Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

ISO 27001

Information security management


system(ISMS)

Pritee Ambekar
Komal Sable
WHAT IS ISMS?
 An information security management system (ISMS) is
a set of policies and procedures for systematically
managing an organization's sensitive data.

 The goal of an ISMS is to minimize risk and


ensure business continuity by limiting impact of
security breach.
The Purpose of ISMS
 Prevention of:
• Confidentiality: only the authorized persons have the
right to access information.
• Integrity: only the authorized persons can change the
information.
• Availability: the information must be accessible to
authorized persons whenever it is needed.
How does ISMS works?
10 Clauses of ISO 27001
• Scope
• Normative references
• Terms and definitions
• Context of Organization
• Leadership
• Planning
• Support
• Operation
• Performance Evaluation
• Improvement
Security Breaches lead to..
Benefits of ISO 27001
• Reduces the risk of security breaches
• Helps to protect our Business
• Confidentiality of Information
• Reduces the risk of cyber attacks
• Improved customer satisfaction
• Systematic detection of vulnerabilities
ESDS ISMS Policy Statement

ESDS's information security management system is embedded into


every aspect including people, process, products, services, technology
and data. We are committed to ensure confidentiality, integrity and
availability of all information and information asset we disseminate,
produce, manage and/or store including assets of internal, third party,
personal customer, client, vendor, supplier and associates apart from
our own. We are committed to protect and secure all information from
any internal, external deliberate or accidental threats and comply with
all applicable statutory and regulatory requirements.
Controls of ISO 27001
Do’s of ISMS
1. Ensure that your desk and surrounding workspace is clear of papers.
2. Back up your system & data, & store it securely.
3. Ensure sensitive information on the system is not visible to others.
4. Scan all email attachments for viruses before opening them.
5. Be accountable for your IT assets & data.
6. Be cautious if you are asked for personal information.
7. Use strong password, and change your password on a regular basis
8. Clean up cache files after use
9. You are responsible to promptly report the theft, loss or
unauthorized disclosure of company proprietary information.
10. Lock your machine while you are away.
Don’ts of ISMS
1. Don’t keep restricted information on your screen when not needed.
2. Don’t set your email program to auto open attachments.
3. Don’t leave system unattended.
4. Avoid sharing your passwords.
5. Don’t be tricked into giving away confidential information.
6. Don't visit untrustworthy sites out of curiosity
7. Don’t share your IDs with others
8. Don't use illegal software and programs
9. Don’t mess with other employees accounts.
10. Don’t use company email for social media accounts, forums, and
newsgroup registration.
  
Reminder : ISMS IS THE RESPONSIBILITY
OF EVERYONE

You might also like