Caluses
4 Context of Organization
4.1 Understanding the organization and its context
4.2 understanding the needs and the expectations of interested parties
4.3 Determining scope of information security management system
4.4 Information Secuirty Management system
5 Leadership
5.1 Leadership and Commitment
5.2 Policy
5.3 Organizational roles and Responsibilities
6 Planning
6.1 Actions to address risks and opportunities
6.1.1 General
6.1.2 Infromation security risk assessment
6.1.3 Implement a risk teatment process and select controls
6.2Information security objectives and planning to achieve them
6.3 Planning of changes
7 Support
7.1 Resources
7.2 Competeness
7.3 Awareness
7.4 Communication
7.5 Documented Information
8 Operation
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
9 Performance Evaluation
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal Audit
9.3 Management Review
10 Improvement
10.1 Continual Improvement
10.2 Nonconformity and corrective action
Requirements
Documents Needed
determine external and internal issues relevant to the ISMS objectives Documented analysis of internal and external iss
Identify stakeholders and their information secuirty requirements List of interested parties and their requirements
Define the boundaries and applicabilty of the ISMS ISMS scope document
Establish implement, maintain and continually improve the ISMS ISMS framework documentation
Requirements Documents Needed
Top management must demonstarte leadership and
Establish an information Evidence of leadership commitment
commitment to the ISMS security policy alligned with the
organization's objectives Information Security Policy
Assign and communicate responsibilities for information secuirty
Roles and Responsibilities documents
roles
Requirements Documents Needed
Plan Actions to address risk and oppertunities Documented
Risk risk assessment
aasessment methodology
methodology
Establish and implements a ris assessment process Risk reports
Risk treatment plan
Implement a risk teatment process and select controls statement
Information Security of applicability(SOA)
objectives
Set measurable information secuirty pbjectives and plans Plan to achieve objectives
Determine and provide necessary resources for the ISMS Resoucre Allocation recodrs
Ensure personel are competent through education , training or experience Competence and training records
Personal must be aware of the infromation security policy, their contributi Awareness materials
Establish internal and external communication relevant to ISMS Communication Plan Procedures
Document Control
Control the creation, updating and control of documented infromation Master list of documents and records
Plan implement and control the processe needed to meet ISMS Operational Procedures
requirements Change management procedures
Perofrm risk assessments at planned intervals records of risk assessments
Implement risk treatment plan Risk treatment plan
Determine what needs to be monitored and measured, methods and analyz
Moniroting and measurement plan
Conduct internal audits at planned intervals
Management review procedures
Top management reviews the ISMS at planned intervals
Management review meeting minutes
Non conformity and corrective action procedure
address nonconformities and take actions to prevent recurrence Corrective action records
enhance the suitability, adequecy and effectiveness of the ISMS Improvement Logs
ümeeting evidences or records
Evidence to Confirm
ü stake Compliance Remarks
holder analysis
reports
üstake holder analysis reports
üMaps
üApproved
üProcess Communication
ISMS records
üüEvidence
ümeeting
organizational
minutes of ISMS
with
chart
top
implementation
management
ü Signed statements
Evidence to
implementation
üSigned IS Confirm
charts Compliance
policy
üorganizational ü Remarks
communicationü records
communication to
ü Job description
staff ü
communication records
üRecords showing planning activities
Evidence to Confirm Compliance ü risk Remarks
assessment
üCompleted schedules
Risk assessment
ü risk
üApproved risk treatment register
plans
üMonitoring and measurement SOA
ü Updated
records üMeeting minutes
discussing objectives
üBudget Documents
üResource
üTraining attendanceplans
sheets
üCertificates
üCommunication records
üStaff
üCommuniacation
üControlled acknowledgements
documentsLogs with
üMeeting
versioningrecords üAccess
logs
üLogs of operational activities
üChange requests
üUpdated and approvals
risk assessments
üRiskofassessment
üEvidence implementedreports
controls
üMonitoring reports
üCompleted audit checklists
üPerformance metricsabd
üAduit findings andcorrective
reports
actions
üAction items from management
reviews
üDecisions made
üNonconformity reports
ü records
üContinual of corrective
improvement actions
projects
ü Feedback mechanism
Column1
Completed
Partially completed
Missing