Introduction

Information is one of the most valuable commodities in the world, and we need to protect it.

Gone are the days when digital and physical were two separate things. An article on F-35 fighter jets titled “Forget Air Defenses, Hackers Could ‘Shoot’ Down America’s F-35s” highlights the blurring of this difference. A plane is not simply a mode of transport; it’s also a “flying computer.” And so, from data to lives, everything is at stake when it comes to cyber security. This is exactly why strong security protocols are essential, and that’s where the ISO/IEC 27000 family of standards comes into play.

ISO/IEC 27000 family of standards is the framework that sets the guidelines and best practices for systematically managing information security. In this blog, we shall specifically look at ISO 27001 and ISO 27701 and how the measures required to obtain these certifications help companies enhance the defences of their information systems—both digital and physical.

What is ISO 27001?

ISO/IEC 27001 is at the heart of the ISO 27000 series of standards. It is the world’s foremost standard for Information Security Management Systems. A total of 71,549 certificates of ISO/IEC 27001:2013 have been issued worldwide according to a 2022 ISO Survey.

ISO 27001 offers guidance to organisations of every size across different sectors on how to establish, apply, maintain, and consistently improve their information security management system and secure their information. ISO 27001 is flexible and comprehensive and adapts to the necessities of an organisation.  Getting the ISO 27001 certification is essential for companies to prove their commitment to cyber security and data protection.

Follow AKW Consultants on WhatsApp Channels for the latest updates.

Structure of ISO 27001

ISO/IEC 27001 can broadly be divided into two parts.

 The first part deals with the Information Security Management System (ISMS), and the second part, also known as Annex A, gives Information Security Controls reference.

This structure is what makes ISO 27001 brilliant. It not only guides organisations on how to develop their management system to protect information but also specifies in great detail the controls and methods for implementing this management system.

A paper published in the International Journal of Security and Its Applications, explains how ISO/IEC 27001 follows the Plan-Do-Check-Act (PDCA) cycle as a framework for managing information security.

It begins with the “Plan” phase, where an organisation establishes its information security management system (ISMS) by defining policies and objectives. The “Do” phase involves implementing these policies and controls. In the “Check” phase, the organisation reviews the system’s performance against set objectives. Finally, the “Act” phase focuses on taking corrective actions based on these reviews, aiming for continuous improvement of the ISMS.

An Approach on Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls
Source: Razieh Sheikhpour and Nasser Modiri 
An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls                                           

The seven main clauses (Clauses 4 to 10) of ISO 27001 can broadly be categorised into the PDCA structure for ease of understanding:

Plan
Clause 4 – Context of the Organisation

This clause emphasises the importance of understanding both the external and internal factors that might affect the management system. It includes identifying the organisational context, understanding stakeholders’ expectations, and defining the scope of the system.

Clause 5 – Leadership

Leadership plays an important role in creating a security-conscious culture within the organisation. This clause highlights the responsibilities of top management in establishing and integrating information security into the organisational ethos.

Clause 6 – Planning

Planning is essential for identifying risks and opportunities. It helps in establishing information security goals and creating detailed strategies to reach those goals.

Clause 7 – Support

Supporting the ISMS, such as providing adequate resources and maintaining documented information, is necessary. These efforts help organisations meet their information security objectives.

Do
Clause 8 Operation

The operation clause discusses the need for operational planning and control to implement an information security risk treatment plan. This includes the implementation of security measures to protect information assets.

Check
Clause 9 Performance Evaluation

Regular monitoring, measurement, analysis, and evaluation of the ISMS’s performance are required under this clause. It includes conducting internal audits and management reviews to verify the system’s effectiveness and identify areas for improvement.

Act
Clause 10 – Improvement

Emphasising on the principle of continuous improvement, this clause focuses on addressing nonconformities and taking corrective actions to further strengthen the ISMS.

Furthermore, Annex A of ISO/IEC 27001:2022 provides an extensive list of 93 controls across four categories—organisational (37 controls), people (8 controls), physical (14 controls), and technological (34 controls). These controls are the practical steps that organisations can use to formulate and apply an information security risk treatment plan. These are also essential for maintaining the confidentiality, integrity, and availability of information as well as for operationalising the principles of the ISMS.

What is ISO 27701?

ISO 27701 builds on ISO 27001 and 27002 by focusing on improving privacy within the framework for managing information security. It aims to help organisations in managing and protecting personal information effectively.

ISO 27701 is dedicated to addressing inherent risks involved in processing personal data. As conversations around security, privacy rights, and the management of personal information become more prominent, with Pew Research finding that 4 in 10 Americans are “very worried about their information being sold or stolen,”  the importance of ISO 27701 also grows. ISO 27701 provides organisations with a structured methodology for establishing, implementing, and maintaining a Privacy Information Management System (PIMS). The PIMS is essential for safeguarding Personally Identifiable Information (PII), which includes any data that could potentially identify an individual.

ISO 27701 sets clear rules for handling personal data and gives practical advice to those responsible for handling it. The standard not only specifies essential compliance requirements but also provides suggestions for improving privacy practises. ISO 27701 is great for organisations of all sizes and types looking to get better at managing privacy. It’s a flexible tool that helps strengthen privacy practises across different organisational settings.

Why Getting ISO 27001 and 27701 Certifications Matter?

The number of cybercrimes has been rising every year. In 2023, the FBI’s Internet Crime Complaint Centre (IC3) received “a record number of complaints from the American public: 880,418 complaints with potential losses exceeding $12.5 billion.” Statista’s Market Insights estimates that the global cost of cybercrime will rise from $9.22 trillion in 2024 to $13.82 trillion by 2028. To put things in context, if cybercrime were a country, then its estimated size in 2024 is approximately twice the GDP of the world’s third-largest economy!

Estimated annual cost of cybercrime worldwide (in trillion US dollars)

Considering the sheer magnitude of cyber security threats, businesses and organisations need to strengthen their defences too. Two of the most important tools in their arsenal for doing so are ISO 27001 and ISO 27701.

In an article titled, “Three Questions To Ask Third-Party Vendors About Cybersecurity Risk,” Chester Wisniewski, Director, Global Field CTO at Sophos, says that one of the first things companies should look in a provider is if it has or is actively pursuing ISO 27001. That’s how ISO 27001 has become important in the cyber security domain. On February 1, 2024, Samsung Electronics announced that it had achieved ISO/IEC 27001:2022 and ISO/IEC 27701:2019 certifications for its three digital signage content management systems. Alex Lee, Executive Vice President of Visual Display Business at Samsung Electronics says, “Being awarded these certifications is indicative of our continued efforts to ensure our digital signage solutions are highly reliable and trustworthy platforms for customers.”

Similar sentiments regarding the high reliability of the ISO 27000 family of standards for cyber security are echoed across various industries that prioritise these standards to ensure the security of their information.

Conclusion

Together ISO 27001 and 27701 help organisations set up a system to protect their data, reduce their risk of data breaches, and manage personal information. Implementing these standards does more than just meet compliance requirements; it builds a strong framework that increases trust with stakeholders and gives a business a competitive advantage. By adopting these standards, organisations show that they are committed to data security and privacy, which is absolutely essential in today’s digital world.

Explore how AKW Consultants can help you obtain and maintain security certifications such as ISO 27001 and 27701 and help protect your business from online threats.