BS7799-2:2002 to ISO 27001:2005 ISMS Converter

38
BS7799-2:2002 to ISO 27001:2005 ISMS Converter INTRODUCTION Both ISO/IEC 17799:2000 and BS7799-2:2002 have now been replaced with new versions. ISO/IEC 17799:2000 has been comprehensively revised and re- issued as ISO/IEC 17799:2005. BS7799-2:2002 has been internationalised, with a number of small but important changes, as ISO/IEC 27001:2005. It will be dual-numbered, in the UK, as BS7799-2:2005 and it continues as the international specification for an ISMS (‘Information Security Management System’). Every organization that has a BS7799-2 certified (or registered) ISMS will need, over the period determined by its national accreditation body, to bring that ISMS into line with ISO 27001:2005. This tool is designed to help in doing that. SUMMARY OF CHANGES TO BS7799-2 While the changes to the body of BS7799-2 are relatively limited, they are reasonably significant in terms of the way in which the ISMS is developed and managed. These changes, which are described in detail in the ISMS converter section below, all contribute to a requirement for greater precision in scoping and in risk assessment, as well as strengthening the requirement for effective measurement, in the monitoring and reviewing components, and there is clarification of requirements in a number of detailed areas. The biggest and most significant change, of course, is that Annex A of ISO27001 (the controls annex) is now aligned with precisely with ISO17799:2005; this means that, in updating a BS7799-2 ISMS, the Statement of Applicability will need to be updated to align with that of ISO27001 (which will required a focused risk assessment process that recognises the additional requirements of ISO27001) and, therefore, the controls section of this converter is of critical importance in the ISMS conversion process. SUMMARY OF CHANGES TO ANNEX A (aligns with ISO/IEC 17799:2005) 1. 10 Clauses become 11 and the numbering of the clauses changes in order for Annex A to align exactly with ISO17799:2005. a. All the clauses around Information Security Incident Management, which were previously spread around the Annex, are now consolidated into the new clause. 2. 36 Control areas and controls have been either deleted or re-structured and moved to somewhere else in the Annex. These are highlighted here in red, with internal hyperlinks to an explanation of what has happened to the control. 3. 46 New control areas and controls added, which includes those that were deleted from elsewhere in the Annex, re-structured and re-inserted. The © IT Governance Ltd 2005v1 Page 1 of 38 www.itgovernance.co.uk [email protected]

Transcript of BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Page 1: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

INTRODUCTION

Both ISO/IEC 17799:2000 and BS7799-2:2002 have now been replaced with new versions. ISO/IEC 17799:2000 has been comprehensively revised and re-issued as ISO/IEC 17799:2005. BS7799-2:2002 has been internationalised, with a number of small but important changes, as ISO/IEC 27001:2005. It will be dual-numbered, in the UK, as BS7799-2:2005 and it continues as the international specification for an ISMS (‘Information Security Management System’). Every organization that has a BS7799-2 certified (or registered) ISMS will need, over the period determined by its national accreditation body, to bring that ISMS into line with ISO 27001:2005. This tool is designed to help in doing that. SUMMARY OF CHANGES TO BS7799-2

While the changes to the body of BS7799-2 are relatively limited, they are reasonably significant in terms of the way in which the ISMS is developed and managed. These changes, which are described in detail in the ISMS converter section below, all contribute to a requirement for greater precision in scoping and in risk assessment, as well as strengthening the requirement for effective measurement, in the monitoring and reviewing components, and there is clarification of requirements in a number of detailed areas. The biggest and most significant change, of course, is that Annex A of ISO27001 (the controls annex) is now aligned with precisely with ISO17799:2005; this means that, in updating a BS7799-2 ISMS, the Statement of Applicability will need to be updated to align with that of ISO27001 (which will required a focused risk assessment process that recognises the additional requirements of ISO27001) and, therefore, the controls section of this converter is of critical importance in the ISMS conversion process.

SUMMARY OF CHANGES TO ANNEX A (aligns with ISO/IEC 17799:2005)

1. 10 Clauses become 11 and the numbering of the clauses changes in order

for Annex A to align exactly with ISO17799:2005. a. All the clauses around Information Security Incident Management,

which were previously spread around the Annex, are now consolidated into the new clause.

2. 36 Control areas and controls have been either deleted or re-structured and moved to somewhere else in the Annex. These are highlighted here in red, with internal hyperlinks to an explanation of what has happened to the control.

3. 46 New control areas and controls added, which includes those that were deleted from elsewhere in the Annex, re-structured and re-inserted. The

© IT Governance Ltd 2005v1 Page 1 of 38

www.itgovernance.co.uk [email protected]

Page 2: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter new controls (the net increase in which is seven, from 127 to 134) are highlighted here in green

4. All the remaining controls have changes, ranging from minor (eg wording adjustments to bring the control into line with ISO17799:2005’s new format for controls) to major re-structuring. Those controls that have had a significant re-working are highlighted here in yellow.

5. The ISMS Converter provides a side by side comparison of the control areas and controls from Annex A of BS7799-2:2002 and ISO27001:2005. All control areas and control titles of the new Annex A comparator are here hyperlinked to the relevant text describing the control objective or control.

6. The text that describes the control area in detail, or describes how the control should be implemented (and this is the substantial part of the standard), is not included. This is the substantial part of the text of the standard that you will need to purchase – and you must purchase the standards if you have, or are planning to have, a certified ISMS. The wording contained in the standards is authoritative. There is a link below to the purchase page for this standard.

7. The numbering system used in the control listing is the numbering system from Annex A of ISO27001:2005.

You can order the standards (which are available in either hard copy or downloadable format) from the online shop at www.itgovernance.co.uk, or you can simply click on the links below to go straight to the individual product pages: ISO/IEC 17799:2005 ISO/IEC 27001:2005ISO/IEC 17799:2005 plus ISO/IEC 27001:2005

© IT Governance Ltd 2005v1 Page 2 of 38

www.itgovernance.co.uk [email protected]

Page 3: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

WHO NEEDS THE ISMS CONVERTER?

The primary purpose of ISMS Converter is to help you convert a Statement of Applicability from one which conforms to BS7799-2:2002, to one which conforms to ISO/IEC 27001:2005. You will need a copy of the standard to help you carry out this process correctly. CONVERSION PROCESS

Using the ISMS Converter for steps 2 and 3 below, the conversion process is relatively simple. The first five steps fall into the PLAN phase of the PDCA cycle. If you are converting an existing ISMS, you should treat the conversion process as a specific project, with its own PDCA cycle. If you are making changes in a current project, ahead of completion, then you should integrate the steps below into your existing PDCA cycle. 1. Revisit your top level information security policy, and ensure that it is

line with the detailed requirements of ISO27001. 2. Adapt the clauses of your manual and other ISMS documentation to

reflect the changes to the specification between BS7799-2:2002 and ISO27001:2005. Ensure that you refer to the standard itself to understand its precise requirements.

