Rhand Leal
February 6, 2017
“If you do not know where you’re going, you’re unlikely to end there.” This saying from the title character in the movie Forrest Gump describes perfectly why many projects fail: lack of clear requirements.
Definition of requirements is so important that, since 2012, all published ISO management systems standards, including ISO 27001, explicitly require organizations to determine requirements of interested parties relevant to the management system’s scope.
This article will present a plain definition of requirements, and some methods for gathering information necessary to identify them in an Information Security Management System (ISMS) implementation project based on the ISO 27001 standard.
Simply speaking, requirements are statements with clear information about what something should do or how it should behave, used to express someone’s needs and expectations in a way that makes it easier to understand for those who are trying to fulfill them.
Consider someone who goes to a restaurant for lunch. His need (what is explicit) is to feed himself, and his expectation (what is implicit) is to eat a delicious meal. By reading the menu, or consulting the waiter, that person chooses a plate; i.e., he defines his requirements, providing information in a way the cook can understand about how his meal must be prepared (e.g., ingredients, type of meat, beverage, etc.).
Now, change this scenario to an ISO 27001 context. People involved with the meal (the customer, waiter, and cook) would be people involved with the ISMS (e.g., customer, top management, suppliers, etc.), all called “interested parties,” who also should be properly identified according the standard. For more information, see: How to identify interested parties according to ISO 27001 and ISO 22301.
Top management of this web site business then could define requirements to be fulfilled in terms of:
The requirement about access control implementation is related to customers’ need to protect information, while the requirement about the systems’ downtime minimization is related to their expectation to not pay more for protection, because with less downtime, the organization can have a more profitable operation and avoid charging more of the customer for additional security.
Other requirements relevant for ISMS implementation are those established by:
For a successful ISMS, the project team has to understand interested parties, the standard, and legal requirements.
Requirements are important because they influence many aspects of the ISMS, such as:
As stated previously, requirements identification starts with the identification of needs and expectations of interested parties, and commonly used data-gathering methods for collecting this kind of information include:
Questionnaires: A set of written questions applied to a sample population of users.
Interviews: A series of questions asked personally to the interested party. For more information, see: Which questions will the ISO 27001 certification auditor ask?
Workshops or focus groups: When you bring together a cross-section of interested parties to discuss an issue in a group format.
Observation: Simply looking at how things are done, which resources are used, by whom, etc.
Studying documentation: Reviewing current process documentation and other relevant documents, like legal and regulatory requirements, and contractual obligations.
When choosing a data-gathering method, you should consider these criteria:
If you note, for each data-gathering scenario there is a more appropriate method to apply, but a combination of all of them surely will provide you with a better perspective of needs and expectations that can be translated later into requirements for your ISMS.
Including the requirement of interested parties in the 2013 revision of ISO 27001 was one of its greatest improvements over the previous 2005 revision, because while risk assessment provides the main support for protecting the ISMS scope, clearly understanding what the ISMS should do and how it should behave regarding interested parties’ needs and expectations is absolutely critical to defining the system’s scope, security objectives, and performance evaluation, and thereby ensuring the success of information security.
By applying proper data-gathering methods, an organization can systematically understand its interested parties and their needs and expectations, and translate those into proper measurable requirements with sufficient details so they can drive the ISMS conception, implementation, operation, and improvement toward the desired outcomes with optimized costs and risks.
Learn more about identification of requirements of interested parties in this free online training: ISO 27001 Foundations Online Course.