Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 273: Line 273:


The organization shall determine:
The organization shall determine:
#what needs to be monitored and measured, including information security processes and controls;
:1. what needs to be monitored and measured, including information security processes and controls;


#the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid results;
:2. the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid results;


<small>NOTE The methods selected should produce comparable and reproducible results to be considered valid. </small>
<small>NOTE The methods selected should produce comparable and reproducible results to be considered valid. </small>


#when the monitoring and measuring shall be performed;
:3. when the monitoring and measuring shall be performed;


#who shall monitor and measure;
:4. who shall monitor and measure;


#when the results from monitoring and measurement shall be analysed and evaluated; and
:5. when the results from monitoring and measurement shall be analysed and evaluated; and


#who shall analyse and evaluate these results.
:6. who shall analyse and evaluate these results.


The organization shall retain appropriate documented information as evidence of the monitoring and measurement results.
The organization shall retain appropriate documented information as evidence of the monitoring and measurement results.
Line 293: Line 293:
The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system:
The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system:


#conforms to
:1. conforms to


*the organization’s own requirements for its information security management system; and
::(a) the organization’s own requirements for its information security management system; and
::(b) the requirements of this International Standard;


*the requirements of this International Standard;
:2. is effectively implemented and maintained.
 
#is effectively implemented and maintained.


The organization shall:
The organization shall:


#plan, establish, implement and maintain an audit programme(s), including the frequency, methods, responsibilities, planning requirements and reporting. The audit programme(s) shall take into consideration the importance of the processes concerned and the results of previous audits;
:3. plan, establish, implement and maintain an audit programme(s), including the frequency, methods, responsibilities, planning requirements and reporting. The audit programme(s) shall take into consideration the importance of the processes concerned and the results of previous audits;


#define the audit criteria and scope for each audit;
:4. define the audit criteria and scope for each audit;


#select auditors and conduct audits that ensure objectivity and the impartiality of the audit process;
:5. select auditors and conduct audits that ensure objectivity and the impartiality of the audit process;


#ensure that the results of the audits are reported to relevant management; and
:6. ensure that the results of the audits are reported to relevant management; and


#retain documented information as evidence of the audit programme(s) and the audit results.
:7. retain documented information as evidence of the audit programme(s) and the audit results.


===Management review===
===Management review===
Line 319: Line 318:
The management review shall include consideration of:
The management review shall include consideration of:


#the status of actions from previous management reviews;
:1. the status of actions from previous management reviews;


#changes in external and internal issues that are relevant to the information security management system;
:2. changes in external and internal issues that are relevant to the information security management system;


#feedback on the information security performance, including trends in:
:3. feedback on the information security performance, including trends in:


#nonconformities and corrective actions;
::(a) nonconformities and corrective actions;


#monitoring and measurement results;
::(b) monitoring and measurement results;


3) audit results; and
::(c) audit results; and


4) fulfilment of information security objectives;
::(d) fulfilment of information security objectives;


#feedback from interested parties;
:4. feedback from interested parties;


#results of risk assessment and status of risk treatment plan; and
:5. results of risk assessment and status of risk treatment plan; and


#opportunities for continual improvement.
:6. opportunities for continual improvement.


The outputs of the management review shall include decisions related to continual improvement opportunities and any needs for changes to the information security management system.
The outputs of the management review shall include decisions related to continual improvement opportunities and any needs for changes to the information security management system.


The organization shall retain documented information as evidence of the results of management reviews.
The organization shall retain documented information as evidence of the results of management reviews.
== Improvement==
== Improvement==