3. Initially retaining your original wording, re-structure your Statement of Applicability (‘SoA’) so that it reflects the sequence of the new Annex A as set out in the ISMS Converter – cut those control objectives or controls that have been retained but moved and paste them to their new positions in the sequence. The red-highlighted clauses in the ISMS Converter, which are ‘deleted’ from BS7799-2:2002, each have links that explain whether they were cut or moved and, if they were moved, where they have been moved to.

4. Work through your re-structured SoA, using the ISMS Converter to amend the text of your control objectives and controls so that they correctly reflect the new Annex A, and inserting the new control objectives and controls wherever they occur.

5. Assess, for each of the changed control objectives and controls, whether or not the ISMS that you have actually deployed meets the stated requirement of the new control. If it does, there is nothing further to do. If it does not, you need to precisely identify the gap between your current actual control and what is required by the new Annex A. You then need to repeat your risk assessment for the area and determine whether or nor you need to make changes to your implementation of the control or to your statement of its applicability to your specific circumstances.

6. Carry out a risk assessment, for each of the new control objectives and controls, to determine the extent to which you need to implement the recommended control or state the way(s) in which it is not applicable to your specific circumstances.

© IT Governance Ltd 2005v1 Page 3 of 38

www.itgovernance.co.uk [email protected]

Page 4: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 4 of 38

www.itgovernance.co.uk [email protected]

7. The DO phase of the PDCA cycle follows. This involves implementing the selected controls, using the implementation guidance from ISO17799:2005.

8. If this is a specific conversion project, focused CHECK and ACT phases should follow the DO phase, to ensure that the conversion has been successful and that an ISMS compatible with ISO27001:2005 has been successfully implemented. Internal audit might the appropriate process for ensuring this.

9. The rest of this tool consists, first, of a comparison of those clauses that have changed between BS7799-2:2002 and ISO17799:2005 and, second, of a side-by-side comparison of the clauses of Annex A in the two standards, together with details of the contents of those clauses and a description of each change.

Page 5: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 5 of 38

www.itgovernance.co.uk [email protected]

Comparison of clauses in BS7799-2:2002 and ISO27001:2005 – where there have been changes. Please note that the standard itself is the authoritative source of wording and reference must therefore be made to it. BS7799-2 clause BS7799-2:2002 Title Details of revised clause in ISO27001:2005 1.2 Application Paragraph 1 states that exclusions from clauses 4-8 are not acceptable Paragraph 2 describes the acceptable conditions for control exclusions 3 Definitions Definitions have been altered and updated 4.2.1 a) Define the scope of the ISMS ‘and boundaries’ has been added, with a reference to clause 1.2 4.2.1 c) Define a systematic approach The risk assessment must produce ‘comparable and reproducible

results’ 4.2.1 g) Select control objectives Extended to ensure that selection takes account of 4.2.1 c)’s criteria

for accepting risks and for legal, regulatory and contractual requirements

4.2.1 h) Prepare a Statement ofApplicability

J2) has been added, requiring the SoA to include the currently implemented controls and control objectives, with a reference to 4.2.1 e 2).

4.2.2 Implement & operate the ISMS D) has been added – requiring a definition of how to measure control effectiveness and how these measurements will be used to produce comparable and reproducible results

4.2.3 a) Execute monitoring and review procedures & other controls

‘to detect security events’ has been added

New c) has been added: ‘measure the effectiveness of controls’ 4.2.3 c) Review the level of residual risk Replaced by d): ‘review risk assessments at planned intervals and the

level of residual risk and acceptable risk, taking into account changes to effectiveness of implemented controls’

New g) has been added: ‘update security plans’ 4.3.1 General Paragraph 1 says that records must include management decisions,

Page 6: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 6 of 38

www.itgovernance.co.uk [email protected]

BS7799-2 clause BS7799-2:2002 Title Details of revised clause in ISO27001:2005 that actions are traceable to management decisions and policies, and that the recorded results are reproducible

Paragraph 2 says that the link from the selected control back to the risk assessment, the risk treatment process and the ISMS policy and objectives must be demonstrable

New d), description of risk assessment methodology to be included 4.3.1 e) Documented procedures Now 4.3.1 g) and requirement to measure effectiveness of controls

added 4.3.2 Control of documents New f): ‘ensure that documents are available’ New g): ‘ensuring that internal ISMS audits are conducted’ 6.1 to 6.3 Now numbered 7.1 to 7.3 7.1 to 7.3 Now numbered 8.1 to 8.3 6.2 Review input New (7.2) f): ‘results from effectiveness measurements’ added 6.3 Review output New (7.3) b): ‘update of the risk assessment and risk treatment plan’

added 6.3 c) Modification of procedures Redrafted (7.3 c)): Modification of procedures and controls that affect

information security, as necessary, to respond to internal or external events that may impact on the ISMS, including changes to contractual obligations’

New e): ‘improvement to how the effectiveness of controls is being measured’ added

6.4 Internal ISMS audits This is now numbered as clause 6 and is the reason for the earlier renumbering of clauses 6 & 7. The text of this clause is derived from 6.4 in BS7799-2:2002

7.3 Preventative action New (8.3) b) ‘evaluating the need for action to prevent occurrence of non-conformities’

Page 7: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Comparison of Annex A clause structure and titles

3. Struct

BS7799-2:2002 3. Security policy 4. Organizational security 5. Asset classification and

control 6. Personnel security 7. Physical and

environmental security 8. Communications and

operations management 9. Access control 10. Systems development and

maintenance 11. Business continuity

management 12. Compliance

ISO27001:2005 5. Security policy 6. Organization of

information security 7. Asset management

8. Human resources security 9. Physical and

environmental security 10. Communications and

operations management 11. Access control 12. Information systems

acquisition, development and maintenance

13. Information security incident management

14. Business continuity management

15. Compliance

© IT Governance Ltd 2005v1 Page 7 of 38

www.itgovernance.co.uk [email protected]

Page 8: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

5.1 Ipolic 5.1.1polic5.1.2infor

BS7799-2:2002

3. Security policy 3.1 Information security policy 3.1.1 Information security policy document 3.1.2 Review and evaluation

