STRUCTURE OF THE ISO 27001:2013 WIDESPREAD
The shape of the global wellknown ISO 27001: 2013 adjustments, going from 8 clauses to 10 . This is derived from its alignment to Annex SL of the ISO / IEC Part 1 directives , with which it's far now not based on the PDCA ( Plan-Do-Check-Act ) version, but now applies the high-stage shape , titles of the sub-clauses, same text, not unusual terms and the main definitions defined in Annex SL.
Therefore, it continues compatibility with other control gadget standards that this Annex has additionally adopted (which includes ISO 22301 Business Continuity control structures - Requirements ).
At the controls stage, the new ISO, despite the fact that increasing the wide variety of protection domain names from eleven to 14, restructures the range of controls , from 133 to 114.
The widespread is published on October 1, 2013. The update duration for organizations which are already ISO 27001: 2005 licensed is 2 years.
Summary of changes in comparison to the 2005 version
Removal of the connection with the PDCA non-stop improvement system method.
General restructuring of chapters and subsections so that each one control device standards have the equal shape.
Greater emphasis on information the context of the organization and knowledge the needs of stakeholders. This information ought to be the fundamental factor for the established order of the management machine: definition of the scope, coverage, status quo of goals and hazard evaluation.
The threat analysis process is defined greater generically. References to the identification of assets, threats and vulnerabilities had been removed. It is only important to perceive risks (without specifying how) associated with the loss of confidentiality, integrity and availability, after studying the potential effects and the opportunity to sooner or later quantify the chance.
Regarding the choice of security controls for danger remedy, the selection of a control framework is left to the selection of the organizations in case they do no longer need to follow ISO 27002, even though, in any case, it have to be as compared with the controls. Of Annex A to affirm that no manage is bypassed.
Greater significance is given to the management of the Directorate in the management device, no longer handiest from the factor of view of a proper dedication, as detailed within the preceding model.
Greater importance is given to the monitoring and dimension location of the ISMS.
The listing of obligatory documents has been removed, despite the fact that the frame of the standard makes reference to distinct documentary necessities. On the opposite hand, the separation between files and statistics is removed, being truly called documented information.
Changes in Annex A
it is going from 11 to 14 chapters and the whole number of controls is reduced to 114. Cryptography has come to be a separate phase and is no longer (logically) a part of the domain of systems development and acquisitions. Something comparable has happened with relationships with suppliers, they have turn out to be a separate phase. The communications and operations management domain was divided into protection operations and safety communications.