In this class, Alejandro Orrego, CEO at Pirani, teaches us about the ISO 27001 standard in its 2022 update, what controls it recommends, and how to perform the SoA.
Information technology, Security techniques, Information security management systems: Overview and vocabulary
ISO/IEC 27000 series. This series provides a framework for information security management systems (ISMS) and includes guidelines, best practices, and terminology related to information security.
The ISO/IEC 27000 series encompasses various standards that address different aspects of information security. Some of the notable standards within this series include:
Information security, cybersecurity, and privacy protection
ISO 27001 is an international standard that outlines the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within the context of an organization. It provides a systematic approach to managing sensitive information, ensuring its confidentiality, integrity, and availability.
ISO 27001 revisions
ISO 27001 controls
93 controls
Organizational controls
5.1 Policies for information security: Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to, and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals if significant changes occur.
5.2 Information security roles and responsibilities: Information security roles and responsibilities shall be defined and allocated according to the organization's needs.
5.3 Segregation of duties: Conflicting duties and conflicting areas of responsibility shall be segregated.
and 34 more.
People controls
6.1 Screening: Background verification checks on all candidates to become personnel shall be carried out before joining the organization and on an ongoing basis, taking into consideration applicable laws, regulations, and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
6.2 Terms and conditions of employment: The employment contractual agreements shall state the personnel’s and the organization’s responsibilities for information security.
6.3 Information security awareness, education, and training: Personnel of the organization and relevant interested parties shall receive appropriate information security awareness, education, and training, and regular updates of the organization's information security policy, topic-specific policies, and procedures, as relevant for their job function.
and 5 more.
Physical controls
7.1 Physical security perimeters: Security perimeters shall be defined and used to protect areas that contain information and other associated assets.
7.2 Physical entry: Secure areas shall be protected by appropriate entry controls and access points.
7.3 Securing offices, rooms, and facilities: Physical security for offices, rooms, and facilities shall be designed and implemented.
and 13 more.
Technological controls
8.1 User endpoint devices: Information stored on, processed by, or accessible via user endpoint devices shall be protected.
8.2 Privileged access rights: The allocation and use of privileged access rights shall be restricted and managed.
8.3 Information access restriction: Access to information and other associated assets shall be restricted by the established topic-specific policy on access control.
and 31 more.
SoA Statement of Applicability
The Statement of Applicability (SoA) is a crucial document in the ISO/IEC 27001 Information Security Management System (ISMS) framework.
The SoA serves as a comprehensive summary describing which controls outlined in ISO/IEC 27001 Annex A apply to the organization. It also usually explains how each control is implemented or why it is excluded.
Produce a Statement of Applicability that contains:
The necessary controls
Justification for their inclusion
Whether the necessary controls are implemented or not, and
The justification for excluding any of the Annex A controls.
Selection of Controls
The SoA lists the controls the organization has decided to apply in its ISMS. These controls are chosen based on a comprehensive risk assessment, as well as legal, contractual, and other requirements that the organization is obliged to meet.
Justification for Inclusion or Exclusion
For each control listed in Annex A of ISO/IEC 27001, the SoA should indicate whether the control is applicable and explain why. If a control is not implemented, the SoA should justify its exclusion. This ensures interested parties understand why specific controls were or were not implemented.
Status of Implementation
The SoA often includes each control's implementation status, providing an overview of how far along the organization is in applying the selected controls.
In essence, the Statement of Applicability links the risk assessment and risk treatment processes, and the selection of controls that have been applied. It is fundamental for demonstrating compliance and is often considered a 'live' document that should be updated regularly to reflect the current state of the organization's ISMS.