© IT Governance Ltd 2005v1

www.itgovernance.co.uk

BS7799-2:2002

4. Organizational security 4.1 Information security infrastructure 4.1.1. Management information security forum 4.1.2 Information security co-ordination 4.1.3 Allocation of information security responsibilities 4.1.4 Authorization process for information processing facilities 4.1.5 Specialist information security advice 4.1.6 Co-operation between organizations 4.1.7 Independent review of information security

6. Or

6.1 I 6.1.1comsecu6.1.2ordin6.1.3inforresp6.1.4for ifacil6.1.5agre6.1.66.1.7inter

ISO27001:2005

5. Security policy

nformation security y

Information security y document Review of the mation security policy

ISO27001:2005

ganization of information security

nternal organization

Management mitment to information rity Information security co-ation Allocation of mation security onsibilities Authorization process

nformation processing ities Confidentiality

ements Contact with authorities Contact with special est groups

Page 8 of 38

[email protected]

Page 9: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

ISO27001:2005

6. Organization of information security

6.2 External Parties 6.2.1 Identification of risks related to external parties 6.2.2 Addressing security when dealing with customers 6.2.3 Addressing security in third party agreements

BS7799-2:2002

4. Organizational security 4.2 Security of third party access 4.2.1 Identification of risks from third party access 4.2.2 Security requirements in third party contracts 4.3 Outsourcing 4.3.1 Security requirements in outsourcing contracts

© IT Governance Ltd 2005v1 Page 9 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

5. Asset classification and control

5.1 Accountability for assets 5.1.1 Inventory of assets 5.2 Information classification 5.2.1 Classification guidelines 5.2.2 Information labelling and handling

ISO27001:2005

7. Asset management 7.1 Responsibility for assets 7.1.1 Inventory of assets7.1.2 Ownership of assets7.1.3 Acceptable use of assets 7.2 Information classification 7.2.1 Classification guidelines7.2.2 Information labelling and handling

Page 10: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 10 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

6. Personnel security 6.1 Security in job definition and resourcing 6.1.1. Including security in job responsibilities 6.1.2 Personnel screening and policy 6.1.3 Confidentiality agreements 6.1.4 Terms and conditions of employment 6.2 User training 6.2.1 Information security education and training 6.3 Responding to security incidents and malfunctions 6.3.1 Reporting security incidents 6.3.2 Reporting security weaknesses 6.3.3 Reporting software malfunctions 6.3.4 Learning from incidents 6.3.5 Disciplinary process

ISO27001:2005

8. Human resources security 8.1 Prior to employment 8.1.1 Roles and responsibilities 8.1.2 Screening 8.1.3 Terms and conditions of employment 8.2 During employment 8.2.1 Management responsibilities8.2.2 Information security awareness, education and training 8.2.3 Disciplinary process 8.3 Termination or change of employment 8.3.1 Termination responsibilities8.3.2 Return of assets8.3.3 Removal of access rights

Page 11: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 11 of 38

www.itgovernance.co.uk

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

[email protected]

BS7799-2:2002

7. Physical and environmental security

7.1 Secure areas 7.1.1 Physical security perimeter 7.1.2 Physical entry controls 7.1.3 Securing offices, rooms and facilities 7.1.4 Working in secure areas 7.1.5 Isolated delivery and loading areas 7.2 Equipment Security 7.2.1 Equipment siting and protection 7.2.2 Power supplies 7.2.3 Cabling security 7.2.4 Equipment maintenance 7.2.5 Security of equipment off-premises 7.2.6 Secure disposal or re-use of equipment 7.3 General controls 7.3.1 Clear desk and clear screen policy 7.3.2 Removal of property

ISO27001:2005

9. Physical and environmental security

9.1 Secure areas 9.1.1 Physical security perimeter9.1.2 Physical entry controls9.1.3 Securing offices, rooms and facilities9.1.4 Protecting against external and environmental threats9.1.5 Working in secure areas9.1.6 Public access, delivery and loading areas 9.2 Equipment security 9.2.1 Equipment siting and protection9.2.2 Supporting utilities9.2.3 Cabling security9.2.4 Equipment maintenance9.2.5 Security of equipment off-premises9.2.6 Secure disposal or re-use of equipment 9.2.7 Removal of property

Page 12: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 12 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

8. Communications and operations management

8.1 Operational procedures and responsibilities 8.1.1 Documented operating procedures 8.1.2 Operational change control 8.1.3 Incident management procedures 8.1.4 Segregation of duties 8.1.5 Separation of development and operational facilities 8.1.6 External facilities management 8.2 System planning and acceptance 8.2.1 Capacity planning 8.2.2 System acceptance 8.3 Protection against malicious software 8.3.1. Controls against malicious software 8.4 Housekeeping 8.4.1 Information back-up 8.4.2 Operator logs 8.4.3 Fault logging 8.5 Network management 8.5.1 Network controls

ISO27001:2005

10. Communications and operations management

10.1 Operational procedures and responsibilities 10.1.1 Documented operating procedures10.1.2 Change management 10.1.3 Segregation of duties10.1.4 Separation of development, test and operational facilities 10.2 Third party service delivery management 10.2.1 Service delivery10.2.2 Monitoring and review of third party services10.2.3 Managing changes to third party services 10.3 System planning and acceptance10.3.1 Capacity planning10.3.2 System acceptance 10.4 Protection against malicious and mobile code 10.4.1 Controls against malicious code10.4.2 Controls against mobile code 10.5 Back-up 10.5.1 Information back-up 10.6 Network security management 10.6.1 Network controls10.6.2 Security of network services

Page 13: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 13 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

8. Communications and operations management

8.6 Media handling and security 8.6.1 Management of removable computer media 8.6.2 Disposal of media 8.6.3 Information handling procedures 8.6.4 Security of system documentation 8.7 Exchanges of information and software 8.7.1 Information and software exchange agreements 8.7.2 Security of media in transit 8.7.3 Electronic commerce security 8.7.4 Security of electronic mail 8.7.5 Security of electronic office systems 8.7.6 Publicly available systems 8.7.7 Other forms of information exchange

