

(Read the article The importance of Statement of Applicability for ISO 27001 to learn more). The Statement of Applicability is also the most suitable document to obtain management authorization for the implementation of the ISMS. The purpose of this document (frequently referred to as the SoA) is to list all controls and to define which are applicable and which are not, and the reasons for such a decision the objectives to be achieved with the controls and a description of how they are implemented in the organization. Once you have finished your risk treatment process, you will know exactly which controls from Annex A you need (there are a total of 114 controls, but you probably won’t need them all). Also, an approval of residual risks must be obtained – either as a separate document, or as part of the Statement of Applicability.

In this step, a Risk Assessment Report has to be written, which documents all the steps taken during the risk assessment and risk treatment process. (Learn more in the article 4 mitigation options in risk treatment according to ISO 27001). The purpose of the risk treatment process is to decrease the risks that are not acceptable – this is usually done by planning to use the controls from Annex A.
Iso 27002 checklist pdf how to#
(For more, read the article ISO 27001 risk assessment: How to match assets, threats and vulnerabilities). The point is to get a comprehensive picture of the internal and external dangers to your organization’s information.

Here you have to implement the risk assessment you defined in the previous step – it might take several months for larger organizations, so you should coordinate such an effort with great care. Perform the risk assessment & risk treatment (For more, read the article How to write ISO 27001 risk assessment methodology). If those rules were not clearly defined, you might find yourself in a situation where you get unusable results. Risk assessment is the most complex task in the ISO 27001 project – the point is to define the rules for identifying the risks, impacts, and likelihood, and to define the acceptable level of risk. (Learn more in the article What should you write in your Information Security Policy according to ISO 27001?) 5. But what is its purpose if it is not detailed? The purpose is for management to define what it wants to achieve, and how to control it. The Information Security Policy (or ISMS Policy) is the highest-level internal document in your ISMS – it shouldn’t be very detailed, but it should define some basic requirements for information security in your organization.

(Learn more about defining the scope in the article How to define the ISMS scope). If you are a larger organization, it probably makes sense to implement ISO 27001 only in one part of your organization, thus significantly lowering your project risk however, if your company is smaller than 50 employees, it will be probably easier for you to include your whole company in the scope. (Read the article ISO 27001 project – How to make it work for more about developing a successful ISO 27001 project.) 3. If you do not clearly define what is to be done, who is going to do it, and in what time frame (i.e., apply project management), you might as well never finish the job. Treat it as a projectĪs I already said, the implementation of an Information Security Management System (ISMS) based on ISO 27001 is a complex issue involving various activities and lots of people, lasting several months (or more than a year). (Read the article Four key benefits of ISO 27001 implementation for ideas on how to present the case to management.) 2. But in my experience, this is the main reason why ISO 27001 certification projects fail – management is either not providing enough people to work on the project, or not enough money. This one may seem rather obvious, and it is usually not taken seriously enough. From getting buy-in from top management, to going through activities for implementation, monitoring, and improvement, in this ISO 27001 checklist you have the main steps your organization needs to go through if you want to achieve ISO 27001 certification. However, I’ll try to make your job easier – here is a list of 16 steps summarizing how to implement ISO 27001. Let me disappoint you: there is no easy way to do it. If you are starting to implement ISO 27001, you are probably looking for an easy way to implement it.
