Clause 5: Leadership
5.1 - Leadership & commitment
This is where senior management and C-level executives of the organisation are expected to focus and show genuine interest in learning about information security. This ensures that they adapt to it so they lead junior management by example.
5.2 - Information security policy
Senior management and C-level executives are expected to create an information security policy. This policy document may be easy to create. However, it's what is inside the document that will play a role in relating to the ISMS–as this document will provide stakeholders the confidence to trust the organisation with the policy.
5.3 - Organisational roles, responsibilities & authorities
When implementing ISMS, senior management and C-level executives are expected to ensure roles, responsibilities and authorities are divided accordingly among employees.
Clause 6: Planning
6.1 - Actions to address risks and opportunities
Risk management plays a vital role in ISO 27001. Through risk management and risk assessment within the ISMS, organisations are able to identify risks and opportunities and assess the organisation's requirements.
6.2 - Information security objectives & planning to achieve them
Information security secures organisation's success and can be leveraged as a competitive advantage. That's why an organisation will need to know why they are implementing an ISMS in order to make processes quicker and more transparent along the way–and in line with their organisational goals.
Clause 7: Support
7.1 - Resources
An organisation needs to provide adequate resources to itself when complying with ISO 27001. In addition to what is mentioned previously in clause 5.3, it's not compulsory that organisations must continuously supply staff to update, maintain and improve the ISMS, but resources must be placed where necessary.
7.2 - Competence
ISO 27001 urges that staff handling processes related to ISMS and ISO 27001 are required to have the relevant knowledge and continuous training in order to remain competent with the standard and information security as a whole.
7.3 - Awareness
Staff handling processes related to ISMS and ISO 27001 must be aware of and be continuously updated on information security policy within the organisation. This includes the benefits of the ISMS, methods of identifying risks and opportunities through risk assessments and risk management, and the possibilities of errors if the ISMS doesn't meet the organisation's security policy requirements.
7.4 - Communication
Staff handling processes related to ISMS and ISO 27001 must be able to understand terminology used in information security such as in the UK GDPR, ISMS, and ISO 27001 and other security standards, who they have to communicate with and how they should communicate.
7.5 - Documented information
ISO 27001 and other ISO standards are stringent about the legitimacy and accuracy of documentation they receive from the organisation.
Clause 8: Operation
8.1 - Operational planning & control
It's important that an organisation has structural processes in place before and while implementing an ISMS and ISO 27001 such as what is mentioned above in clauses 6.1, 6.2 and 7.5. This provides scope for efficient processes and a clear path to success.
8.2 - Information security risk assessment
A security risk assessment identifies, evaluates, and implements important information security controls. It also focuses on preventing security weak spots in applications. These assessments must be performed at regular intervals as changes may be made within the ISMS and information security policy.
8.3 - Information security risk treatment
Avoiding, optimising, transferring, or keeping risk are some of the risk treatment options. The measures can be chosen from a list of security controls used by the organisation's ISMS.
Clause 9: Performance evaluation
9.1 - Monitoring, measurement, analysis, and evaluation
If an organisation is looking to become ISO 27001 certified, an auditor from the UKAS (United Kingdom Accreditation Service) for information security will be monitoring the established information security processes and controls, ISMS maintenance, and overall ISO 27001 compliance. Therefore, it's required for an organisation to constantly monitor, measure, analyse, and evaluate its ISMS.
9.2 - Internal audit
An organisation must conduct internal audits on a regular basis to ensure that the ISMS abides by the organisation's information security policy and meets the requirements of the ISO 27001 standard to become certified.
9.3 - Management review
Senior management and C-level executives are required to conduct management reviews at uniform intervals throughout the year. These management reviews should identify areas that can be improved in your organisation's ISMS and overall ISO 27001 standard.
Typically, while the reviews may only be required to be completed once or twice a year, it's advised that your organisation performs management reviews regularly–due to the constant evolution of threat actors and their toolkits.
Clause 10: Improvement
10.1 - Nonconformity and corrective action
If a nonconformity is spotted within the ISMS, the action that follows is a crucial part of ISMS improvement in an organisation. Both the nonconformity and the corrective action that followed must be documented.
10.2 - Continual improvement
An ISMS relies heavily on continuous improvement to achieve and maintain the adequacy and effectiveness of information security in respect to the organisation's objectives.
If an organisation complies with the above clauses and makes information security an important aspect of the organisation, it will play a vital role in obtaining ISO 27001 certification for itself.
Even though it's essential to comply with all the above requirements, it's not essential to comply with all ISO 27001 controls. A crucial aspect of ISO 27001 apart from its requirements, is assessing the exact controls that apply to a specific organisation.