ISO 27001 Annex : A.16.1.2 Reporting Information Security Events, A.16.1.3 Reporting Information Security Weaknesses & A.16.1.4 Assessment of and Decision on Information Security Events

In this article explain ISO 27001 Annex : A.16.1.2 Reporting Information Security Events, A.16.1.3 Reporting Information Security Weaknesses & A.16.1.4 Assessment of and Decision on Information Security Events this contols.

A.16.1.2 Reporting Information Security Events

Control- Information security incidents should be reported as quickly as possible through appropriate management channels.

Implementation Guidance- Both employees and contractors will be made aware of their responsibility as soon as possible for reporting security incidents. The reporting protocols and the point of contact at which the incidents will be reported should also be known to them.

Related Product :  ISO 27001 Lead Auditor Training And Certification ISMS

Situation for information security incident documentation to be considered includes:
  • Ineffective control of security;
  • Breach of standards regarding quality of information, confidentiality, and availability;
  • Towards human mistakes;
  • Failure to comply with policies or guidelines;
  • Failed to comply with physical safeguards
  • A device shift controlled;
  • A program or device malfunctioning;
  • Infringements of access.

Ignorance and other anomalous device activity may signify a security attack or actual security violation and therefore should always be identified as a security information event.

A.16.1.3 Reporting Information Security Weaknesses

Control- Any information security vulnerabilities found or suspected in systems or services in which employees and contractors are using the information systems and services of the organization should be recorded and documented.

Implementation Guidance- To avoid accidents related to the protection of information, all employees and contractors will send these queries to the contact point as soon as possible. The system for reporting should be as easy, open, and usable as possible.

Other Information- This should be recommended not to attempt to show alleged security vulnerabilities for employees or contractors. Test deficiencies may be viewed as a possible violation of the system which could lead to harm to the information system or to the service and to legal responsibility for the individual conducting the test.

Also Read : ISO 27001 Annex : A.16 Information Security Incident Management

A.16.1.4 Assessment of and Decision on Information Security Events

Control- Information security events should be analyzed and determined whether they should be listed as incidents related to information security.

Implementation Guidance- Each information security event should be evaluated by the contact point on the agreed security event and classification scale and whether the event should be considered as a security incident. Incidents detection and prioritizing can help to assess the nature and severity of an incident.

For situations where the company has an ISIRT(i nformation security incident response team ) , the assessment and judgment may be forwarded to ISIRT for validation or re-evaluation. Results of the assessment and decision should be recorded intimately for the aim of future reference and verification.

Read More : https://info-savvy.com/iso-27001-annex-a-16-1-2-a-16-1-3-a-16-1-4/

-------------------------------------------------------------------------------------------------------------------------------------

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

Comments

Popular posts from this blog

ISO 27001 Annex : A.5 Information Security Policies

10 Secrets You Will Never Know About Cyber Security And Its Important

Top 5 Key Elements of an Information Security