
In addition to those management system requirements, there is also an appendix that identifies a set of control measures. Those control measures are actually topics, such as “cryptography. It doesn’t say exactly what you have to do with cryptography. Just that you have to think about and describe what you do with cryptography.
One of the requirements is that the organization use the control measures from that appendix to check that they haven’t forgotten any topics when coming up with their own measures to control risk.
Also read: When do you need ISO 27001 certification?
Two perspectives on business assets
If information security is needed, the question of where that information is located soon follows. And therefore how, as an organization, you deal with the systems that hold that information. Both the information and the systems could be called business assets.
The ISO 27001 standard has two perspectives when it comes to naming assets.
- The first is in risk assessment (standard requirement 6.1.2). It says there that it should focus on identifying risks related to information. So it makes sense, for each risk you identify, to also name what information the risk relates to.
- The second perspective comes from a management measure, number 5.9. This concerns the inventory of information and other related assets.
This states that an organization must have an inventory of assets and maintain them. Where each asset has an owner. The idea behind this is that if you don’t know what assets (including information) you have, you can’t protect them.
Overview of business assets linked to risks
When it comes to the question of how to record information and other assets, it is best to consider the two aspects mentioned above separately. It’s fine to name the information to which each risk relates. And somewhere else keep one or more lists of assets.
In other words, the information named under risks need not be linked to the total overview of assets in which the owners are also named.
But of course this can be done. If you create an overview of information and other assets to which risks can be linked, this will provide additional structure and overview. You can then see even better which risks are linked to a certain asset.
It is even better if you can also indicate the relationship between assets. For example: customer data is in a CRM system running on a certain server. Combined with the classification of information, you can deduce how information assets should be protected.
ISOPlanner contains everything you need to properly record company assets. Want to know exactly how? Then watch this video: https://isoplanner.app/videos/assets/
Need help implementing ISO 27001 certification?
Need help taking steps to comply with ISO 27001 certification? ISOPlanner prevents financial and reputational damage by providing an approachable way to help organizations comply with increasingly complex laws and regulations. Start a free trial of our software or contact us, we are happy to help!
Related Articles
Clean Desk Policy and Clear Screen Policy and information security
When it comes to information security, there are several measures an organization can take to ensure that sensitive information remains secure. Two of these measures are the Clean Desk Policy and the Clear Screen Policy. In this article, we will take a closer look at...
What is a Statement of Applicability?
A statement of applicability (SoA) is a document used to establish the relevance and degree of compliance with certain norms and standards within an organization. It is often prepared as part of certification processes, such as ISO certifications. How does it differ...
What are the benefits of ISMS software?
In today's digital world, ensuring information security is vital for organizations. The loss or theft of sensitive information can have serious consequences, including reputational damage, financial loss, and legal liability. To minimize these risks, more and more...