AU must establish local Information Security Management Systems (ISMS) which must be in line with AU’s minimum requirements for ISMS. Find out how to approach establishing an ISMS on this page.
The actual establishment of a local Information Security Management System (ISMS) can be divided into four phases, which are described below with tips on how to get started and recommendations for methods, templates and guides to use. The activities in the phases are mandatory under ISO 27001, which is the framework for AU's minimum requirements for a local ISMS.
Question guide:
There is no recipe for roles and responsibilities in relation to your ISMS. The setup you decide on will depend on how your unit is organised, among other things. What follows is a description of roles and responsibilities that are to be handled locally, and you need to consider how different roles act in relation to each other, how responsibilities should be divided and criteria for when a situation should be escalated.
Risk ownership and risk escalation is assigned taking relative to the following:
|
Question guide:
An overview of your assets enables you to prioritise resources on an informed basis. Management can prioritise action areas based on your risk acceptance.
Question guide for identifying and prioritising information assets:
| 1. Identify the unit’s assets |
|
| 2. Assess asset criticality and consequences | Criticality
Consequences
|
| 3. Rank your unit’s most critical and/or sensitive assets |
|
Question guide:
Risk management is based on your identified and ranked assets. We recommend you follow this procedure when carrying out risk assessment: Read more about risk assessment.
The risk management process involves the following elements:
Question guide:
A risk-based approach requires you to be aware that risks change, which means regular follow-ups are necessary.
The frequency of follow-ups can vary, but at a minimum, management should follow up on specific activities in the action plan and activities in the local ISMS once a year.
Following up on the status of the action plan measures might take the form of an item on the agenda at a management meeting or through the establishment of a local information security committee in the unit. There are no formal requirements for follow-up, but it must be possible to track and document progress.
Examples of questions to address when following up on information security status:
|
Here you can download graphical tools with questions that can help you when setting up your local Information Security Management System. We recommend that you start by thinking through each of the four phases and then work through them from step 1 to 3.
When the local ISMS is established, it’s a good idea to structure work associated with it as an annual planning cycle based on the phases Plan-Do-Check-Act.
The lists below are primarily targeted at units that need to be certified, but can be used as inpiration for implementing Annual review..