ISO Transition Handbook
ISO Transition Handbook
downloaded from
ministryofsecurity.co
Follow Ministry of Security on
Introduction
The most awaited ISO/IEC 27001:2022 was published on October 25, 2022. Some of the important
updates of ISO/IEC 27001:2022 include - major change of Annex A and minor updates to the clauses.
d) Transition Timelines
Transition Details Timelines
Companies can be certified against 2013 revision Until 31st October 2023
Companies can be certified against new 2022 revision From 25th October 2022
Companies certified against the 2013 revision must By 31st October 2025
transition to 2022 revision
Page | 2
Follow Ministry of Security on
Clauses
Clause Requirement Transition Details
4.1 Understanding the No Changes No Changes
organization and its context
4.2 Understanding the needs The organization shall determine: Document to be updated:
and expectations of a) interested parties that are ISMS Needs and Expectations of
interested parties relevant to the information security Interested Parties Register
management system;
b) the relevant requirements of Implementation:
these In addition to capturing the
interested parties; requirements of the interested
c) which of these requirements will parties, add an additional section to
be addressed through the demonstrate how each of the
information security management requirements of the interested
system. parties are met through ISMS.
4.3 Determining the scope of No Changes No Changes
the information security
management system
4.4 Information security The organization shall establish, Document to be updated:
management system implement, maintain and continually ISMS Manual
improve an information security
management system, including the Implementation:
processes needed and their Update the ISMS Manual to reflect
interactions, in accordance with the how process and interactions are
requirements of this document. put in place to demonstrate how
ISMS shall be implemented and
maintained for continual
improvement.
5.1 Leadership and No Changes No Changes
commitment
5.2 Policy No Changes No Changes
5.3 Organizational roles, No Changes No Changes
responsibilities and
authorities
6.1 Actions to address risks No Changes No Changes
and opportunities
6.1.2 Information security risk No Changes Document to be updated:
assessment Risk Assessment Document
Implementation:
Update the risk assessment
document with new controls
mapped to each risk.
6.1.3 Information security risk d) produce a Statement of Document to be updated:
treatment Applicability that contains: Statement of Applicability
Page | 3
Follow Ministry of Security on
Page | 4
Follow Ministry of Security on
Implementation:
Requirements are unchanged but
divided into two sub-clauses
9.2.1 - General
9.2.2 - Internal Audit Program
9.3 Management review 9.3.1 General Document to be updated:
9.3.2 Management review inputs Management Review Presentation &
9.3.3 Management review results Minutes of Meeting.
Implementation:
Requirements are largely
unchanged but divided into three
sub-clauses
(Management Review to include
changes to "Interested Parties")
9.3.1 - General
9.3.2 - Management Review Inputs
9.3.3. - Management Review Results
Page | 5
Follow Ministry of Security on
Page | 6
Follow Ministry of Security on
Controls
a) Merged Controls (57)
Merged Controls Previous Controls
5.1 Policies for information security 5.1.1 & 5.1.2
5.8 Information security in project management 6.1.5 & 14.1.1
5.9 Inventory of information and other associated assets 8.1.1 & 8.1.2
5.10 Acceptable use of information and other associated assets 8.1.3 & 8.2.3
5.31 Legal, statutory, regulatory and contractual requirements 18.1.1 & 18.1.5
5.36 Compliance with policies, rules and standards for information
18.2.2 & 18.2.3
security
6.8 Information security event reporting 16.1.2 & 16.1.3
8.31 Separation of development, test and production environments 12.1.4 & 14.2.6
8.32 Change management 12.1.2 & 14.2.2 & 14.2.3 & 14.2.4
Page | 7
Follow Ministry of Security on
Page | 8
Follow Ministry of Security on
Page | 9
Follow Ministry of Security on
Page | 10
Follow Ministry of Security on
Page | 11
Follow Ministry of Security on
Page | 12
Follow Ministry of Security on
Page | 13
Follow Ministry of Security on
Page | 14
Follow Ministry of Security on
Page | 15
Follow Ministry of Security on
Page | 16
Follow Ministry of Security on
Page | 17
Follow Ministry of Security on
Page | 18
Follow Ministry of Security on
8.16 Monitoring Services Control Statement: Networks, systems and applications should be monitored
for anomalous behavior and appropriate actions taken to evaluate potential
information security incidents.
