Clause – 6
Planning
Overview:
Clause 6 of ISO/IEC 27001:2022 outlines the requirements for planning within an Information Security Management System (ISMS).
Implementation Guidance :
Actions to address risks and opportunities
- Identify the risks and opportunities considering internal and external issues, and requirements of interested parties. This essentially means the inputs of the understanding the organisation and context should be considered for the risk assessment.
- Plan actions to address these risks and opportunities.
- Integrate and implement these actions into ISMS processes.
- Evaluate the effectiveness of these actions.
Information security risk assessment
- Develop and establish an information security risk assessment process.
- Identify information security risks.
- Analyze these information security risks by assessing potential consequences and likelihood of occurrence.
- Evaluate information security risks against established risk criteria.
- Document and maintain information about the risk assessment process
Information security risk treatment
- An information security risk treatment process shall be defined and established
- Appropriate risk treatment options shall be identified and selceted for mitigating the risks
- Identify the necessary controls to implement the risk treatment options.
- Compare the controls with those in Annex A and ensure that no necessary controls have been omitted.
- Produce a Statement of Applicability with the list of necessary controls and justification for inclusions and exclusions.
- Develop an information security risk treatment plan.
- Obtain risk owners’ approval of the plan and acceptance of residual risks.
Information security objectives and planning to achieve them
- Define and establish information security objectives for relevant function in the organisation
- Ensure that the objectives are aligned with the information security policy of the organisation
- Communicate the objective with the respective stakeholders
- Ensure that the objectives are updated as required
- Maintain the documentation of the information security objectives
- Develop a project plan to achieve the objectives. The plan should include:
The person responsible, the resources required, what needs to be achieved and the timeline for completion
Planning of changes
- Any changes to the ISMS should be done in a planner manner
- Develop a project plan for implementing the changes
- Thet plan should have the details like the list of activities, ownership of the task, timelines and tracking.
Examples and use cases:
- A hospital sets and objectives to train their employees on safeguarding the patient information. They have assigned the responsibility to the information security office and a deadline has been set to achieve the objective.
- A financial institution has identified that phishing attacks has significantly increased targeting their platform and have decided to mitigate the risk by implementing MFA.
- An ITeS organzation has decided to upgrade the current ISO/IEC 27001:2013 version of the standard to the 2022 version. They have developed a project plan with the tasks and milestones identified along with timelines.
Compliance Checklist:
- Information Security Risk Assessment Procedure
- Information Security Risk Assessment Methodology
- Information Security Risk Register
- Information Security Risk Treatment Plan
- Statement of Applicability
- Information Security Objectives & Plan
- Change Management Policy and Procedure
- Change Request Forms and Approval Records
- Management Review Minutes (discussing risks, opportunities, and objectives)