Software Solutions

ISO 27001 is an information security framework that was published by the International Organization for Standardization (ISO).  ISO 27001 formally specifies an Information Security Management System (ISMS), which is a management framework through which the organization identifies, analyzes and addresses its information risks.   ISO 27001 includes 14 control groups that consist of 35 control objectives and 114 distinct controls.  The 14 control groups and number of controls in each group are as follows:

  • A.5: Information security policies (2 controls)
  • A.6: Organization of information security (7 controls)
  • A.7: Human resource security - 6 controls that are applied before, during, or after employment
  • A.8: Asset management (10 controls)
  • A.9: Access control (14 controls)
  • A.10: Cryptography (2 controls)
  • A.11: Physical and environmental security (15 controls)
  • A.12: Operations security (14 controls)
  • A.13: Communications security (7 controls)
  • A.14: System acquisition, development and maintenance (13 controls)
  • A.15: Supplier relationships (5 controls)
  • A.16: Information security incident management (7 controls)
  • A.17: Information security aspects of business continuity management (4 controls)
  • A.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)

ISO 27001 Certification Process

The certification process is divided into two stages: The “Stage 1 Audit” and the “Stage 2 Audit”.   The “Stage 1 Audit” consists of documentation review.  During Stage 1, the ISO 27001 assessor reviews policies and procedures to ensure that appropriate policies and procedures are in place to meet requirements of the ISMS.  The “Stage 2 Audit” consists of the ISO 27001 auditor performing tests of effectiveness to ensure that controls have been implemented to meet the requirements of the ISMS. 

Additional ISO 27001 Certification Requirements

In addition to the Stage 1 and Stage 2 audits, the following must be performed in order to become ISO 27001 certified:

  • A periodic and independent internal audit of the ISMS against the requirements of the ISO 27001 standard.

Many organizations have trouble meeting the internal audit requirement do to the following reasons:

  • They do not have personnel that are truly independent. Those responsible for conducting the internal audit should not be auditing functions over which they have operational control or ownership.

To combat these issues, organizations are outsourcing the internal audit requirement to CPA firms, such as Schneider Downs, that possess the appropriate knowledge of internal audit and ISO 27001.

ISO 27001 Internal Audit Approach

We begin our assessment by working closely with you to understand your business processes in order to understand your ISO 27001 compliance scope.  We will work with and interview key individuals within the business and information technology services responsible for implementing the ISO 270001 controls to understand information security policies, procedures, and practices.  We will evaluate your compliance with all control requirements through review of documentation supporting the operating effectiveness of controls.  When our evaluation is complete, we will provide your organization with a detailed ISO 27001 compliance assessment report outlining corrective action plans with a detailed roadmap for achieving ISO 27001 compliance.

case studies

 
big problem:
A not-for-profit client out of 401(k) compliance.
big thinking:
Allowing more contributions by highly paid employees.
 
big problem:
Hackers attempting a six-figure wire transfer.
big thinking:
Rapid action spearheaded active containment and response.

our thoughts on

Artificial Intelligence in Higher Education

Before you finish typing a key word in the search bar, it may appear as if your thoughts have been predicted. Artificial intelligence (AI) and machine

read more >

Why Higher Education Institutions Must Comply with GDPR

The EU General Data Protection Regulation (GDPR) has been in effect for 10 months. One sector that has been affected by the newly enforced regulation,

read more >

Minimizing Higher Ed Risks - Utilizing Internal Audit and Data Analytics

We’ve all seen various colleges and universities in the news lately, and the news was not always positive. Higher education institutions face a varied

read more >

Data Analytics | Pittsburgh Technology Services

In the age of technology, there is no limit to the applications of data and data analytics. This spans company type, region and industry. This includes,

read more >

Enterprise Risk Management in Higher Education, and How Internal Audit Can Help

Recent history indicates that the pace of change in Higher Education is unprecedented; however, institutions are only seeing a modest increase in the use

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

contactsd@schneiderdowns.com
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

contactsd@schneiderdowns.com
p:614.621.4060     f:614.621.4062