Resources, Competence, Awareness & Communication for ISO 27001 7.1 - 7.4
ISO 27001 Section 7.1 – Resources
A requirement of ISO 27001 is to provide an adequate level of resources so that you can maintain and continually improve your information security management system.
ISO 27001 Section 7.2 – Competence
The aim here is to demonstrate an adequate and proportionate level of information security knowledge and competence. These can be internal or external resources, for example, if you had an information security advisor coming into the company for a short period of time.
Competence of the individuals involved with the ISMS should be assessed, the organisation’s requirements identified and agreed what is adequate competence. Then you should identify how to fill any gaps.
The organisation should commit to providing training, education or mentoring to any individual tasked with maintaining information security.
ISO 27001 Section 7.3 – Awareness
The person responsible for managing the information security management system should be aware of everything concerned with the policies and controls held within it.
- Have they read and understood the organisation’s information security policy?
- Do they understand the importance of maintaining and continually improving an ISMS?
- Do they understand the implications o not maintaining the ISMS and meeting the requirements of 27001?
ISO 27001 Section 7.4 – Communication
The organisation should have a plan in place for communicating, internally and externally, information about the information security management system – this could include the benefits of using an ISMS. A formal process of communication should be agreed and documented.
The process could include the following:
- what will be communicated;
- when it will be communicated;
- with whom;
- who shall own the communication; and
- the process
Looking for more benefits or need help in building the business case for an ISMS in your organisation?
ISO 27001 Annex A Controls
- A.5 Information security policies
- A.6 Organisation of information security
- A.7 Human resource security
- A.8 Asset management
- A.9 Access control
- A.10 Cryptography
- A.11 Physical and environmental security
- A.12 Operations security
- A.13 Communications security
- A.14 System acquisition, development, and maintenance
- A.15 Supplier relationships
- A.16 Information security incident management
- A.17 Information security aspects of business continuity management
- A.18 Compliance
ISO 27001 requirements
- 4.1 Understanding the organisation and its context
- 4.2 Understanding the needs and expectations of interested parties
- 4.3 Determining the scope of the information security management system
- 4.4 Information security management system
- 5.1 Leadership and commitment
- 5.2 Information Security Policy
- 5.3 Organizational roles, responsibilities and authorities
- 6.1 Actions to address risks and opportunities
- 6.2 Information security objectives and planning to achieve them
- 7.1 Resources
- 7.2 Competence
- 7.3 Awareness
- 7.4 Communication
- 7.5 Documented information
- 8.1 Operational planning and control
- 8.2 Information security risk assessment
- 8.3 Information security risk treatment
- 9.1 Monitoring, measurement, analysis and evaluation
- 9.2 Internal audit
- 9.3 Management review
- 10.1 Nonconformity and corrective action
- 10.2 Continual improvement