ISA6_EN_redline
xlsx
keyboard_arrow_up
School
Australian Institute of Management *
*We aren’t endorsed by this school
Course
S40060278
Subject
Information Systems
Date
Nov 24, 2024
Type
xlsx
Pages
113
Uploaded by MagistrateUniverse27057
INTERNAL
#
_x000D_
#
not public
Information Security Assessment
ISA provides the basis for
- a self-assessment to determine the state of information security in an organization (e.g. company)
- audits performed by internal departments (e.g. Internal Audit, Information Security)
- TISAX
Ⓡ
Assessments (Trusted Information Security Assessment Exchange, https://enx.com/tisax/)
ISA consists of several tabs, the content and function of which are explained in the tab “Definitions”. The corresponding actual
requirements can be found in the tabs “Information Security”, “Prototype Protection” and “Data Protection”.
We recommend gaining an overview of the individual ISA tabs by using the “Definitions” tab.
Then, commence with the “Information Security” tab.
The authors of this document wish you every success.
Publisher: VERBAND DER AUTOMOBILINDUSTRIE e. V. (VDA, German Association of the Automotive Industry); Behrenstr. 35
10117 Berlin; www.vda.de
This version is the first release version of ISA Versi
ISA Version 6 will become applicable to TISAX Assessments ordered
TISAX Assessments ordered before April 1st 2024 will still be cond
INTERNAL
_x000D_
not public
Information Security Assessment
Address:*
Scope/TISAX Scope ID
D&B D-U-N-S® No.
Date of the assessment:*
Contact person:*
Telephone number:*
E-mail address:*
Creator:*
Signature:
Version: 6.0.1 | 2023-09-25
Company / Organization:*
INTERNAL
_x000D_
not public
Maturity level 0
Maturity level 1
Maturity level 2
Name
Incomplete
Performed
Managed
Principle
A process does not exist, is not followed or not suitable to achieve the objective.
Definition
Possible evidence (GWP)
+ Work products providing evidence of process outcomes.
Information Security Assessment
Maturity levels
The answer to the control questions is a maturity level in a generic maturity model used to quantify the maturity of the corresponding processes.
Determination of the
maturity level requires that objective evidence of compliance with the requirements of the respective level is provided during the assessment. This is achieved, for example, by
means of work products resulting from the processes of the control questions or by means of interview statements by persons carrying out the process.
A process is followed which is not or insufficiently documented (“informal
process”) and there is some evidence that it achieves its objective.
A process achieving its objectives is followed. Process documentation and process
implementation evidence are available.
A process is not implemented or fails to achieve its process purpose. Little or no
evidence exists of any systematic achievement of the process purpose.
- The implemented process achieves its (process) purpose.
- The intended base practices are verifiably performed.
Control of process implementation (PA 2.1):
- Objectives for the performance of the process are identified.
- Implementation of the process is planned and monitored.
- Implementation of the process is adjusted to meet plans.
- Responsibilities and authorities for implementing the process are defined,
assigned, and communicated.
- Resources and information necessary for implementing the process are
identified, made available, assigned, and used.
- Interfaces between the involved parties are managed to ensure effective
communication and clear assignment of responsibilities.
Work Product Management (PA 2.2):
- Requirements for the work products of the process are defined
- Requirements for documentation and control of the work products are defined.
- Work products are appropriately identified, documented, and controlled.
- Work products are reviewed in accordance with planned measures and adjusted
as necessary to meet requirements.
+ Process documentation
+ Process plan
+ Quality plan/records
+ Process implementation records
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Maturity level 3
Maturity level 4
Maturity level 5
Established
Predictable
Optimizing
A standard process integrated into the overall system is followed. Dependencies
on other processes are documented and suitable interfaces are created. Evidence
exists that the process has been used sustainably and actively over an extended
period.
An established process is followed. The effectiveness of the process is continually
monitored by collecting key figures. Limit values are defined at which the process
is considered to be insufficiently effective and requires adjustment. (Key
Performance Indicators)
A predictable process with continual improvement as a major objective is
followed. Improvement is actively advanced by means of dedicated resources.
