Clause 5 Leadership

Clause 5 Leadership

Version: 3.0

Valid until: 2025-03-14

Classification: Low

Version Management


Version

Author(s)

Change(s)

Date approved

1.0

Stefan van Aalst

Edward Robinson

Initiation document

2022-05-20

1.1

Edward Robinson

Additions/changes as part of the periodic review and improvement.


Compiled Clause 5 Leadership from B01 information security policy and Information security objectives & policy (5.6, 6.2) article. 

2022-12-19

2.0Edward RobinsonAdditions/changes as part of the annual review.

Added anDREa's Roles and Responsibilities Matrix and small textual changes.
2023-05-15
3.0
Edward Robinson
Additions/changes as part of the annual review.

Fixed a link to the Statement of Applicability. Adjustments to the table under 5.3: Manager ICT > Operations Manager; Manager HR > Business Manager.

Purpose & background


anDREa B.V. (hereafter called anDREa) is committed to protecting the security of its business information in the face of incidents and unwanted events and  has implemented an Information Security Management System (ISMS) that is compliant with ISO/IEC/27001:2017, the international standard for information security.


The purpose of this document is to describe how anDREa’s management will demonstrate leadership and commitment regarding the ISMS; the information security policy and objectives and the organisational roles regarding the ISMS.


This document will be updated at least annually and when significant change happens.

Objective


The objective of this control is:


  • To demonstrate leadership and commitment with respect to the ISMS (5.1).

  • To establish an information security policy (5.2).

  • To ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated (5.3).

Scope

The scope of this document is according to Clause 4 Context of the organisation.

Availability

This document is:


  • required reading for:

    • all employees and contractors of anDREa.

  • available for all interested parties as appropriate.

Norm elements

5.1 Leadership and commitment


“Top management shall demonstrate leadership and commitment with respect to the information security management system by:

a) ensuring the information security policy and the information security objectives are established and are compatible with the strategic direction of the organisation;

b) ensuring the integration of the information security management system requirements into the organisation’s processes;

c) ensuring that the resources needed for the information security management system are available;

d) communicating the importance of effective information security management and of conforming to the information security management system requirements;

e) ensuring that the information security management system achieves its intended outcome(s);

f) directing and supporting persons to contribute to the effectiveness of the information security management system;

g) promoting continual improvement; and

h) supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility.”



anDREa’s management team has established the information security policy as described below under 5.2 as well as additional policies to strengthen the information security policy. All policies are based on ISO 27001:2017 and are publicly available on anDREa’s Knowledge Base. All policies have been reviewed and approved by management. Through the Security Management Reports and monthly ISMB meetings, management is informed with regard to the (functioning) of the ISMS and security-related tickets. Based on this and in accordance with Clause 7 Support, management is committed to provide the resources and training needed to maintain a functional ISMS and to promote continuous improvement in accordance with Clause 4 Context of the organisation and Clause 10 Improvement.

Finally, with the approval of management, awareness articles are published on the anDREa’s Knowledge Base and LinkedIn to highlight the importance of information security.

5.2 Policy


“Top management shall establish an information security policy that:

a) is appropriate to the purpose of the organisation;

b) includes information security objectives (see 6.2) or provides the framework for setting information security objectives;

c) includes a commitment to satisfy applicable requirements related to information security; and

d) includes a commitment to continual improvement of the information security management system.

The information security policy shall:

e) be available as documented information;

f) be communicated within the organisation; and

g) be available to interested parties, as appropriate.”



The following information security principles provide overarching governance for the security and management of information at anDREa:

Supporting policies

  • Supporting policies have been developed to strengthen and reinforce this policy statement. These are published together and are available on https://support.mydre.org/portal/en/kb/andrea-organization

    • Anyone can see the documents they are authorised to. Generally speaking, only records and registers require authorization, all other documents are publicly available.

  • An additional policy may be created to cover specific areas.

  • MT will request input from internal experts on relevant parts. It shall oversee the creation of information security and subsidiary policies.

  • The CTO will determine the appropriate levels of security measures applied to all new information systems and services.

Information security objectives: 

anDREa maintains and reports on the information security objectives in the annual Security Management Report. 

5.3 Organisational roles, responsibilities and authorities


“Top management shall ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated.

