Valid until: 2025-04-16
Classification: Low
3.0 | Edward Robinson | Additions/changes as part of the annual review. Updated links under 6.1.1 and Administrations. Added link to SIA tickets. |
anDREa B.V. (hereafter called anDREa) is committed to protecting the security of its business information in the face of incidents and unwanted events and has implemented an Information Security Management System (ISMS) that is compliant with ISO/IEC/27001:2017, the international standard for information security.
The purpose of this document is to describe the planning for:
the ISMS
information risk assessment
information security risk treatment and;
how to achieve the information security objectives.
This document will be updated at least annually and when significant change happens.
The objective of this control is:
To plan the risks and opportunities for the ISMS through risk assessment and risk treatment (6.1).
To plan for the achievement of information security objectives (6.2).
The scope of this document is according to Clause 4 Context of the organisation.
This document is:
required reading for:
all employees and contractors of anDREa.
available for all interested parties as appropriate.
ensure the information security management system can achieve its intended outcome(s);
prevent, or reduce, undesired effects; and
achieve continual improvement.
The organisation shall plan:
actions to address these risks and opportunities; and
how to
integrate and implement the actions into its information security management system processes; and
evaluate the effectiveness of these actions.”
establishes and maintains information security risk criteria that include:
the risk acceptance criteria; and
criteria for performing information security risk assessments;
ensures that repeated information security risk assessments produce consistent, valid and comparable results;
identifies the information security risks:
apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and
identify the risk owners;
analyses the information security risks:
assess the potential consequences that would result if the risks identified in 6.1.2 c) 1) were to materialise;
assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and
determine the levels of risk;
evaluates the information security risks:
compare the results of risk analysis with the risk criteria established in 6.1.2 a); and
prioritise the analysed risks for risk treatment.
The organisation shall retain documented information about the information security risk assessment process.”
Baseline security criteria
Workspaces and other parts of myDRE must by default only be accessible by and only by authorised people and services
Role-based
Least-privilege
A compromised Workspace cannot spill over to other Workspaces or the core of myDRE
Active monitoring and logging must take place to:
Demonstrate the above.
Have early/fast warning.
Trace the cause of an incident.
Contingency plans must be in place in order to fast act upon incidents, this must include but should not be limited to:
Block a specific user.
Shut down a Workspace.
Shut down a Subscription.
Shut down myDRE.
For context please read anDREa’s Security Manifesto.
anDREa has two types of risk assessment for information security:
The periodic integral risk assessment, in which dependencies and information security risks are determined with respect to the scope as defined in Clause 4 Context of the organisation. This risk assessment is carried out annually and risks are updated/added when changes occur.
The specific risk assessment, in which the objective is to identify the information security risks of a change.
Responsibilities
Risk assessment procedure
Preparation
Dependency analysis
Risk assessment/Security Impact Assessment
Evaluation
Reporting
Risk treatment
The Security Officer is responsible for ensuring that all the steps mentioned are carried out correctly and recorded appropriately for the final report of the risk assessment.
Risk acceptance criteria
According to ISO 31000, risk acceptance criteria are established to determine when a risk is acceptable and should be retained, and when it is not acceptable and should be treated.
anDREa considers the following risk acceptance criteria to be included:
The likelihood or probability of the risk occurring.
The potential consequences or impact of the risk if it does occur, most notably on Availability, Integrity, Confidentiality and Auditability.
The costs and resources required to implement controls or treatments.
The effectiveness of controls or treatments to mitigate the risk.
The level of stakeholder acceptance or tolerance for the risk.
anDREa assigns the following classification to the above:
Low
Medium
High
select appropriate information security risk treatment options, taking account of the risk assessment results;
determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
NOTE Organizations can design controls as required, or identify them from any source.
compare the controls determined in 6.1.3 b) above with those in Annex A and verify that no necessary controls have been omitted;
NOTE 1 Annex A contains a comprehensive list of control objectives and controls. Users of this International Standard are directed to Annex A to ensure that no necessary controls are overlooked.
NOTE 2 Control objectives are implicitly included in the controls chosen. The control objectives and controls listed in Annex A are not exhaustive and additional control objectives and controls may be needed.
produce a Statement of Applicability that contains the necessary controls (see 6.1.3 b) and c)) and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A;
formulate an information security risk treatment plan; and
obtain risk owners’ approval of the information security risk treatment plan and acceptance of the residual information security risks.
The organisation shall retain documented information about the information security risk treatment process.”
For this reason, the ISO 27002:2017 standard has been chosen for the selection and implementation of controls. This framework is identical to Annex A list of controls from the ISO 27001 standard, therefore by definition requirement 6.1.3c of the ISO 27001:2013 standard is fulfilled.
In order to have an overview of all applicable (and non-applicable) controls and justifications, anDREa has established a Statement of Applicability. Moreover, anDREa has created a list of information security risks. Risk treatment plans are discussed during the ISMB meetings and registered in tickets.
The information security objectives shall:
be consistent with the information security policy;
be measurable (if practicable);
take into account applicable information security requirements, and results from risk assessment and risk treatment;
be communicated; and
be updated as appropriate.
The organisation shall retain documented information on the information security objectives.
When planning how to achieve its information security objectives, the organisation shall determine:
what will be done;
what resources will be required;
who will be responsible;
when it will be completed; and
how the results will be evaluated.”
Risk-Control Matrix (public).
Tickets with risk treatment plans and SIAs (authorised personnel only)
Examples can be found in the ISMB action list