ISO27001:2005

10. Communications and operations management

10.7 Media handling 10.7.1 Management of removable media10.7.2 Disposal of media10.7.3 Information handling procedures10.7.4 Security of system documentation 10.8 Exchange of information 10.8.1 Information exchange policies and procedures10.8.2 Exchange agreements 10.8.3 Physical media in transit 10.8.4 Electronic messaging10.8.5 Business information systems 10.9 Electronic commerce services 10.9.1 Electronic commerce10.9.2 On-line transactions10.9.3 Publicly available information 10.10 Monitoring 10.10.1 Audit logging10.10.2 Monitoring system use10.10.3 Protection of log information10.10.4 Administrator and operator logs10.10.5 Fault logging 10.10.6 Clock synchronization

Page 14: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 14 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

9. Access control 9.1 Business requirement for access control 9.1.1. Access control policy 9.2 User access management 9.2.1 User registration 9.2.2 Privilege management 9.2.3 User password management 9.2.4 Review of user access rights 9.3 User responsibilities 9.3.1 Password use 9.3.2 Unattended user equipment 9.4 Network access control 9.4.1 Policy on use of network services 9.4.2 Enforced path 9.4.3 User authentication for external connections 9.4.4 Node authentication 9.4.5 Remote diagnostic port protection 9.4.6 Segregation in networks 9.4.7 Network connection control 9.4.8 Network routing control 9.4.9 Security of network services

ISO27001:2005

11. Access Control 11.1 Business requirement for access control 11.1.1. Access control policy 11.2 User access management 11.2.1 User registration11.2.2 Privilege management 11.2.3 User password management11.2.4 Review of user access rights 11.3 User responsibilities 11.3.1 Password use11.3.2 Unattended user equipment11.3.3 Clear desk and clear screen policy 11.4 Network access control 11.4.1 Policy on use of network services 11.4.2 User authentication for external connections11.4.3 Equipment identification in networks 11.4.4 Remote diagnostic and configuration port protection11.4.5 Segregation in networks11.4.6 Network connection control11.4.7 Network routing control

Page 15: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 15 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

9. Access control 9.5 Operating system access control 9.5.1 Automatic terminal identification 9.5.2 Terminal log-on procedures 9.5.3 User identification and authentication 9.5.4 Password management system 9.5.5 Use of system utilities 9.5.6 Duress alarm to safeguard users 9.5.7 Terminal time-out 9.5.8 Limitation of connection time 9.6 Application access control 9.6.1 Information access restriction 9.6.2 Sensitive system isolation 9.7 Monitoring system access and use 9.7.1 Event logging 9.7.2 Monitoring system use 9.7.3 Clock synchronization 9.8 Mobile computing and teleworking 9.8.1 Mobile computing 9.8.2 Teleworking

ISO27001:2005

11. Access control 11.5 Operating system access control 11.5.1 Secure log-on procedures 11.5.2 User identification and

authentication11.5.3 Password management system 11.5.4 Use of system utilities 11.5.5 Session time-out11.5.6 Limitation of connection time 11.6 Application and information access control 11.6.1 Information access restriction 11.6.2 Sensitive system

isolation 11.7 Mobile computing and teleworking 11.7.1 Mobile computing and communications11.7.2 Teleworking

Page 16: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002

10. Systems development and maintenance

10.1 Security requirements of systems 10.1.1. Security requirements analysis and specification 10.2 Security in application systems 10.2.1 Input data validation 10.2.2 Control of internal processing 10.2.3 Message authentication 10.2.4 Output data validation 10.3 Cryptographic controls 10.3.1 Policy on the use of cryptographic controls 10.3.2 Encryption 10.3.3 Digital signatures 10.3.4 Non-repudiation services 10.3.5 Key Management

ISO27001:2005

12. Information systems acquisition, development and

maintenance 12.1 Security requirements of information systems 12.1.1 Security requirements analysis and specification 12.2 Correct processing in applications 12.2.1 Input data validation12.2.2 Control of internal processing12.2.3 Message integrity12.2.4 Output data validation 12.3 Cryptographic controls 12.3.1 Policy on the use of cryptographic controls 12.3.2 Key management

© IT Governance Ltd 2005v1 Page 16 of 38

www.itgovernance.co.uk [email protected]

Page 17: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 17 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

10. Systems development and maintenance

10.4 Security of system files 10.4.1 Control of operational software 10.4.2 Protection of system test data 10.4.3 Access control to program source library 10.5 Security in development and support processes 10.5.1 Change control procedures 10.5.2 Technical review of operating system changes 10.5.3 Restrictions on changes to software packages 10.5.4 Covert channels and Trojan code 10.5.5 Outsourced software development

ISO27001:2005

12. Information systems acquisition, development and

maintenance 12.4 Security of system files 12.4.1 Control of operational software12.4.2 Protection of system test data12.4.3 Access control to program source code 12.5 Security in development and support processes 12.5.1 Change control procedures12.5.2 Technical review of applications after operating system changes12.5.3 Restrictions on changes to software packages12.5.4 Information leakage 12.5.5 Outsourced software development 12.6 Technical vulnerability management 12.6.1 Control of technical vulnerabilities

Page 18: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 18 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

ISO27001:2005

13. Information security incident management

13.1 Reporting information security events and weaknesses 13.1.1 Reporting information security events13.1.2 Reporting security weaknesses 13.2 Management of information security incidents and improvements 13.2.1 Responsibilities and procedures13.2.2 Learning from information security incidents13.2.3 Collection of evidence

ISO27001:2005

14. Business continuity management

14.1 Information security aspects of business continuity management 14.1.1 Including information security in the business continuity management process14.1.2 Business continuity and risk assessment14.1.3 Developing and implementing continuity plans including information security14.1.4 Business continuity planning framework14.1.5 Testing, maintaining and re-assessing business continuity plans

BS7799-2:2002

11. Business continuity management

11.1 Aspects of business continuity management 11.1.1. Business continuity management process 11.1.2 Business continuity and impact analysis 11.1.3 Writing and implementing continuity plans 11.1.4 Business continuity planning framework 11.1.5 Testing, maintaining and re-assessing business continuity plans

Page 19: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v1 Page 19 of 38

www.itgovernance.co.uk [email protected]

BS7799-2:2002

12. Compliance 12.1 Compliance with legal requirements 12.1.1. Identification of applicable legislation 12.1.2 Intellectual property rights (IPR) 12.1.3 Safeguarding of organizational records 12.1.4 Data protection and privacy of personal information 12.1.5 Prevention of misuse of information processing facilities 12.1.6 Regulation of cryptographic controls 12.1.7 Collection of evidence 12.2 Reviews of security policy and technical compliance 12.2.1 Compliance with security policy 12.2.2 Technical compliance checking 12.3 System audit considerations 12.3.1 System audit controls 12.3.2 Protection of system audit controls