Process Definition (PA 3.1):
- A standard process, including appropriately adapted requirements,+E6+
[@[Maturity level 3]]
Process Measurement (PA 4.1):
- Process information requirements in support of relevant defined business goals
are established.
- Process measurement objectives are derived from process information
requirements.
- Quantitative objectives for process performance in support of relevant defined
business goals are established.
- Characteristic values and frequency of measurements are identified and defined
in line with process measurement objectives and quantitative objectives for
process performance.
- Results of measurement are collected, analysed, and reported in order to
monitor the extent to which the quantitative
objectives for process performance are met.
- Measurement results are used to characterize process performance.
Process control (PA 4.2):
- Analysis and control techniques are determined and applied, as applicable.
- Variable control limits are established for normal process implementation.
- Measurement data is analysed for special variations.
- Corrective actions are taken to address special variations.
- Control limits are re-established (as necessary) following corrective action.
Process Innovation (PA 5.1)
- Process improvement objectives are defined for the respective process that
supports the relevant business goals.
- Appropriate data are analysed to identify the common causes of variations in
process performance.
- Appropriate data are analysed to identify options for best practice and
innovation.
- Improvement options derived from new technologies and new process concepts
are identified.
- An implementation strategy is established to achieve the process improvement
objectives.
Continuous optimization (PA 5.2):
- The impact of all proposed changes is assessed against the objectives of the
defined process and the standard process.
- Implementation of all agreed changes is managed to ensure that any disruption
to the process performance is understood and addressed.
- Based on actual performance, effectiveness of process change is evaluated
against the defined process requirements and process objectives to determine
whether results are corresponding to common or special cases.
+ Process documentation
+ Process plan
+ Quality records
+ Policies and standards
+ Process implementation records
+ Process documentation
+ Process control plan
+ Process improvement plan
+ Process measurement plan
+ Process implementation records
+ Process improvement plan
+ Process measurement plan
+ Process implementation records
INTERNAL
_x000D_
not public
Tabs
Tab
Description
Intended use of tab
Welcome
Welcome page.
Information
Cover
For own use
Maturity levels
Information
Definitions
Information
Information Security
Implementation requirements
Prototype Protection
Implementation requirements
Data Protection
Implementation requirements
Results
Presentation of results
Information Security Assessment
Definitions
The cover contains boxes for information on the implementing organization, the scope of review, the auditor and the
contact person of the organization under review.
VDA ISA intends the implementation to be assessed by means of a 5 step maturity model as defined in this tab. The
maturity levels comprise Incomplete, Performed, Managed, Established and Predictable.
With this VDA ISA version, the target maturity level for all control questions is consistently 3 (Established).
Under Definitions, the key terms of the requirements to be fulfilled are described. Requirements can be categorized
as
"must", "should", additionally in case of "high protection needs" and additionally in case of "very high protection
needs"
. This subdivision is necessary as information of high and very high protection needs requires special
protective measures.
Additionally, key terms and abbreviations are listed and explained in this tab.
The tab “Information Security” includes all basic controls based on the standard ISO/IEC 27001. The controls
themselves are formulated as questions. The objective of the respective control and the requirements for achieving
it are listed in accordingly designated columns.
Here, each control must invariably be assessed according to the degree to which the objective is achieved. The
assessment of the maturity levels (as described in the tab “Maturity levels”) of each control is recorded in the box
(
column D
) and automatically transferred to the tab “Results”.
Additional columns give examples to support potential implementation.
Here, requirements always refer to the own company with respect to its organization, processes and infrastructure.
Requirements never refer to products put on the market by your company. Requirements for
secure
product
development are not part of this module.
The tab "Prototype protection" includes controls to ensure existence of proper measures for handling prototypes
that require specific protection.
