Example: biology

Security management standard — ISO 17799/BS 7799

BT Technol J Vol 19 No 3 July 2001132 Security management standard ISO 17799 /BS 7799M J KenningBS 7799, the standard for information Security management , covers the appropriateness and effective use of securitycontrols following a risk analysis that identifies the relevant assets and the Security threats to them. This paper describeshow one unit approached certification and became the first in BT to gain it. It then goes on to discuss what has been learned,the technical implications and how that could be applied for competitive 7799 was developed in the early 1990s as a result ofdemand from industry, government and commerce for acommon information Security framework.

BT Technol J Vol 19 No 3 July 2001 132 Security management standard — ISO 17799/BS 7799 M J Kenning BS 7799, the standard for information security management, covers the appropriateness and effective use of security

Tags:

  Security, Management, Standards, Security management, 17799, Security management standard iso 17799

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Security management standard — ISO 17799/BS 7799

1 BT Technol J Vol 19 No 3 July 2001132 Security management standard ISO 17799 /BS 7799M J KenningBS 7799, the standard for information Security management , covers the appropriateness and effective use of securitycontrols following a risk analysis that identifies the relevant assets and the Security threats to them. This paper describeshow one unit approached certification and became the first in BT to gain it. It then goes on to discuss what has been learned,the technical implications and how that could be applied for competitive 7799 was developed in the early 1990s as a result ofdemand from industry, government and commerce for acommon information Security framework.

2 Organisationsfelt that they needed to assure those with whom they dobusiness that they operate to a common minimum securitystandard. They also needed to be able to provide others withassurances about their own group of companies, including BOC, BT, Marks andSpencer, Midland Bank, Nationwide Building Society,Shell and Unilever, co-operated in the development of theCode of Practice for Information Security management BS 7799 Part 1 Code of Practice. The Specification forInformation Security management Systems BS 7799 Part 2 was published in February 1998 [2, 3].

3 Part 1 ofthe standard was published as the international standardISO/IEC 17799 Part 1 code of practice for informationsecurity management in December 2000 [4].In the UK the scheme for accredited certification of anorganisation s information Security management system(ISMS) to the requirements of BS 7799, is known as c:cure . The scheme, commissioned by the DTI in 1998and managed by BSI-DISC, requires participatingcertification bodies to be accredited by recognised nationalaccreditation bodies for this activity [5]. c:cure also requiresthat the auditors used by a certification body for assessmentof organisations against the scheme criteria are registeredspecifically for this activity with a recognised auditorregistration scheme, such as that offered by the InternationalRegister of Certified certificate issued under the scheme is valid forthree years, subject to satisfactory maintenance of thesystem, which will be checked during surveillance visits atleast annually.

4 Thereafter, certificates will typically berenewed for a further three short, conformance to BS 7799 is a matter of puttingin place appropriate Security controls in the first instance,coupled with ongoing monitoring and improvements toensure that the controls remain effective and decision as to what is appropriate depends uponunderstanding the risks and costs involved. Understandingthe risk means knowing what the assets are, what thepossible threats to those assets are, and the likelihood andpossible impact of a Security breach on the business.

5 standard an information Security policy, allocation of information Security responsibilitieswithin the organisation, asset classification and control, personnel Security , responsibilities and training, physical and environmental Security , communications and operational systems Security , access controls, Security is more than using the right technology. In thewords of cryptographer Bruce Schneier: If you thinktechnology can solve your Security problems, then youdon t understand the problems and you don t understand thetechnology [1]. Security is as much about people, and theway they use the technology.

6 The information securitymanagement standard , BS 7799 [2, 3], addresses this 7799 is designed to assure the confidentiality,integrity and availability of information assets. This isachieved through Security controls implemented andmaintained within the organisation. The key areas identifiedby BS 7799 for the implementation of an informationsecurity management system are: Security management STANDARDBT Technol J Vol 19 No 3 July 2001133 systems development and maintenance, business continuity, periodic compliance Information Security management System includesthe following.

7 Scope statement, Security policy document, asset list, risk assessment, statement of applicability, business continuity Information Security management System will alsoinclude processes which continually monitor theeffectiveness of Security protections for the information andassociated 7799 is not a once and for all process there is arequirement for continual monitoring and ongoingimprovement. Nor is it a substitute for evaluation criteriasuch as the Common Criteria [6] or the ITSEC scheme [7].There could, however, be an implicit level of trust placed ina product or system created or run by an organisation whichis BS 7799/ISO 17799 study certification of the SETTF ollowing the successful certification of BT Security s policy set in 1999 [8], it was decided to seek certificationfor a unit within BT.

8 The benefit to be gained, in addition tothe intrinsic benefits of the process improvements involved,was anticipated to be the insights and experience whichcould then be fed out to other parts of BT wishing to godown that route. The plan was successful and the SecurityEvaluation and Test Team (SETT) became the first unit inBT to achieve certification to BS 7799. The Security Evaluation and Testing Team is a team offive people whose main area of responsibility is to workwith BT Security in the application of the BT SecurityEvaluation and Certification Scheme (BTSECS).

9 Anambitious plan was drawn up (Table 1) and the processadopted is illustrated in Fig 1 SETT certification project achieve certification, and to carry out the ongoingmanagement of the ISMS it was decided to create a SecurityForum. The principal duties of the Security Forum aremeasuring and continually improving compliance with theISMS (see Fig 2). These duties include: setting the ISMS scope, reviewing and approving all documentation associatedwith the ISMS, carrying out risk assessment and recording all changes, adopting Security controls which reduce the securityrisk, consistent with the commercial imperatives of theteam, appointing a Security manager.

10 1 November 1999 Workpackage startUnderstand BS 7799 requirements13 December 1999 Consultancy input Develop 1st draft of 7799 document set 1 February 2000 Gap analysis by external auditorsReview and issue of 7799 document set2 3 March 2000 Audit stage 1 Corrective actionsReview and issue of 7799 document set29 30 March 2000 Audit stage 2 Fig 1 SETT certification 7799standardLRQAgap analysisLRQA auditsSETT processimprovementBS 7799conformantprocesses anddocumentationBS 7799certificationof SETTSECURITY management STANDARDBT Technol J Vol 19 No 3 July 2001134 conducting compliance checks against the ISMS, implementing and monitoring corrective actionsarising from compliance checks, reviewing Security incidents and producing a log ofincident reports, reviewing Security major challenge facing the team was that, as part of alarge company, the team had little control over large areasof policy and process relating to Security which were setcompany wide.


Related search queries