Documentation: Logging & Monitoring Policy
Description:
This control requires organisation to monitor organisation systems in order to
recognize unusual activities and, if needed, to activate the appropriate incident
response. This includes monitoring of organisation IT systems, networks, and
applications.
Processes:
Organisation should set up a process that defines which systems will be
monitored; how the responsibilities for monitoring are determined; and the
methods of monitoring, establishing a baseline for unusual activities, and
reporting events and incidents.
Implementation:
a) The monitoring scope and level should be aligned with business and
information security requirements and relevant laws and regulations.
b) Monitoring records should be maintained for defined retention periods.
c) The following should be considered for inclusion within the monitoring
system:
1. outbound and inbound network, system and application traffic;
2. access to systems, servers, networking equipment, monitoring
system, critical applications, etc.;
3. critical or admin level system and network configuration files; logs
from security tools [e.g. antivirus, IDS, intrusion prevention system
(IPS), web filters, firewalls, data leakage prevention];
4. event logs relating to system and network activity;
5. checking that the code being executed is authorized to run in the
system and that it has not been tampered with (e.g. by recompilation
to add additional unwanted code);
6. use of the resources (e.g. CPU, hard disks, memory, bandwidth) and
their performance.
d) The organization should establish a baseline of normal behavior and
monitor against this baseline for anomalies.
e) When establishing a baseline, the following should be considered:
1. reviewing utilization of systems at normal and peak periods;
2. usual time of access, location of access, frequency of access for each
user or group of users.
f) The monitoring system should be configured against the established
baseline to identify anomalous behavior, such as:
1. unplanned termination of processes or applications;
Page | 19
Follow Ministry of Security on
Page | 20
Follow Ministry of Security on
Page | 21
Follow Ministry of Security on
components from third parties, a process for monitoring emerging threats and
advice on secure coding, a process for deciding which external tools and
libraries can be used, and a process that defines activities done before the
coding, during the coding, after the coding (review and maintenance), and for
software modification.
Implementation:
Planning and before coding
a) Secure coding principles should be used both for new developments and in
reuse scenarios.
b) These principles should be applied to development activities both within
the organization and for products and services supplied by the organization
to others.
c) Planning and prerequisites before coding should include:
1. organization-specific expectations and approved principles for secure
coding to be used for both in-house and outsourced code
developments;
2. common and historical coding practices and defects that lead to
information security vulnerabilities;
3. configuring development tools, such as integrated development
environments (IDE), to help enforce the creation of secure code;
4. following guidance issued by the providers of development tools and
execution environments as applicable;
5. maintenance and use of updated development tools (e.g. compilers);
6. qualification of developers in writing secure code;
7. secure design and architecture, including threat modelling;
8. secure coding standards and where relevant mandating their use;
9. use of controlled environments for development.
During coding
a) Considerations during coding should include:
1. secure coding practices specific to the programming languages and
techniques being used;
2. using secure programming techniques, such as pair programming,
refactoring, peer review, security iterations and test-driven
development;
3. using structured programming techniques;
4. documenting code and removing programming defects, which can
allow information security vulnerabilities to be exploited;
5. prohibiting the use of insecure design techniques (e.g. the use of hard-
coded passwords, unapproved code samples and unauthenticated
web services).
Testing should be conducted during and after development
a) Before software is made operational, the following should be evaluated:
Page | 22
Follow Ministry of Security on
Page | 23
Follow Ministry of Security on
Page | 24