Here, each control must invariably be assessed according to the degree to which the objective is achieved. The
assessment of the maturity levels (as described in the tab “Maturity levels”) of each control is recorded in the box
(column D) and automatically transferred to the tab “Results”.
Additional columns give examples to support potential implementation.
Here, requirements always refer to the own company with respect to its organization, processes and infrastructure.
Requirements never refer to products put on the market by your company. Requirements for secure product
development are not part of this module.
This tab is to be edited additionally in case of processing within the meaning of Art. 28 of the EU General Data
Protection Regulation and contains controls requiring merely yes/no answers.
Here, the results of the individual tabs (review catalog pages) are summarized and presented in printing format. For
presentation purposes, the simplified form according to ISA is use.
The spider web diagram provides an overview of all controls. The list of all controls shows the target maturity levels
to be achieved.
When calculating the overall result, the results of controls overachieving their target maturity level are cutback and
averaged. This ensures that the requirements are comprehensively fulfilled and that there is no compensation of
overachieved and underachieved controls.
INTERNAL
_x000D_
not public
Examples KPI
Examples and support
License
License conditions under which the ISA is published.
Information
Change history
List of changes over the ISA lifetime.
Information
Key terms
Term
Explanation
Examples
The potential damage to the organization is limited and manageable.
Confidentiality classification “internal”
The potential damage to the organization may be substantial.
Confidentiality classification “confidential”
Confidentiality classification “strictly confidential”
Requirements (must)
The requirements indicated in this column are strict requirements without any exemptions.
Requirements (should)
Result (Maturity level)
This tab shows examples of Key Performance Indicators (KPI) for measuring process results. The tab content provides
support for identifying own suitable KPIs. It does not present mandatory requirements for achieving maturity level 4.
Definition of KPIs is not mandatory, but may be helpful for a central management of information security at many
locations.
Protection class “normal”,
normal protection needs
Protection class “high”,
high protection needs
Protection class “very high”,
very high protection needs
The potential damage can reach a level of potentially threatening or disastrous impact on the organization’s
existence.
Principally, the requirements indicated in this column must be implemented by the organization. In certain
circumstances, however, there may be a valid justification for non-compliance with these requirements. In case of
any deviation, its effects must be understood by the organization and it must be plausibly justified.
Additional requirements in case of high
protection needs
The requirements indicated in this column must additionally be met if the assessed subject has high protection
needs.
Additional requirements in case of very high
protection needs
The requirements indicated in this column must additionally be met if the assessed subject has very high protection
needs.
In the result tab ISA (spider web diagram), all results are presented as assessed. The line for the target maturity level
does not consider controls marked “n.a”. When calculating the average, however, the maximum achievable target
maturity level is taken into account.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Glossary
Term
Explanation
Examples
Assessment scope / scope
Business Continuity Management (BCM)
Classification of information
Cloud/external IT services
Critical IT service
Critical IT systems
Critical IT systems are essential to operate Critical IT services.
Event
Generic work product (GWP)
Any work product resulting from the execution of a process.
IAM Technology
Incident
Information Asset
Information security risk management (ISRM)
Information security risks
IT service
Defines what is assessed during the assessment and what is not (“out of scope”). It is connected to the scope of the
assessed management system. For ISO certifications, the scope of the assessment is always identical to the scope of
the management system. In TISAX assessments, you can define the scope of the assessment to be a subset of the
scope of the management system as long as all necessary management system components are covered by the
assessment scope.
To understand an assessment result, you need to understand the scope of the assessment.
BCM is intended to ensure the functionality of business-critical processes within the organization during and after
any crisis situation.
The value of the information for the organization is determined based on the relevant protection goals of
information security (confidentiality, integrity and availability). Based on this, the information is classified according
to the classification scheme. This enables the organization to implement adequate protective measures.
An external service is the processing of company information outside the audit scope.
(e.g. external hosting, cloud service, web services such anti-virus dashboards on the web, SIEM services provided by
external companies, etc.)
