ISO 27001 Clause 5.3 and Clause 7.1 Resources and Roles & Responsibility


Organizational roles, responsibilities and authorities

Required activity

Top management ensures that responsibilities and authorities for roles relevant to information security are assigned and communicated throughout the organization.

Implementation Guideline

Top management ensures that roles and responsibilities also because the necessary authorities relevant to information security are assigned and communicated. The purpose of this requirement is to assign responsibilities and authorities to make sure conformance of the ISMS with the wants of ISO/IEC 27001, and to make sure reporting on the performance of the ISMS to the highest management.
Top management should regularly make sure that the responsibilities and authorities for the ISMS are assigned in order that the management system fulfils the wants stated in ISO/IEC 27001. Top management doesn’t get to assign all roles, responsibilities and authorities, but it should adequately delegate authority to do this. Top management should approve major roles, responsibilities and authorities of the ISMS. Responsibilities and authorities associated with information security activities should be assigned.
Activities include:
a) Coordinating the establishment, implementation, maintenance, performance reporting, and improvement of the ISMS;
b) Advising on information security risk assessment and treatment;
c) Designing information security processes and systems;
d) Setting standards concerning determination, configuration and operation of data security controls;
e) Managing information security incidents; and
f) Reviewing and auditing the ISMS.
Beyond the roles specifically associated with information security, relevant information security responsibilities and authorities should be included within other roles.
For instance , information security responsibilities are often incorporated within the roles of:
a) Information owners;
b) Process owners;
c) Asset owners (e.g. application or infrastructure owners);
d) Risk owners;
e) Information security coordinating functions or persons (this particular role is generally a supporting role within the ISMS);
f) Project managers;
g) Line managers;
h) Information users.

Resources

Required activity

The organization determines and provides the resources for establishing, implementing, maintaining and continually improving the ISMS.

Implementation Guideline

Resources are fundamental to perform any quite activity. Categories of resources can include:
a) persons to drive and operate the activities;
b) time to perform activities and time to permit results to calm down before making a replacement step;
c) financial resources to accumulate, develop and implement what’s needed;
d) information to support decisions, measure performance of actions, and improve knowledge; and
e) infrastructure and other means are often acquired or built, like technology, tools and materials, no matter whether or not they are products of data technology or not.
These resources are to be kept aligned with the requirements of the ISMS and hence are to be adapted when required.
-------------------------------------------------------------------------------------------------------------------------------
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com

Comments

Popular posts from this blog

10 Secrets You Will Never Know About Cyber Security And Its Important

What is Penetration testing ?

Types of Vulnerability Assessment