What is the objective of Annex A.8.1 of ISO 27001:2013?
Annex A.8.1 is about responsibility for assets. The objective in this Annex is to identify information assets in scope for the management system and define appropriate protection responsibilities.
It’s an important part of the information security management system (ISMS) especially if you’d like to achieve ISO 27001 certification. Lets understand those requirements and what they mean in a bit more depth now.
All you need is our all-in-one, cloud-based solution
- Trusted by hundreds of companies around the world
- Get a 77% head start on your ISO 27001 ISMS from the minute you log on
- Our Assured Results Method will get you to ISO 27001 certification first time
- Maintain your certification with our simplified, secure, sustainable platform
A.8.1.1 Inventory of Assets
Any assets associated with information and information processing facilities need to be identified and managed over the lifecycle, always up to date. A register or inventory of those assets has to be put together that shows how they are managed and controlled, based around their importance (which also dovetails neatly into information classification below). This lifecycle of the information generally includes creation, processing, storage, transmission, deletion and destruction stages.
- Read how to develop an asset inventory for ISO 27001
- Read looking after your information assets the ISO 27001 way
- Discover an integrated approach to asset inventory for ISO 27001 in ISMS.online
A.8.1.2 Ownership of Assets
All information assets must have owners. Asset management ownership can be different to legal ownership too, and it can be done at an individual level, department, or other entity. Ownership should be assigned when the assets are created.
The asset owner is responsible for the effective management of the asset over the whole of the asset’s lifecycle. They can delegate management of that too and ownership can change during that lifecycle as long as both are documented.
A.8.1.3 Acceptable Use of Assets
Acceptable use of information and of assets is important to get right. Rules for acceptable use of assets is often documented in an “Acceptable Use Policy”. The rules for acceptable use must take into consideration employees, temporary staff, contractors and other third parties where applicable across the information assets they have access to. It is important that all relevant parties have access to the set of documented acceptable use rules and these are reinforced during regular training and information security awareness, compliance-related activity.
A.8.1.4 Return of Assets
All employees and external party users are expected to return any organisational and information assets upon termination of their employment, contract or agreement. As such it must be an obligation for employees and external users to return all the assets and these obligations would be expected in the relevant agreements with staff, contractors and others. A solid, documented process is also required to ensure that the return of assets is appropriately managed and can be evidenced for each person or supplier that goes through it – this aligns with the exit controls in Annex 7 for Human Resource Security and Annex 13.2.4 for confidentiality agreements, and Annex A.15 for supplier activity. Where assets are not returned according to the process, unless otherwise agreed and documented as part of the exit process, the non-return should be logged as a security incident and followed-up in line with Annex A.16. The return of assets procedure is never fool proof and this also underlines the need for periodic audit of assets to ensure their continued protection.
An asset management policy and tool is included in ISMS.online
The perfect fusion of knowledge and technology for early ISO 27001 success
What is the objective of Annex A.8.2 of ISO 27001:2013?
Annex A.8.2 is about information classification. The objective in this Annex is to ensure that information receives an appropriate level of protection in accordance with its importance to the organisation (and interested parties such as customers).
A.8.2.1 Classification of Information
Information must be classified in terms of legal requirements, value, criticality and sensitivity to any unauthorised disclosure or modification, ideally classified to reflect business activity rather than inhibit or complicate it. For example, information made publically available e.g. on a website might just be marked ‘public’ whereas confidential or commercial in confidence are obvious for the information being more sensitive than public.
Information classification is one of the key controls used to ensure that assets are adequately and proportionately protected. Many organisations have 3-4 classification options to allow effective management of the information taking into account its value and importance. It can, however, be as simple or as complex as required to ensure the correct level of granularity for the protection of assets. Remember if you keep it really simple and have too few classifications that might mean you are over or under engineering controls. Too many classification options are likely to confuse end users on what one to adopt and create additional overhead on the management scheme. As with all controls, this one needs to be reviewed regularly to ensure its ongoing fitness for purpose.
A.8.2.2 Labelling of Information
An appropriate set of procedures for information labelling must be developed and implemented in accordance with the information classification scheme adopted by the organisation. Procedures for information labelling will need to cover information and related assets in both physical and electronic formats. This labelling should reflect the classification scheme established in 8.2.1. The labels should be easily recognisable and easy to manage in practice otherwise they will not get followed. For example, it could be easier to de facto decide that everything is confidential in the digital systems unless expressly labelled otherwise, rather than get staff to label every CRM update with a commercial in confidence statement! Be clear on where this de facto labelling is being done and document it in your policy then remember to include it in the training for staff.