Important for rejecting non-relevant web services:
•
Cloud service: Damage may have direct impact on the company (CIA)
•
Data are externally processed in a confidential/strictly confidential manner (e.g. not by translating individual
words)
Critical IT services are essential to the business or organization. When such a service fails or is interrupted, business
operations are severely impacted.
Active Directory, Corporate Network, ERP, Corporate
phone system
Identified occurrence of a IT-system, service or network state indicating a possible breach of information security,
policy or failure of controls, or a previously unknown situation that can be security relevant
Identity and access management (IAM or IdAM) Technology, is a framework of technologies to ensure that the right
users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to
technology resources. Identity and access management systems not only identify, authenticate, and control access
for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.
Single or a series of unwanted or unexpected information security events that have a significant probability of
compromising business operations and threatening information security
Information of
relevant
value to the organization.
Business secrets, critical business processes, know-
how, patents
Information Owner/Information Officer/Data
Owner
Person or organizational body preparing data or making data available for use and being able to provide information
on their protection needs.
Information security management system
(ISMS)
The information security management system is a control mechanism used by the organization’s management to
ensure that information security is the result of sustainable management rather than that of mere coincidence and
individual effort.
The information security risk management is required for an early detection, assessment and handling of risks in
order to achieve the protection goals of information security. Hence, it enables the organization to establish
adequate measures for the protection of its information assets while considering the associated chances and risks.
Risks existing in the preparation and processing of information. These are based on potential events having negative
impact on achieving the protection goals of information security.
Risks existing in the preparation and processing of information. These are based on potential events having negative
impact on achieving the protection goals of information security.
INTERNAL
_x000D_
not public
IT system
Any type of system used for electronic information processing.
Maturity level
Network service
DHCP, DNS, https, STARTTLS
Non-disclosure agreements (NDA)
Personal data
Computer, server, cloud, communication systems,
video conference systems, smartphones, tablets,
industrial automation and control system, OT
devices, IoT
Criterion for the “maturity” of the overall ISMS or parts thereof. This is the degree of structuring and systematic
management of the overall process or parts thereof. For the maturity levels used in this document, the requirements
given in the tab “Maturity levels” apply.
Criterion for the degree of development of the
entire ISMS or of parts thereof. This is the degree of
structuring and systematic management of the
processes involved. The tab “Maturity levels”
includes the definition of the different maturity
levels applicable within the context of this
document.
A network service is a service which is provided by an IT system and used by other IT systems to communicate with
the system via a data network.
Non-disclosure agreements provide legal protection of an organization’s information particularly where information
is exchanged beyond the boundaries of the organization.
The term personal data is used for all information referring to an identified or identifiable person; a natural person is
considered to be identifiable if they can be directly or indirectly identified particularly by assignment to an identifier,
e.g. a name, to an identification number, to location data, to an online identification or to one or more specific
features describing the physical, physiological, genetic, psychological, economic, cultural or social identity of this
natural person.
INTERNAL
_x000D_
not public
Control question
Objective
1
IS Policies and Organization
This is intentional invisible text for technical reasons. Please do not remove this text
This is intentional invisible text for technical reasons. Please do not remove this text
This is intentional invisible text for technical reasons. Please do not remove this text
This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional invisible text for technical reasons. Please d
1.1
Information Security Policies
1.1.1
None
None
1.2
Organization of Information Security
1.2.1
None
None
None
1.2.2
None
1.2.3
None
None
1.2.4
None
None
1.3
Asset Management
1.3.1
None
None
None
1.3.2
None
None
None
Information Security Assessment
Questionnaire
Control
number
Maturity
level
Requirements
(must)
Requirements
(should)
Additional requirements
for high protection needs
Additional requirements
for very high protection needs
Additional requirements for Simplified Group Assessments
(SGA)
To what extent are information
security policies available?
The organization needs at least one information security
policy. This reflects the importance and significance of
information security and is adapted to the organization.
Additional policies may be appropriate depending on the size
and structure of the organization.
