{"id":16003,"date":"2020-08-18T13:00:10","date_gmt":"2020-08-18T13:00:10","guid":{"rendered":"https:\/\/www.osscertification.comblog\/?p=16003"},"modified":"2023-03-12T16:29:57","modified_gmt":"2023-03-12T10:59:57","slug":"information-security-controls","status":"publish","type":"post","link":"https:\/\/www.osscertification.com\/blog\/information-security-controls\/","title":{"rendered":"Information Security Controls"},"content":{"rendered":"\r\n<p>The organization preparing for Information Security Management System \u2013 ISO 27001 Certification.<\/p>\r\n\r\n\r\n\r\n<p>Information security compliance \u2013 it depends on how effectively Information Security Controls are implemented in the organization by proper Information Security Risk Assessment. \u00a0\u00a0\u00a0The whole intention behind <a href=\"https:\/\/www.osscertification.com\/iso-27001-certification\/\">ISO 27001 Certification<\/a> is to ensure that the information security Management System has been implemented effectively in the organization, which provides confidence to their clients and the interested party that information shared with the organization by the clients is secured and kept confidential. Which builds the long-run trust in the organization.<\/p>\r\n\r\n\r\n\r\n<p>Information security controls play a very important role to ensure that information shared with the organization is secured.<\/p>\r\n\r\n\r\n\r\n<p>As per ISO 27001 Standard \u2013 there are 114 nos of controls \u2013 But all the Controls may not be applicable to the organization considering the nature of business activities.<\/p>\r\n\r\n\r\n\r\n<p>So in view to user understating some of the Information Security Controls are explained below \u2013 which could help the user to have a better understanding of information security controls implemented in the organization<\/p>\r\n\r\n\r\n\r\n<p><strong><u>Information Security Control Explained<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\" type=\"1\">\r\n<li><strong>Information security policy \u2013<\/strong> It is a set of security policies that need to be developed to protect information security.<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Mobile device<\/strong> \u2013 the first organization needs to prepare the mobile device policy and then the organization needs to implement the system based on the policy.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Organizations need to provide a separate locker to every employee.<\/li>\r\n<li>Organizations can provide the mobile with organization SIM.<\/li>\r\n<li>Not Allow the Camera Phone within the organization.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Information classification policy<\/strong> \u2013 for this part organization needs to segregate the information classification as per the department.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Password policy<\/strong> \u2013 the organization needs to prepare a policy which is related to the password that shows when and how the password will change and shared with all employees.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Renew the password every week or in a month<\/li>\r\n<li>Password can\u2019t disclose to anyone.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>HR policy<\/strong> \u2013 that covers the Screening policy, Termination policy, change policy, Joining policy, Disciplinary Process, and HR policy will protect the data from all employees, stockholders, and interested parties.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Asset management policy<\/strong> \u2013 In this policy organization shall cover all assets with a properly recorded or monitoring system<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>The organization can maintain the Data of used and unused assets<\/li>\r\n<li>The organization can set a Responsibility<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Access control policy<\/strong>&#8211; the organization has a policy related to the document assessment\/network access system. \u00a0<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>The document should be password protected<\/li>\r\n<li>Segregation of the network as per the Department<\/li>\r\n<li>The network should be password protected<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Clear desk and clear screen policy<\/strong> \u2013 The Clear Desk and Clear Screen Policy\/clean desk policy document.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>The desk of every employee should be clean<\/li>\r\n<li>Organizations should fix the fine in any case of misconduct that happens on a clean desk system.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Backup policy<\/strong> \u2013 backup policy and system are very important parts for every organization that wants to protect the document from any time of misshaping.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong><u>There are some factors to be covered in the policy as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<p>Where backups are located<\/p>\r\n\r\n\r\n\r\n<p>Who can access backups and how they can be contacted<\/p>\r\n\r\n\r\n\r\n<p>How often data should be backed up<\/p>\r\n\r\n\r\n\r\n<p>What kind of backups are performed and<\/p>\r\n\r\n\r\n\r\n<p>What hardware and software are recommended for performing backups?<\/p>\r\n\r\n\r\n\r\n<p><strong><u>Backup tapes must have at a minimum the following identifying criteria that can be readily<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<p><strong><u>Identified by labels and\/or a bar-coding system:<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<p>a. System Name<\/p>\r\n\r\n\r\n\r\n<p>b. Creation Date<\/p>\r\n\r\n\r\n\r\n<p>c. Sensitivity Classification [Based on applicable electronic record retention regulations.<\/p>\r\n\r\n\r\n\r\n<p>d. Contact Information<\/p>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\" type=\"1\">\r\n<li><strong>User registration and de-registration<\/strong> \u2013 Organizations have to maintain the user&#8217;s access control the user registration and de-registration codes, which means the organization had the practice and policy the change and generate the new registration code for every employee to access.<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<p><strong><u>There is some way to implement as below<\/u><\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Create a New ID and Password for everyone with Strong Password<\/li>\r\n<li>All IDs and Password need to delete after the termination\/resignation of the Employee<\/li>\r\n<li>Renew the password every week or in a month<\/li>\r\n<li>Password can\u2019t disclose to anyone.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>In this Blog we have taken 10 Nos of Information security controls \u2013 next blog we will add up more controls \u2013 So that our users can get an understanding of ISO 27001 Controls that can apply to the organization for better information security.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>The organization preparing for Information Security Management System \u2013 ISO 27001 Certification. Information security compliance \u2013 it depends on how effectively Information Security Controls are implemented in the organization by proper Information Security Risk Assessment. \u00a0\u00a0\u00a0The whole intention behind ISO 27001 Certification is to ensure that the information security Management System has been implemented effectively&hellip;&nbsp;<a href=\"https:\/\/www.osscertification.com\/blog\/information-security-controls\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Information Security Controls<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":15560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[115],"tags":[21,22,31],"class_list":["post-16003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iso-27001-certification","tag-iso-27001-certification","tag-iso-27001-certification-benefits","tag-iso-27001-requirements"],"_links":{"self":[{"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/posts\/16003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/comments?post=16003"}],"version-history":[{"count":2,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/posts\/16003\/revisions"}],"predecessor-version":[{"id":19962,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/posts\/16003\/revisions\/19962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/media\/15560"}],"wp:attachment":[{"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/media?parent=16003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/categories?post=16003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.osscertification.com\/blog\/wp-json\/wp\/v2\/tags?post=16003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}