ISO27001:2005

15. Compliance 15.1 Compliance with legal requirements 15.1.1. Identification of applicable legislation15.1.2 Intellectual property rights (IPR)15.1.3 Protection of organizational records15.1.4 Data protection and privacy of personal information15.1.5 Prevention of misuse of information processing facilities15.1.6 Regulation of cryptographic controls

15.2 Compliance with security policies and standards and technical compliance 15.2.1 Compliance with security policies and standards15.2.2 Technical compliance checking 15.3 Information systems audit considerations 15.3.1 Information systems audit controls15.3.2 Protection of information systems audit controls

Page 20: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Control objectives (in bold) and controls for Annex A of ISO27001:2005 Clause Title Control objective/control 5.1 Information security policy To provide management direction and support for information

security in accordance with business requirements and relevant laws and regulations

5.1.1 Information security policy document An information security policy document should be approved by management, published and communicated to all employees and relevant external parties

5.1.2 Review of the information security policy The information security policy should be reviewed at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness

6.1 Internal organization To manage information security within the organization 6.1.1 Management commitment to information

security Management should actively support security within the organization through clear direction, demonstrated commitment, explicit assignment and acknowledgement of information security responsibilities.

6.1.2 Information security co-ordination Information security activities should be co-ordination by representatives from different parts of the organization with relevant roles and job functions

6.1.3 Allocation of information securityresponsibilities

All information security responsibilities should be clearly defined

6.1.4 Authorization process for information processing facilities

A management authorization process for new information processing facilities should be defined and implemented

© IT Governance Ltd 2005v2.2 Page 20 of 38

www.itgovernance.co.uk [email protected]

Page 21: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control 6.1.5 Confidentiality agreements Requirements for confidentiality or non-disclosure agreements

reflecting the organization’s needs for the protection of information should be identified and regularly reviewed

6.1.6 Contact with authorities Appropriate contacts with relevant authorities should be maintained 6.1.7 Contact with special interest groups Appropriate contacts with special interest groups or other specialist

security forums and professional associations should be maintained 6.1.8 Independent review of information security The organization’s approach to managing information security and its

implementation (ie control objectives, controls, policies, rules, processes and procedures for information security) should be reviewed independently and at planned intervals, or when significant changes to the security implementation occur

6.2 External parties To maintain the security of the organization’s information and information processing facilities that are accessed, processed, communicated to, or managed by external parties

6.2.1 Identification of risks related to external parties

The risks to the organization’s information and information processing facilities from business processes involving external parties should be identified and appropriate controls implemented before granting access

6.2.2 Addressing security when dealing with customers

All identified security requirements should be addressed before giving customers access to the organization’s information or assets

6.2.3 Addressing security in third party agreements

Agreements with third parties involving accessing, processing, communicating or managing the organization’s information or information processing facilities, or adding products or services to information processing facilities, should cover all relevant security requirements

7.1 Responsibility for assets To achieve and maintain appropriate protection of organizational

© IT Governance Ltd 2005v2.2 Page 21 of 38

www.itgovernance.co.uk [email protected]

Page 22: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control assets

7.1.1 Inventory of assets All assets should be clearly identified, and an inventory of all important assets drawn up and maintained

7.1.2 Ownership of assets All information and assets associated with information processing facilities should be ‘owned’ by a designated part of the organization

7.1.3 Acceptable use of assets Rules for the acceptable use of information and assets associated with information processing facilities should be identified, documented and implemented

7.2 Information classification To ensure that information receives an appropriate level of protection

7.2.1 Classification guidelines Information should be classified in terms of its value, legal requirements, sensitivity and criticality to the organization

7.2.2 Information labelling and handling An appropriate set of procedures for information labelling and handling should be developed and implemented in accordance with the classification scheme adopted by the organization

8.1 Prior to employment To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, to reduce the risk of theft, fraud or misuse of facilities

8.1.1 Roles and responsibilities Security roles and responsibilities of employees, contractors and third party users should be defined and documented in accordance with the organization’s information security policy

8.1.2 Screening Background verification checks on all candidates for employment, contractors and third party users should be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be

© IT Governance Ltd 2005v2.2 Page 22 of 38

www.itgovernance.co.uk [email protected]

Page 23: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control accessed, and the perceived risks

8.1.3 Terms and conditions of employment As part of their contractual obligation, employees, contractors and third party users should agree and sign the terms and conditions of their employment contract, which should state their and the organization’s responsibility for information security

8.2 During employment To ensure that employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error.

8.2.1 Management responsibilities Management should require employees, contractors and third party users to apply security in accordance with the established policies and procedures of the organization

.8.2.2 Information security awareness, education and training

All employees of the organization and, where relevant, contractors and third party users should receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job function

8.2.3 Disciplinary process There should be a formal disciplinary process for employees who have committed a security breach

8.3 Termination or change of employment To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner

8.3.1 Termination responsibilities Responsibilities for performing employment termination should be clearly defined and assigned

8.3.2 Return of assets All employees, contractors and third party users should return all of the organization’s assets in their possession upon termination of their employment, contract or agreement

© IT Governance Ltd 2005v2.2 Page 23 of 38

www.itgovernance.co.uk [email protected]

Page 24: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control 8.3.3 Removal of access rights The access rights of all employees, contractors and third party users of

information and information processing facilities should be removed upon termination of their employment, contract or agreement, or adjusted upon change

9.1 Secure areas To prevent unauthorized physical access, damage and interference to the organization’s premises and information

9.1.1 Physical security perimeter Security perimeters (barriers such as walls, card controlled entry gates or manned reception desks) should be used to protect areas that contain information and information processing facilities

9.1.2 Physical entry controls Secure areas should be protected by appropriate entry controls to ensure that only authorized personnel are allowed access

9.1.3 Securing offices, rooms and facilities Physical security for offices, rooms and facilities should be designed and applied

9.1.4 Protecting against external andenvironmental threats

Physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster should be designed and applied

9.1.5 Working in secure areas Physical protection and guidelines for working in secure areas should be designed and applied

9.1.6 Public access, delivery and loading areas Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises should be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access.