+ The requirements for information security have been determined and
documented:
- The requirements are adapted to the organization’s goals,
- A policy is prepared and is released by the organization.
+ The policy includes objectives and the significance of information security within
the organization.
+ The information security requirements based on the strategy of the
organization, legislation and contracts are considered in the policy.
+ The policy indicates consequences in case of non-conformance.
+ Other relevant security policies are established.
+ Periodic review and, if required, revision of the policies are established.
+ The policies are made available to employees in a suitable form (e.g. intranet).
+ Employees and external business partners are informed of any changes relevant
to them.
+ Policies are published and implemented in the entire
assessment scope.
To what extent is information
security managed within the
organization?
Only if information security is part of the strategic goals of an
organization, information security can be implemented in an
organization in a sustainable manner. The information
security management system (ISMS) is a control mechanism
used by the organization’s management to ensure that
information security is the result of sustainable management
rather than that of mere coincidence and individual effort.
+ The scope of the ISMS (the organization managed by the ISMS) is defined.
+ The organization's requirements for the ISMS are determined.
+ The organizational management has commissioned and approved the ISMS.
+ The ISMS provides the organizational management with suitable monitoring and
control means (e.g. management review).
+ Applicable controls have been determined (e.g. ISO 27001 Statement of
Applicability, completed ISA catalogue).
+ The effectiveness of the ISMS is regularly reviewed by the management.
+ The management system is approved by an entity that has
the necessary authority for the entire assessment scope (i.e.,
all locations within the scope).
To what extent are information
security responsibilities organized?
A successful ISMS requires clear responsibilities within the
organization.
+ Responsibilities for information security within the organization are defined,
documented, and assigned.
+ The responsible employees are defined and qualified for their task.
+ The required resources are available.
+ The contact persons are known within the organization and to relevant business
partners.
+ There is a definition and documentation of an adequate information security
structure within the organization.
- Other relevant security roles are considered.
+ An appropriate organizational separation of responsibilities should be
established in order to avoid conflict of interests (separation of duties). (C, I, A)
+ A named person with overall responsibility for the
management system exists and is available.
To what extent are information
security requirements considered in
projects?
For project implementation, it is important to consider the
information security requirements. This applies to projects
within the organization regardless of their type. By
appropriately establishing the information security process in
the project management procedures of the organization, any
overlooking of requirements is prevented.
+ Projects are classified while taking into account the information security
requirements.
+ The procedure and criteria for the classification of projects are documented.
+ During an early stage of the project, risk assessment is conducted based on the
defined procedure and repeated in case of changes to the project.
+ For identified information security risks, measures are derived and considered in
the project.
+ The measures thus derived are reviewed regularly during the project and
reassessed in case of changes to the assessment criteria. (C, I, A)
To what extent are the
responsibilities between external IT
service providers and the own
organization defined?
It is important, that a common understanding of the division
of responsibilities exists and that the implementation of all
security requirements is ensured. Therefore, when using
external IT service providers and IT services, the
responsibilities regarding the implementation of information
security measures are to be defined and verifiably
documented.
+ The concerned services and IT services used are identified.
+ The security requirements relevant to the IT service are determined:
+ The organization responsible for implementing the requirement is defined and
aware of its responsibility.
+ Mechanisms for shared responsibilities are specified and implemented.
+ The responsible organization fulfils its respective responsibilities.
+ In case of IT services, configuration has been conceived, implemented, and
documented based on the necessary security requirements.
+ The responsible staff is adequately trained.
+ A list exists indicating the concerned IT services and the respective responsible
IT service providers. (C, I, A)
+ The applicability of the ISA controls has been verified and documented. (C, I, A)
+ The service configuration is included in the regular security assessments. (C, I, A)
+ Proof is provided that the IT service providers fulfil their responsibility. (C, I, A)
+ Integration into local protective measures (such as secure authentication
mechanisms) is established and documented. (C, I, A)
To what extent are information
assets identified and recorded?
