ISO/IEC 27001 is the international standard on information security. It was established by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) to stipulate the framework for implementing Information Security Management Systems (ISMS) in an organized and risk-effective way.
For this article, we’ll mostly refer to ISO 27001, but know that we’re referring to both ISO/IEC 27001. Got it?
Let’s begin!
ISO 270001 was established based on the three principles of the CIA triad. These are:
An important clarification that’s needed here is that information security (InfoSec) is the focus of ISO 27001 — not the wider tech or security industries. This is because in whatever form it comes, information is vital, whether it’s technical information or personal or financial. This means that any organization or company, in any industry, can be certified with ISO 27001.
You’ll find most companies hiring third-party vendors to handle it for them (more on this later) or even having a learning budget for someone in the company to get the certification and implement the requirements. It’s also why implementation takes longer — it covers every aspect of the company that handles information or data, rather than just the activities in the IT department.
Since this standard also covers system changes and updates, its requirements have been periodically updated since it’s establishment in 2005. The most recent version went out in October 2022: the ISO/IEC 27001:2022. This comes with a couple major changes:
If you imagine ISO 27001 as random documents given to organizations or a shiny logo displayed on their website, then you’ve got the wrong idea about ISO 27001. Though we define it and refer to it as a standard, it’s more like a playbook for organizations.
ISO 27001 works by finding and eliminating risks (risk assessment and risk treatment) in your company’s infrastructure through safeguards. These safeguards are referred to as controls within the ISO 27001 framework — there are 93 controls.
So, it’s left to the organization implementing the standards to specify the controls they’ll implement, in a document called the Statement of Applicability (SoA).
We can say that ISO 27001 is not prescriptive, instead it guides. Which is why it’s better described as a framework. You take what you need that suits your business needs and apply it. This is why the security controls are essential — but not mandatory. The standard operates at a global level and wasn’t created for one niche or a particular business model.
The strength of your ISMS relies on the strength of the systems put in place to protect them, which is why ISO/IEC 27001 takes the crown as the gold standard for ISM globally.
Since it’s handled by the International Organization for Standardization, ISO/IEC 27001 comes with different benefits for the organizations, and stakeholders that abide by its requirements. Some of which include…
There has been a rise in cyberattacks thanks to massive digitalization. The World Economic Forum’s Global Cybersecurity Outlook report based on their survey of over 120 cyber leaders advices companies to build cyber resilience to show their commitment to information security for clients and customers.
Abiding by the ISO 27001 standards shows commitment to handling ISMS and beefing up cyber security in case of any attack. Especially as the framework helps organizations to:
Since ISO 27001 prescribes a more holistic framework for handling ISMS, its methodology cuts across people, processes and technology — no holds barred when it comes to keeping the InfoSec architecture safe. So, processes must be reviewed for loopholes and to ensure compliance with the ISO standard.
Employees will also be trained to handle information that gets to their table to maintain its integrity and confidentiality. Also, the leadership won’t be excluded from staying compliant even in their supervisory duties. All of this will lead to:
Demonstrating your organization’s dedication to InfoSec by implementing ISO 27001 and upholding its standards gives your customers and stake holders less issues to worry over. The thoroughness of this framework in covering every aspect of infosec gives customers more reason to trust your company’s ability to handle their needs. In turn, this guarantees:
Defaulting on regulatory and legal policies gives your organization a bad look. And since ignorance of the law is not an excuse, you’ll need to stay pro-active to avoid getting entangled in such mess.
ISO 27001 also covers this aspect by highlighting what needs to be done regarding compliance. The upside to this too is you get to save funds that could have been spent getting out of a regulatory crisis.
(See if compliance as a service is right for you.)
Because this framework is so well-respected, the validation the ISO 27001 brings can be a significant marketing moment for companies. For starters, it bestows trust, which is important to get people to close the deal with you. It can serve as a competitive advantage, too, if your competitors are yet to be certified.
Doing this can attract customers to your business. For example, you can send out a press release announcing your organization’s ISO 27001 certification. Take a look at Splunk’s very own news about ISO 2700 certification — going all the way back to 2016!
ISO 27001 is divided into two parts: Clauses and Annex A.
These clauses are 11 in total, but our focus is on clauses 4-10 which stipulate the mandatory requirements for implementation. There, we find the structure of the ISO 27001 which is:
It’s in Annex A we find the 93 different security controls mentioned earlier. These controls are further divided into four parts:
Individuals and organizations can choose to get certified by fulfilling the ISO requirements. This certification is usually handled by an external body — the ISO is responsible solely for creating the standards.
People who intend to get certified often do so as a way of getting one leg up the career ladder and to validate their ability to handle (audit, manage and protect) ISMS. This skill will make you valuable in any InfoSec space. With this certification, you can even become an ISO/IEC 27001 lead implementer or ISO/IEC 27001 lead auditor.
(You might be interested in other security certifications, too.)
To earn organization-level certification, your org must be audited by an ISO 27001 consultant (they mainly work freelance) or independent body before you can claim this title. A note on the language used around certification:
The process for getting this done is capital intensive and can take from three months to a year, depending on the size of your organization. Your organization will be audited on the following:
Plus other documentation. Everything has to be accounted for — down to the purchase of a new device in the company or even a change in the leadership structure.
Becoming compliant or going further towards certification in this ISO is not easy. Considering all the requirements above, plus additional factors such as:
Little wonder why smaller companies shy away from getting theirs and why it’s a thing of pride for those who have.
As your business tries to stay resilient, staying up to date with industry trends and technology is one way of getting this done. ISO 27001 helps you stay relevant at a global level and keeps your organization safe from compliance and cyber issues.
At Splunk, implementing the ISO 27001 has helped us guarantee the confidentiality, integrity and availability of information assets.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.