9.2 Equipment security To prevent loss, damage, theft or compromise of assets and interruption to the organization’s activities

9.2.1 Equipment siting and protection Equipment should be sited or protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized

© IT Governance Ltd 2005v2.2 Page 24 of 38

www.itgovernance.co.uk [email protected]

Page 25: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control access

9.2.2 Supporting utilities Equipment should be protected from power failures and other disruptions caused by failures in supporting utilities

9.2.3 Cabling security Power and telecommunications cabling carrying data or supporting information services should be protected from interception or damage

9.2.4 Equipment maintenance Equipment should be correctly maintained to ensure its continued availability and integrity

9.2.5 Security of equipment off-premises Security should be applied to off-site equipment taking into account the different risks working outside the organization’s premises

9.2.6 Secure disposal or re-use of equipment All items of equipment containing storage media should be checked to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal

9.2.7 Removal of property Equipment, information or software should not be taken off-site without prior authorization

10.1 Operational procedures andresponsibilities

To ensure the correct and secure operation of information processing facilities

10.1.1 Documented operating procedures Operating procedures should be documented, maintained and made available to all users who need them

10.1.2 Change management Changes to information processing facilities and systems should be controlled

10.1.3 Segregation of duties Duties and areas of responsibility should be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets

10.1.4 Separation of development, test and operational facilities

Development, test and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system

© IT Governance Ltd 2005v2.2 Page 25 of 38

www.itgovernance.co.uk [email protected]

Page 26: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control 10.2 Third party service delivery management To implement and maintain the appropriate level of information

security and service delivery in line with third party service delivery agreements

10.2.1 Service delivery It should be ensured that the security controls, service definitions and delivery levels included in the third party service delivery agreement are implemented, operated and maintained by the third party

10.2.2 Monitoring and review of third party services

The services, reports and records provided by the third party should regularly monitored and reviewed and audits should be carried our regularly

10.2.3 Managing changes to third party services Changes to the provision of services, including maintaining and improving existing information security policies, procedures and controls, should be managed, taking account of the criticality of business systems and processes involved and re-assessment of risks

10.3 System planning and acceptance To minimize the risks of systems failures 10.3.1 Capacity management The use of resources should be monitored, tuned, and projections

made of future capacity requirements to ensure the required system performance

10.3.2 System acceptance Acceptance criteria for new information systems, upgrades and new versions should be established and suitable tests of the system(s) carried out during development and prior to acceptance

10.4 Protection against malicious and mobile code

To protect the integrity of software and information

10.4.1 Controls against malicious code Detection, prevention and recovery controls to protect against malicious code and appropriate user awareness procedures should be implemented

10.4.2 Controls against mobile code Where the use of mobile code is authorized, the configuration should

© IT Governance Ltd 2005v2.2 Page 26 of 38

www.itgovernance.co.uk [email protected]

Page 27: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control ensure that the authorized mobile code operates according to a clearly defined security policy, and unauthorized mobile code should be prevented from executing.

10.5 Back-up To maintain the integrity and availability of information and information processing facilities

10.5.1 Information back-up Back-up copies of information and software should be taken and tested regularly in accordance with the agreed back-up policy

10.6 Network security management To ensure the protection of information in networks and the protection of the supporting infrastructure

10.6.1 Network controls Networks should be adequately managed and controlled, in order to be protected from threats, and to maintain security for the systems and applications using the network, including information in transit

10.6.2 Security of network services Security features, service levels and management requirements of all network services should be identified and included in any network services agreement, whether those services are provided in-house or outsourced

10.7 Media handling To prevent the unauthorized disclosure, modification, removal or destruction of assets and interruption to business activities

10.7.1 Management of removable media There should be procedures in place for the management of removable media

10.7.2 Disposal of media Media should be disposed of securely and safely when no longer required, using formal procedures

10.7.3 Information handling procedures Procedures for the handling and storage of information should be established to protect this information from unauthorized disclosure or misuse

10.7.4 Security of system documentation System documentation should be protected against unauthorized

© IT Governance Ltd 2005v2.2 Page 27 of 38

www.itgovernance.co.uk [email protected]

Page 28: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control access

10.8 Exchange of information To maintain the security of information and software exchanged within an organization and with any external entity

10.8.1 Information exchange policies andprocedures

Formal exchange policies, procedures and controls should be in place to protect the exchange of information through the use of all types of communication facilities

10.8.2 Exchange agreements Agreements should be established for the exchange of information and software between the organization and external parties

10.8.3 Physical media in transit Media containing information should be protected against unauthorized access, misuse or corruption during transportation beyond an organization’s physical boundaries

10.8.4 Electronic messaging Information involved in electronic messaging should be appropriately protected

10.8.5 Business information systems Policies and procedures should be developed and implemented to protect information associated with the interconnection of business information systems

10.9 Electronic commerce services To ensure the security of electronic commerce services, and their secure use

10.9.1 Electronic commerce Information involved in electronic commerce passing over public networks should be protected from fraudulent activity, contract dispute, and unauthorized disclosure and modification

10.9.2 On-line transactions Information involved in on-line transactions should be protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized message duplication or replay

10.9.3 Publicly available information The integrity of information being made available on a publicly available system should be protected to prevent unauthorized

© IT Governance Ltd 2005v2.2 Page 28 of 38

www.itgovernance.co.uk [email protected]

Page 29: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control modification

10.10 Monitoring To detect unauthorized information processing activities 10.10.1 Audit logging Audit logs recording user activities, exceptions and information

security events should be produced and kept for an agreed period to assist in future investigations and access control monitoring

10.10.2 Monitoring system use Procedures for monitoring use of information processing facilities should be established and the results of the monitoring activities reviewed regularly

10.10.3 Protection of log information Logging facilities and log information should be protected against tampering and unauthorized access

10.10.4 Administrator and operator logs System administrator and system operator activities should be logged 10.10.5 Fault logging Faults should be logged, analysed and appropriate action taken 10.10.6 Clock synchronization The clocks of all relevant information processing systems within an

organization or security domain should be synchronized with an agreed accurate time source

11.1 Business requirement for access control To control access to information 11.1.1 Access control policy An access control policy should be established, documented and

reviewed based on business and security requirements for access 11.2 User access management To ensure authorized users access and to prevent unauthorized

access to information systems 11.2.1 User registration There should be a formal user registration and de-registration

procedure for granting and revoking access to all information systems and services

11.2.2 Privilege management The allocation and use of privileges should be restricted and controlled 11.2.3 User password management The allocation of passwords should be controlled through a formal

management process

© IT Governance Ltd 2005v2.2 Page 29 of 38

www.itgovernance.co.uk [email protected]