It is important for each organization to know the information
constituting its essential assets (e.g. business secrets, critical
business processes, know-how, patents).
They are referred to as information assets. An inventory
ensures that the organization obtains an overview of its
information assets. Moreover, it is important to know the
supporting assets (e.g. IT systems, services/IT services,
employees) processing these information assets.
+ Information assets
and other assets where security is relevant to the
organization
are identified and recorded.
- A person responsible for these information assets is assigned.
+ The supporting assets processing the information assets are identified and
recorded:
- A person responsible for these supporting assets is assigned.
+ A catalogue of the relevant information assets exists:
- The corresponding supporting assets are assigned to each relevant information
asset,
- The catalogue is subject to regular review.
To what extent are information
assets classified and managed in
terms of their protection needs?
The objective of classifying information assets is the
consistent determination of their protection needs. For this
purpose, the value the information has for the organization is
determined based on the protection goals of information
security (confidentiality, integrity, and availability) and
classified according to a classification scheme. This enables
the organization to implement adequate protective
measures.
+ A consistent scheme for the classification of information assets regarding the
protection goal of confidentiality is available.
+ Evaluation of the identified information assets is carried out according to the
defined criteria and assigned to the existing classification scheme.
+ Specifications for the handling of supporting assets (e.g. identification, correct
handling, transport, storage, return, deletion/disposal) depending on the
classification of information assets are in place and implemented.
+ The protection goals of integrity and availability are taken into consideration.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
1.3.3
None
None
None
1.3.4
None
None
1.4
IS Risk Management
1.4.1
None
None
None
1.5
Assessments
1.5.1
None
None
1.5.2
None
None
1.6
1.6.1
None
None
1.6.2
To what extent is it ensured that
only evaluated and approved
external IT services are used for
processing the organization’s
information assets?
Particularly in the case of external IT services that can be
used at relatively low cost or free of charge, there is an
increased risk that procurement and commissioning will be
carried out without appropriate consideration of the
information security requirements and that security therefore
is not ensured.
+ External IT services are not used without explicit assessment and
implementation of the information security requirements:
- A risk assessment of the external IT services is available,
- Legal, regulatory, and contractual requirements are considered.
+ The external IT services have been harmonized with the protection need of the
processed information assets.
+ Requirements regarding the procurement, commissioning and release
associated with the use of external IT services are determined and fulfilled.
+ A procedure for release in consideration of the protection need is established.
+ External IT services and their approval are documented.
+ It is verified at regular intervals that only approved external IT services are used.
To what extent is it ensured that
only evaluated and approved
software is used for processing the
organization’s information assets?
Information processing is mostly done using of specific
software. Security issues in software will easily become a risk
for the information processed. Accordingly, software must be
appropriately managed.
+ Software is approved before installation or use. The following aspects are
considered:
- Limited approval for specific use-cases or roles
- Conformance to the information security requirements
- Software use rights and licensing
- Source / reputation of the software
+ Software approval also applies to special purpose software such as maintenance
tools
+ The types of software such as firmware, operating systems, applications,
libraries, device drivers to be managed are determined.
+ Repositories of managed software exist
+ The software repositories are protected against unauthorized manipulation
+ Approval of software is regularly reviewed
+ Software versions and patch levels are known
+ Additional requirements for software use (e.g., need for control or monitoring of
usage) are determined (if any) (C, I, A)
To what extent are information
security risks managed?
Information security risk management aims at the timely
detection, assessment and addressing of risks in order to
achieve the protection goals of information security. It thus
enables the organization to establish adequate measures for
protecting its information assets under consideration of the
associated prospects and risks. It is recommended to keep
the information security risk management of an organization
as simple as possible such as to enable its effective and
efficient operation.
+ Risk assessments are carried out both at regular intervals and in response to
events.
+ Information security risks are appropriately assessed (e.g. for probability of
occurrence and potential damage).
+ Information security risks are documented.
+ A responsible person (risk owner) is assigned to each information security risk.
This person is responsible for the assessment and handling of the information
security risks.