A.8.2.3 Handling of Assets
Procedures for handling assets need to be developed and implemented in accordance with the information classification scheme. The following should be considered; Access restrictions for each level of classification; Maintenance of a formal record of the authorised recipients of assets; Storage of IT assets in accordance with manufacturers’ specifications, marking of media for authorised parties.
If the organisation handles information assets for customers, suppliers and others, it is important to either demonstrate a mapping policy e.g. customer classification of official sensitive maps to our organisation of commercial in confidence, or that the additional classification would be dealt with in other ways to show it is being protected.
What is the objective of Annex A.8.3 of ISO 27001:2013?
Annex A.8.3 is about media handling. The objective in this Annex is to prevent unauthorised disclosure, modification, removal or destruction of information stored on media.
A.8.3.1 Management of Removable Media
Procedures must be put in place for the management of removable media in accordance with the classification scheme. General use of removable media must be risk assessed and it may be necessary to carry out use-specific risk assessments beyond that too. Removable media should only be allowed if there is a justified business reason. If no longer required, the contents of any re-usable media should be made unrecoverable and securely destroyed or erased. All media should be stored in a safe, secure environment, in accordance with manufacturers’ specifications and additional techniques like cryptography considered where appropriate (i.e. as part of the risk assessment). Where necessary and practical, authorisation should be required for media removed from the organisation, and a record kept in order to maintain an audit trail.
A.8.3.2 Disposal of Media
When no longer required media must be disposed of securely by following documented procedures. These procedures minimise the risk of confidential information leakage to unauthorised parties. The procedures should be proportional to the sensitivity of the information being disposed. Things that should be considered include; whether or not the media contains confidential information; and having procedures in place which help identify the items which might. require secure disposal.
A.8.3.3 Physical Media Transfer
Any media containing information needs to be protected against unauthorised access, misuse or corruption during transportation (unless already publicly available). The following should be considered to protect media when being transported; Reliable transport or couriers should be used – perhaps a list of authorised couriers should be agreed with management; Packaging should be sufficient in order to protect the contents from any physical damage during transit; and Logs should be kept, identifying the content of the media and the protection applied. It should also be noted that when confidential information on media is not encrypted, additional physical protection of the media should be considered.
How to easily demonstrate A.8 Asset management
The ISMS.online platform makes it easy for you to achieve every objective of Asset management.
- Step 1 : The easy approach to asset management
- Step 2 : Adopt, adapt and add
- Step 3 : Demonstrate to your auditors
- Step 4 : A time-saving path to certification
- Step 5 : Extra support whenever you need it
Step 1 : The easy approach to asset management
- Provide management direction and support for information security in accordance with business requirements and relevant laws and regulations.
- Ensure that information receives an appropriate level of protection in accordance with its importance to the organisation.
- Prevent unauthorised disclosure, modification, removal or destruction of information stored on media.
Step 2 : Adopt, adapt and add
You are provided with ready-made controls and references to subordinate policies that can be adopted, adapted, or added to out of the box.
This means that you have ready-made simple to follow foundation for ISO 27001 compliance or certification giving you a 77% head start.
Step 3 : Demonstrate to your auditors
Step 4 : A time-saving path to certification
Step 5 : Extra support whenever you need it
ISO 27001 requirements
9.2 Internal audit
ISO 27001 Annex A Controls
A.8 Asset management
A.9 Access control
A.12 Operations security
About ISO 27001
Disconnected templates and toolkits supported by an expensive consultant just don’t cut it anymore. You need an ISMS that works for you both now and as your business grows.
Policies & Controls Management
Easily collaborate, create and show you are on top of your documentation at all times
Measurement & Automated Reporting
Make better decisions and show you are in control with dashboards, KPIs and related reporting
Audits, Actions & Reviews
Reduce the effort and make light work of corrective actions, improvements, audits and management reviews
Mapping & Linking Work
Shine a light on critical relationships and elegantly link areas such as assets, risks, controls and suppliers
Interested Party Management
Visually map and manage interested parties to ensure their needs are clearly addressed
Simply document, easily control and publish your procedures to ensure stakeholders follow them
Other Standards & Regulations
Neatly add in other areas of compliance affecting your organisation to achieve even more for less
Staff Awareness & Compliance Assurance
Engage staff, suppliers and others with dynamic end-to-end compliance at all times
Supply Chain Management
Manage due diligence, contracts, contacts and relationships over their lifecycle
User Management & Permissions
Practical permissions with low cost plans for more regular and occasional users