Top management shall assign the responsibility and authority for:

a) ensuring that the information security management system conforms to the requirements of this International Standard; and

b) reporting on the performance of the information security management system to top management.”


 

Who?

 

Plan

 

Do/Act

 

Study

CEO of anDREa B.V.

Noting policies and reports. (I)

Adopt budget for improvement plans. (A)

Take note of management reports. (I)

CTO

Adoption:

- Policy documents.

- Measures and treatment plan.

- Risk assessment.

(A)

Make decisions on interim adjustments to plans and major actions in response to security incidents.

(A)

Establish management reports. (A)

Security Officer (accountability of CTO)

Draw up policy and coordinate.

Risk analysis for information security.

(R)

Coordinate

Adjusting information security procedures.

Execute (sub)plans. 

Coordinate information security awareness campaign.

(R)

Keep track of and resolve data breaches. (R)

Keep a register of processing. (R)

Analyse security incidents.

Measure effects of procedures on information security.

Coordinate internal and external audits regarding information security.

Prepare assessments for management on information security.

(R)

Internal auditor



Perform internal audits.

Operations Manager  

(accountability of CTO)

Provide input for policy and risk analysis. (R)

Execute ICT projects or have ICT projects executed. (R)

Assess the effects of ICT procedures. (R)

Business Manager

(accountability of CEO)

Provide input for policy and risk analysis. (R)

Execute HR projects or have HR projects executed. (R)

Assess the effects of HR procedures. (R)

All staff members

Provide input for policy and risk analysis. (C)

Work according to procedures. (R)

Report incidents. (R)


Explanation of RACI

R(esponsible): Those who do the work to complete the task. The responsible person reports to the “Accountable” person.

A(ccountable): Person who ultimately answers for the correct and thorough completion of the deliverable or task, the one who ensures the prerequisites of the task are met and who delegates the work to those responsible. In other words, an accountable person must sign off (approve) work that the responsible provides.

C(onsulted): Those whose opinions are sought, typically and with whom there is two-way communication; subject-matter experts; and with whom there is two-way communication.

I(nformed): Those who are kept up-to-date on progress, often only on completion of the task or deliverable; and with whom there is just one-way communication.


The CTO of anDREa is accountable for the policies and the ISMS. This means that management:


The Security Officer is responsible for the effective and efficient application of the policy and all parts of the ISMS. As much as possible, the Security Officer will fulfil this responsibility by supervising, coordinating and checking activities performed by, or falling under the responsibility of line managers.


The daily responsibility rests with the line managers, who supervise compliance with the established procedures and guidelines.


Every employee (whether permanent or not, internal or external) of anDREa is obliged to work with information security in mind. This applies in particular, but not exclusively, to employees who handle commercially confidential or other vulnerable data. All employees are individually responsible for effective security of data entrusted to them.

Administrations


    • Related Articles

    • Clause 6 Planning

      Version: 3.0 Valid until: 2025-04-16 Classification: Low Version Management Version Author(s) Change(s) Date approved 1.0 Stefan van Aalst Edward Robinson Initiation document 2022-05-20 1.1 Edward Robinson Additions/changes as part of the periodic ...
    • Clause 7 Support

      Version: 3.0 Valid until: 2025-03-11 Classification: Low Version Management Version Author(s) Change(s) Date approved 1.0 Stefan van Aalst Edward Robinson Initiation document 2022-05-20 1.1 Edward Robinson Additions/changes as part of the periodic ...
    • Clause 8 Operation

      Version: 3.0 Valid until: 2025-04-12 Classification: Low Version Management Version Author(s) Change(s) Date approved 1.0 Stefan van Aalst Edward Robinson Initiation document 2022-05-20 1.1 Edward Robinson Additions/changes as part of the periodic ...
    • Clause 10 Improvement

      Version: 3.0 Valid until: 2025-03-11 Classification: Low Version Management Version Author(s) Change(s) Date approved 1.0 Stefan van Aalst Edward Robinson Initiation document 2022-05-20 1.1 Edward Robinson Additions/changes as part of the periodic ...
    • Clause 9 Performance evaluation

      Version: 3.0 Valid until: 2025-03-11 Classification: Low Version Management Version Author(s) Change(s) Date approved 1.0 Stefan van Aalst Edward Robinson Initiation document 2022-05-20 1.1 Edward Robinson Additions/changes as part of the periodic ...