Defining the scope of the Information Security Management System (ISMS) in a company

Authors Avatar

Learning Task 2

Part 1

Submitted work:

Defining the scope of the Information Security Management System (ISMS) in a company depends on the company itself.

         Organisation the Company is a small business with 10 employees which produces printed goods (T-Shirts and other items capable of taking logos, printed text or photos). The company also undertakes other printing work such as business cards, flyers. 

         Location the Company have permanent premises from which they operate from but also operate and take orders on-line. The website is hosted by an external host.

         Assets the company has two computers and printers to produce the printed goods. The company also has materials such as stationary (paper, pens) and materials to produce designs on (T-Shirts).

          Technology Outlook Express is used for mail communication. The company must use a range of multimedia software to produce printed goods. The company has two computers one of which is High Spec used for accounting and ordering and the other for the printers.

Information security management system is a set of policies connected with information security management and information security risks. The expressions came from ISO 27001.

“The principle behind ISMS is that an organisation should design, implement and maintain a clear set of policies, processes and systems to manage risks to its information assets, therefore ensuring acceptable levels of information security risk.”

ISMS should be competent in the future and should adapt to changes whether they are internal or external and therefore should integrate the Plan-Do-Check-Act cycle method which will keep it up to date.

PLAN

Establish ISMS policy, objectives, processes in the organisation to manage risks and improve security.

DO

Implement and operate the ISMS policy, controls and processes.

CHECK

Assess and measure process performance against policy and objectives.

Join now!

ACT

Take corrective and preventative action based on the results of ISMS audit, management review or other relevant information to enable continuous improvement.

Part 2

Submitted work:

The requirement of ISO 27001 are that management:

“Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities and impacts;

Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and

Adopt an overarching management process to ensure that the information security controls continue to ...

This is a preview of the whole essay