Policy Development FAQs
It is possible to write your own cybersecurity policies without an external service provider, however, having a consultant such as Gridware assist with the development of your cybersecurity policies will ensure the process is faster and more streamline. The other benefit to keep in mind is the requirements of industry standards should you require an independent audit, or should you wish to seek certification in the future.
If you obtain certification for your Information Security Management System (ISMS) with a certifying body, then generally you should conduct an internal audit or spot check of your policies, processes and procedures once every 6-12 months and complete a comprehensive audit every 2 years. This is because of the fast paced and changing nature of technology in enterprise and the evolving risks that apply to handling customer, employee and sensitive information.
An ISMS is an Information Security Management System, a set of documents, procedures and guidelines created to create a compliance framework aligned with the requirements of ISO27001. In simple terms, it means having a set of policies, procedures and processes which align with the objectives and scope of the ISO27001 as it is relevant to your organisation. That means it’s not just an IT policy, but also key business processes, controls, audit procedures as well as principles such as commitment by senior management for continual improvement. The full list of compliance obligations required to have an ISMS will depend on the nature, size and risk appetite of your organisation.
Not necessarily. ISMS is based on the ISO27001 standard which relates to Information Security. Whilst some components relate to Information Technology Security Techniques, the scope of the ISO27001 includes many other aspects such as knowledge, words, concepts, ideas and brands. Generally speaking, an organisations most valuable asset is information that belongs to the business. Therefore, any medium where this information is used, captured, stored or managed will fall under the scope of an ISMS.
Implementing an ISMS is a project taking into consideration all the compliance requirements of the ISO27001, and meeting those requirements in your organisation. Clauses 4-10 of the ISO27001 relating to the organisations context and scope, leadership and commitment, planning to address risk, support and awareness, operational planning, risk assessments, performance evaluation and continual improvement are all mandatory components of an ISMS. Once these requirements are met in the form of documentation, you should in conjunction conduct a risk assessment of your information security. Relevant controls from Annexure A of the ISO can be used as guide to assist the organisation with implementing best practice controls.