Page 30: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control 11.2.4 Review of user access rights Management should review users’ access rights at regular intervals

using a formal process 11.3 User responsibilities To prevent unauthorized user access, and compromise or theft of

information and information processing facilities 11.3.1 Password use Users should be required to follow good security practices in the

selection and use of passwords 11.3.2 Unattended user equipment Users should ensure that unattended equipment has appropriate

protection 11.3.3 Clear desk and clear screen policy A clear desk policy for papers and removable storage media and a clear

screen policy for information processing facilities should be adopted 11.4 Network access control To prevent unauthorized access to networked services 11.4.1 Policy on use of network services Users should only be provided with access to the services that they

have been specifically authorized to use 11.4.2 User authentication for external

connections Appropriate authentication methods should be used to control access

by remote users 11.4.3 Equipment identification in the network Automatic equipment identification should be considered as a means

to authenticate connections from specific locations and equipment 11.4.4 Remote diagnostic and configuration port

protection Physical and logical access to diagnostic and configuration ports should be controlled

11.4.5 Segregation in networks Groups of information services, users and information systems should be segregated on networks

11.4.6 Network connection control For shared networks, especially those extending across the organization’s boundaries, the capability of users to connect to the network should be restricted, in line with the access control policy and requirements of the business applications

11.4.7 Network routing control Routing controls should be implemented for networks to ensure that

© IT Governance Ltd 2005v2.2 Page 30 of 38

www.itgovernance.co.uk [email protected]

Page 31: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control computer connections and information flows do not breach the access control policy of the business applications

11.5 Operating system access control To prevent unauthorized access to operating systems 11.5.1 Secure log-on procedures Access to operating systems should be controlled by a secure log-on

procedure 11.5.2 User identification and authentication All users should have a unique identifier (user ID) for their personal use

only, and a suitable authentication technique should be chosen to substantiate the claimed identity of a user

11.5.3 Password management system Systems for managing passwords should be interactive and should ensure quality passwords

11.5.4 Use of system utilities The use of utility programs that might be capable of overriding system and application controls should be restricted and tightly controlled

11.5.5 Session time-out Inactive sessions should be shut down after a defined period of inactivity

11.5.6 Limitation of connection time Restrictions on connection times should be used to provide additional security for high-risk applications

11.6 Application and information access control To prevent unauthorized access to information held in application systems

11.6.1 Information access restriction Access to information and application system functions by users and support personnel should be restricted in accordance with the defined access control policy

11.6.2 Sensitive system isolation Sensitive systems should have a dedicated (isolated) computing environment

11.7 Mobile computing and teleworking To ensure information security when using mobile computing and teleworking facilities

11.7.1 Mobile computing and communications A formal policy should be in place and appropriate security measures

© IT Governance Ltd 2005v2.2 Page 31 of 38

www.itgovernance.co.uk [email protected]

Page 32: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control should be adopted to protect against the risks of using mobile computing and communication facilities

11.7.2 Teleworking A policy, operational plans and procedures should be developed for teleworking activities

12.1 Security requirements of information systems

To ensure that security is an integral party of information systems

12.1.1 Security requirements analysis andspecification

Statements of business requirements for new information systems, or enhancements to existing information systems, should specify the requirements for security controls

12.2 Correct processing in applications To prevent errors, loss, unauthorized modification or misuse of information in applications

12.2.1 Input data validation Data input to applications should be validated to ensure that this data is correct and appropriate

12.2.2 Control on internal processing Validation checks should be incorporated into applications to detect any corruption of information through processing errors or deliberate acts.

12.2.3 Message integrity Requirements for ensuring authenticity and protecting message integrity in applications should be identified, and appropriate controls identified and implemented

12.2.4 Output data validation Data output from an application should be validated to ensure that the processing of stored information is correct and appropriate to the circumstances

12.3 Cryptographic controls To protect the confidentiality, authenticity or integrity of information by cryptographic means

12.3.1 Policy on the use of cryptographic controls A policy on the use of cryptographic controls for protection of its information should be developed and implemented

© IT Governance Ltd 2005v2.2 Page 32 of 38

www.itgovernance.co.uk [email protected]

Page 33: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control 12.3.2 Key management Key management should be in place to support the organization’s use

of cryptographic techniques 12.4 Security of system files To ensure the security of system files 12.4.1 Control of operational software There should be procedures in place to control the installation of

software on operational systems 12.4.2 Protection of system test data Test data should be selected carefully, and protected and controlled 12.4.3 Access control to program source code Access to program source code should be restricted 12.5 Security in development and support

processes To maintain the security of application system software and information

12.5.1 Change control procedures The implementation of changes should be controlled by the use of formal change control procedures

12.5.2 Technical review of applications after operating system changes

When operating systems are changed, business critical applications should be reviewed and tested to ensure there is no adverse impact on organizational operations or security

12.5.3 Restrictions on changes to software packages

Modifications to software packages should be discouraged, limited to necessary changes and all changes should be strictly controlled

12.5.4 Information leakage Opportunities for information leakage should be prevented 12.5.5 Outsourced software development Outsourced software development should be supervised and monitored

by the organization 12.6 Technical vulnerability management To reduce risks resulting from exploitation of published technical

vulnerabilities 12.6.1 Control of technical vulnerabilities Timely information about technical vulnerabilities of information

systems being used should be obtained, the organization’s exposure to such vulnerabilities evaluated, and the appropriate measures taken to address the associated risk

13.1 Reporting information security events and To ensure information security events and weaknesses associated

© IT Governance Ltd 2005v2.2 Page 33 of 38

www.itgovernance.co.uk [email protected]

Page 34: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

Clause Title Control objective/control weaknesses with information systems are communicated in a manner allowing

timely corrective action to be taken 13.1.1 Reporting information security events Information security events should be reported through appropriate

management channels as quickly as possible 13.1.2 Reporting security weaknesses All employees, contractors and third party users of information systems

and services should be required to note and report any observed or suspected weaknesses in systems or services

13.2 Management of information security incidents and improvements

To ensure a consistent and effective approach is applied to the management of information security incidents

13.2.1 Responsibilities and procedures Management responsibilities and procedures should be established to ensure a quick, effective and orderly response to information security incidents

13.2.2 Learning from information security incidents There should be mechanisms in place to enable the types, volumes and costs of information security incidents to be quantified and monitored

13.2.3 Collection of evidence Where a follow-up action against a person or organization after an information security incident involves legal action (either civil or criminal) evidence should be collected, retained and presented to conform to the rules for evidence laid down in the relevant jurisdiction(s)

14.1 Information security aspects of business continuity management

To counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption

14.1.1 Including information security in the business continuity management process

A managed process should be developed and maintained for business continuity throughout the organization that addresses the information security requirements needed for the organization’s business