+ A procedure is in place defining how to identify, assess and address security
risks within the organization.
+ Criteria for the assessment and handling of
security risks exist.
+ Measures for handling security risks and the persons responsible for these are
specified and documented:
- A plan of measures or an overview of their state of implementation is followed.
+ In case of changes to the environment (e.g. organizational structure, location,
changes to regulations), reassessment is carried out in a timely manner.
To what extent is compliance with
information security ensured in
procedures and processes?
It is not sufficient to define information security requirements
and to prepare and publish policies. It is important to
regularly review their effectiveness.
+ Observation of policies is verified throughout the organization.
+ Information security policies and procedures are reviewed at regular intervals.
+ Measures for correcting potential non-conformities (deviations) are initiated and
pursued.
+ Compliance with information security requirements (e.g. technical
specifications) is verified at regular intervals.
+ The results of the conducted reviews are recorded and retained.
+ A plan for content and framework conditions (time schedule, scope, controls) of
the reviews to be conducted is provided.
+ Internal controls are implemented for all entities within the
assessment scope.
- The implementation of all applicable security requirements
and control objectives are included.
+ Suitably qualified and appropriate information security
audit responsibilities and resources are defined.
+ A detailed internal audit plan and schedule is defined and
followed. The following aspects are considered:
- The entire assessment scope is covered
- Internal audits are conducted regularly
- Results of internal audits are tracked within the ISMS
structures
To what extent is the ISMS
reviewed by an independent
authority?
As an essential control mechanism, assessing the
effectiveness of the ISMS from merely an internal point of
view is insufficient. Additionally, an independent and
therefore objective assessment shall be obtained at regular
intervals and in case of
fundamental
changes.
+ Information security reviews are carried out by an independent and competent
body at regular intervals and in case of
fundamental
changes.
+ Measures for correcting potential deviations are initiated and pursued.
+ The results of conducted reviews are documented and reported to the
management of the organization.
+ In case of fundamental changes, audits are conducted by an
independent and appropriately qualified entity (i.e., external
entities or special internal departments which are objective,
competent and free from undue influence (independent)
- Findings and implementation of corrective actions is
tracked by the independent entity.
Incident
and Crisis
Management
To what extent are information
security relevant events or
observations reported?
Potential security events or observations are detected by
anyone. It is vital that anyone can and knows when and how
to report anything that one has observed and that has
potential security implications (observations) or events so
that the experts can decide if and how it needs to be
handled.
+ A definition for a reportable security event or observation exists and is known by
employees and relevant stakeholders. The following aspects are considered:
- Events and observations related to personnel (e.g., misconduct / misbehaviour)
- Events and observations related to physical security (e.g., intrusion, theft,
unauthorized access to security zones, vulnerabilities in the security zones)
- Events and observations related to IT and cyber security (e.g., vulnerable IT-
systems, detected successful or unsuccessful attacks)
- Events and observations related to suppliers and other business partners (e.g.,
any incidents that can have negative effect on the security of own organization)
+ Adequate mechanisms based on perceived risks to report security events are
defined, implemented, and known to all relevant potential reporters
+ Adequate channels for communication with event reporters exist.
+ A single point of contact (SPOC) for event reporting exists.
+ Different reporting channels according to perceived severity exist (i.e., real time
communication for significant events / emergencies in addition to asynchronous
mechanisms such as tickets or email) are available.
+ Employees are obliged and trained to report relevant events.
+ Security event reports from external parties are considered.
- An externally accessible way to report security events exists and is
communicated,
- Reaction to security event reports from external parties are defined
+ Mechanism to - and information how to - report incidents is accessible by all
relevant reporters.
+ A feedback procedure to reporters is established.
+ Tests and exercises of event and observation reporting are conducted regularly.
(C, I, A)
To what extent are reported
security events managed?
