Rhand Leal
April 6, 2015
An Information Security Management System (ISMS) is only as good as its ability to keep up with the requirements of the business and provide adequate protection against the risks the organization is exposed to. To accomplish this, information about the environment must be evaluated constantly, but who will do this? Moreover, where can this information be found?
The truth is that no one in your organization, not even dedicated teams, can do that by themselves. With the use of critical information getting broader and broader (e.g., by the use of teleworking, virtual teams, etc.), IT demands became more complex, and ISMS and security needs along with it. This means that the level of effort required to cover information related to every single security aspect of your organization would make the costs prohibitive. But, you still have to monitor this information. So, how to do it?
Fortunately, ISO 27001 suggests an alternative: contact with special interest groups, control A.6.1.4 of Annex A of the standard.
In a general way, you can define a special interest group as an association of individuals or organizations with interest in, or acting in a specific area of knowledge, where members cooperate / work to solve problems, produce solutions, and develop knowledge. In our case, this area of knowledge would be information security.
The 27001Academy, along with the 9001Academy, 14001Academy, and 20000Academy are examples of special interest groups. Other examples are manufacturers, specialized forums, and professional associations. The government is another example of a special interest group (I will explain why it was mentioned separately a bit later).
As I presented at the beginning of this post, an organization’s ISMS needs to keep up with business requirements and organizational risks. To cover these issues, the A.6.1.4 control from Annex A suggests the following issues for you to identify a special interest group to help you:
The government as a special interest group is a unique case, because of its access to additional resources (like police, emergency services, fire fighters, etc.), and, depending on the legal requirements of each country, its involvement is mandatory.
Some of these issues you can identify for free (accessing public content on the Internet, signing up for a regular newsletter, or identifying the person / job title to be in contact with a professional association or state agency), and some you have to pay for (consultant or support services). However, in the latter case it would be recommended to establish contact with potential suppliers through your procurement process (it is always better to have a previous relationship than to call only in an emergency).
Since the information you will be working with could have great impact on your ISMS (over management and/or security controls), you should be careful about which special interest groups you interact with, considering:
In the cases where you have to send or receive information, be sure to verify whether there is an agreement about how the shared information will be protected.
Some people think the implementation of an ISMS is the most complex part of information security management. They could not be more wrong. The effort to keep the ISMS up to date according to the needs of the business and the risk scenario is the real challenge. However, it must not, nor should it be carried by your team alone. Remember, there are many groups that can help you to maintain your system as a valuable tool for your organization.
Click here to download a free template of Questions to ask your ISO 27001/ISO 22301 consultant that will help you evaluate potential consultants.