© IT Governance Ltd 2005v2.2 Page 34 of 38

www.itgovernance.co.uk [email protected]

Page 35: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v2.2 Page 35 of 38

www.itgovernance.co.uk [email protected]

Clause Title Control objective/control continuity

14.1.2 Business continuity and risk assessment Events that can cause interruptions to business processes should be identified, along with the probability and impact of such interruptions and their consequences for information security

14.1.3 Developing and implementing continuity plans including information security

Plans should be developed and implemented to maintain or restore operations and ensure availability of information at the required level and in the required time scales following interruption to, of failure of, critical business processes

14.1.4 Business continuity planning framework A single framework of business continuity plans should be maintained to ensure all plans are consistent, to consistently address information security requirements, and to identify priorities for testing and maintenance

14.1.5 Testing, maintaining and re-assessing business continuity plans

Business continuity plans should be tested and updated regularly to ensure that they are up to date and effective

15.1 Compliance with legal requirements To avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements

15.1.1 Identification of applicable legislation All relevant statutory, regulatory and contractual requirements and the organization’s approach to meet these requirements should be explicitly defined, documented and kept up to date for each information system and the organization

15.1.2 Intellectual property rights (IPR) Appropriate procedures should be implemented to ensure compliance with legislative, regulatory and contractual requirements on the user of material in respect of which there may be intellectual property rights and on the use of proprietary software products

15.1.3 Protection of organizational records Important records should be protected from loss, destruction and falsification, in accordance with statutory, regulatory , contractual

Page 36: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter

© IT Governance Ltd 2005v2.2 Page 36 of 38

www.itgovernance.co.uk [email protected]

Clause Title Control objective/control and business requirements

15.1.4 Data protection and privacy of personal information

Data protection and privacy should be ensured as required in relevant legislation, regulations and, if applicable, contractual clauses

15.1.5 Prevention of misuse of information processing facilities

Users should be deterred from using information processing facilities for unauthorized purposes.

15.1.6 Regulation of cryptographic controls Cryptographic controls should be used in compliance with all relevant agreements, laws and regulations

15.2 Compliance with security policies and standards and technical compliance

To ensure compliance of systems with organizational security policies and standards

15.2.1 Compliance with security policy and standards

Managers should ensure that all security procedures within their area of responsibility are carried out correctly to achieve compliance with security policies and standards

15.2.2 Technical compliance checking Information systems should be regularly checked for compliance with security implementation standards

15.3 Information systems audit considerations To maximise the effectiveness of and to minimize interference to/from the information systems audit process

15.3.1 Information systems audit controls Audit requirements and activities involving checks on operational systems should be carefully planned and agreed to minimize the risk of disruptions to business processes.

15.3.2 Protection of information systems audit tools

Access to information systems audit tools should be protected to prevent any possible misuse or compromise

Page 37: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter 36 Deleted clauses (control objectives and controls) of BS7799-2:2002: destination of their content 4.1.1. Management information security forum – this no longer required; a new clause 4.1.1 looks for management commitment 4.1.5 Specialist information security advice - this clause removed, and concept subsumed into new 6.1.1 4.1.6 Co-operation between organizations – this clause removed and contents now split between new 6.1.6 and 6.1.7 4.3 Outsourcing – this control objective and subordinate controls were deleted; the revised control objective 6.2 and new control 6.2.3 now include outsourcing issues 4.3.1 Security requirements in outsourcing contracts 6.1 Security in job definition and resourcing – this control objective deleted; the concept subsumed into new 8.1 6.1.3 Confidentiality agreements - this control deleted; mostly replaced by new clause 6.1.5 6.2 User training – this control deleted; the content included in the new control objective 8.2 6.3 Responding to security incidents and malfunctions – this control objective and subordinate controls deleted from here and content moved to new clause 13.1 6.3.1 Reporting security incidents – this control deleted from here and content moved to new control 13.1.1 6.3.2 Reporting security weaknesses – this control deleted from here and content moved to new control 13.1.2 6.3.3 Reporting software malfunctions – this control deleted from here and content moved to, and split between, new controls 13.1.1 and 13.1.2 6.3.4 Learning from incidents – this control deleted from here and content moved to new control 13.2.2 7.3 General controls – this control objective deleted 7.3.1 Clear desk and clear screen policy – this control deleted from here and content moved to new control 11.3.3 8.1.3 Incident management procedures – this control deleted from here and content incorporated into new clause 13. 8.1.6 External facilities management – this control deleted from here and content incorporated into new control objective 10.2

© IT Governance Ltd 2005v2.2 Page 37 of 38

www.itgovernance.co.uk [email protected]

Page 38: BS7799-2:2002 to ISO 27001:2005 ISMS Converter

BS7799-2:2002 to ISO 27001:2005 ISMS Converter 8.4 Housekeeping – this control objective deleted, except for back-up 8.4.2 Operator logs – this control deleted from here and content incorporated in new control 10.10.4 8.4.3 Fault logging – this control deleted from here and content incorporated in new control 10.10.5 8.7.3 Electronic commerce security – this control deleted from here and content incorporated in new control 10.9.1 8.7.7 Other forms of information exchange – this control deleted and content incorporated in new control 10.8.1 9.4.2 Enforced path – this control deleted 9.4.4 Node authentication – this control deleted, and the concept included in 11.4.2 9.4.9 Security of network services – this control deleted, and some of the content incorporated into new control 10.6.2 9.5.1 Automatic terminal identification – this control deleted from here and some of the content incorporated into new control 11.4.3 9.5.6 Duress alarm to safeguard users – this control deleted; some of the content included in new control 13.1.1 9.7 Monitoring system access and use – this control objective deleted and some of the content incorporated into clause 10 9.7.1 Event logging – this control deleted from here and content incorporated into new control 10.10.1 9.7.2 Monitoring system use – this control deleted from here and the content split between new controls 10.10.2 and 10.10.3 9.7.3 Clock synchronization – this control deleted from here and re-inserted as new control 10.10.6 10.3.2 Encryption – this control deleted 10.3.3 Digital signatures – this control deleted 10.3.4 Non-repudiation services – this control deleted 10.5.4 Covert channels and Trojan code – this code deleted; covert channels included in new control 12.5.4 and Trojans in 10.4.1 12.1.7 Collection of evidence – this control deleted from here and material included in new control 13.2.3

© IT Governance Ltd 2005v2.2 Page 38 of 38

www.itgovernance.co.uk [email protected]