Once security events are reported, it is vital that the handling
of the events is managed. This means to ensure that the type
and criticality of the reported event as well as the persons
responsible are quickly identified to ensure that time-critical
aspects can be handled in time. Once identification is done,
ensuring that the responsible persons become aware and
deal with the event within a reasonable time frame is
necessary. Furthermore, if the event affects multiple different
persons, or management also include coordinating
communication is a important part of event management.
Finally, if there are external (contractual or regulatory)
reporting requirements, its important to ensure that these
are also fulfilled in a professional way.
+ Reported events are processed without undue delay.
+ An adequate reaction to reported security events is ensured.
+ Lessons learned are incorporated into continuous improvement.
+ During processing, reported events are categorized (e.g. by responsibility into
personnel, physical and cyber), qualified (e.g. not security relevant, observation,
suggested security improvement, security vulnerability, security incident) and
prioritized (e.g. low, moderate, severe, critical).
+ Responsibilities for handling of events based on their category are defined and
assigned. The following aspects are considered:
- Coordination of incidents and vulnerabilities across multiple categories
- Qualification and resources
- Contact mechanisms based on type and priority (e.g., non-time-critical
communication, time-critical communication, emergency communication)
- Absence-management
+ A strategy for filing official reports and searching prosecution of potentially
criminally relevant aspects of security incidents exists. (C, I, A)
+ Maximum response times based on class, category and severity are defined. (C,
I, A)
+ Event not processed appropriately according to their priority are escalated. (C, I,
A)
- Conditions and thresholds such as maximum reaction times before escalation
are defined
- Mechanisms, processes, and contacts for escalation are defined
- Escalation paths up to the organization’s top management is defined
+ Lawful, regulatory, and contractual reporting obligations and respective contact
information are known. (C, I, A)
+ A communication strategy for security related events exist. The following aspects
are considered: (C, I, A)
- To whom to communicate (e.g., shareholders, affected business partners and
customers, other stakeholders, general public)
- When to communicate
- Responsibilities for communication
- Authorization and approval of communication
- Legal and regulatory restrictions of communication
- What to communicate (e.g. prepared templates and building blocks for specific
scenarios)
- How to communicate (e.g., communication channels)
+ Procedures for response to supplier security incidents are established. The
following aspects are considered: (C, I, A)
- Analysis of the impact on the own organization and invocation of appropriate
internal mechanisms
- The need for reporting according to own reporting procedures
+ Handling of events in different categories and priorities is regularly tested. (A)
- Exercise or simulation of rarely occurring categories and priorities
- Exercise or simulation include escalation mechanisms
+ Standard mechanisms to report and track relevant security
events are established.
INTERNAL
_x000D_
not public
1.6.3
None
2
Human Resources
2.1.1
None
None
None
2.1.2
None
None
None
2.1.3
+ Employees are trained and made aware.
None
None
None
2.1.4
+ Protective measures against overhearing and viewing are implemented. (C)
None
None
3
Physical Security
3.1.1
None
None
3.1.2
na
To what extent is the organization
prepared to handle crisis
situations?
A crisis situation occurs If exceptional situations (e.g. natural
disasters, physical attacks, pandemics, exceptional social
situations, cyber-attacks causing major infrastructure failures)
are severely disrupting key business operations. In such cases,
the main priority of the organization is to handle the situation
as gracefully as possible and recover as quickly as possible. To
achieve that and since time is of the essence, switching to a
crisis management mode executing pre-planned procedures
having specific distribution of responsibilities and structures
enables an organization to deal with such a situation is the
usual approach.
+ An appropriate planning to react to and recover from crisis situations exists.
- The required resources are available.
+ Responsibilities and authority for crisis management within the organization are
defined, documented, and assigned.
+ The responsible employees are defined and qualified for their task.
+ Methods to detect crisis situations are established.
- General indications for the existence or imminence of a crisis situation and
specific predictable crisis are identified
+ A procedure to invoke and/or escalate crisis management is in place.
+ Strategic goals and their priority in crisis situations are defined and known to
relevant personnel. The following aspects are considered:
- