduces the risk of financial and reputational damage.
  2. Support any bids and tenders with ISO 27001 requirements and provide us with a marketable offering.
  3. Improves the protection for the organisation, your suppliers, and the public.
  4. Supports your legal, regulatory and contractual obligations, e.g. GDPR (General Data Protection Regulation).
  5. Helps to manage risk and reduces possible information security incidents.
  6. It improves information security with better-defined roles and responsibilities and better governance in supplier management and selection areas.
  7. Improves the consistency in the delivery of IT services.
Sapphire: iso 27001 giving existing customers confidence

Why Now?

The code of practice (ISO/IEC 27002) on which the certification process is utilised to establish the required controls is currently being revised.

The revised control set will be published in early 2022. The revised ISO/IEC 27002 will be simpler to understand (only four guiding principles) and fewer controls to select from (93 instead of 114 controls). Therefore, it will be more attractive and less daunting for smaller organisations.

Sapphire: information security for data breaches

How can Sapphire help?

Sapphire has been assisting clients to achieve ISO/IEC 27001 certification for over 15 years. We have gained an enviable record of successful certificates across a wide range of organisations. Therefore, we can speed up the certification process with proven experts.

We can also design ‘generic’ policy templates to uplift your current arrangements. We can assist new clients in gaining certification through a clear phased approach. This will take the strain off your resources & enable straightforward ‘tailoring’ to your environment.

Get in touch with us for more information below!

Related Articles

AWS Buckets: There’s a Hole in my Bucket – Securing your Data in the Cloud 
6 September 2022

In 2021, AWS S3 accounted for roughly 60% of breaches.  

Like most data breaches, the AWS bucket incident resulted from an incorrectly configured bucket which exposed 36GB of data to the public. The information leaked included mortgage and customer demographics. 

Find Out More
Threat Intelligence on Recent Cyberattack by CL0P Ransomware Group   
24 August 2022

The CL0P ransomware group claimed responsibility for the attack on UK-based utility provider South Staffordshire Water. However, they have said there is no impact on the water supply or drinking water safety. 

On its extortion website, CL0P uploaded a vast collection of stolen papers. These included passport scans, spreadsheets with administrator passwords, drivers’ licences, and, concerningly, screenshots of administration interfaces of wastewater treatment systems.  

Find Out More
Build a Business Case for a MSSP
18 August 2022

There are two options for organisations to manage and protect to their systems from threats.

The first is in-house security management. An in-house option is one where you have a dedicated team or person responsible for managing your cybersecurity. Ordinarily, in-house staff would be led by a Head of IT or Chief Information Security Officer (CISO) (or similar).

The other option is outsourcing your cybersecurity as a managed service. 

Find Out More