Response To Comments On Information Security Policy
Response To Comments On Information Security Policy
Section
Scope
NeGD Comments
1) The scope mentions that the policy document
defines the security requirements of 18 domains
of ISO 27001 (A5 to A18).
However, the rest of the policy document does
not specify the security requirements for these
domains. ( also please note that A5-A18 = 14
domains and not 18 domains).
Response
The framework includes security
requirements for 18 domains as part
of Implementation Guidelines for
Security Controls which is a separate
document. It covers the ISO Domains
as mentioned in Annexure A of
ISO/IEC 27001: 2013 and Privacy,
Cloud, BYOD, BCM
The framework does not follow
ISO/IEC 27001:2013. However, it
covers the ISO domains.
Domains in Scope are requirements
for establishing an ISMS.
Annexure 4 gives guidance for
Minimum security requirements.
These requirements do not pertain to
any specific domain. An organization
can plan to work on these before a
formal Risk Assessment (RA) as they
can be a good starting point.
Suitable changes have been made in
the document to make the text
clearer.
If we look at FISMA and other
International Standards (including
ISO), they have separate / more
detailed guidelines for
"BCM/Contingency Planning" and
"Third party security" domains for the
Government Sector. Therefore, these
domains are worked upon separately
and more comprehensively. A17
covers the information security
aspects of Information security while
we are covering BCM/ Contingency
planning practices which are more
comprehensive.
The supplier relationship/ Third Party
is integrated under A15.
We have considered the NIST
standards (NIST SP 800-34 on
contingency planning / NIST SP 80034 on supplier relationship) and ISO
standards (22301 on BCM and ISO
27036 on Third Party) in developing
these practices.
2
Annexure
Org Structure
Implementati
on
Section 9, 12
Annexure 5
Annexure 5 is incomplete
General
all employees.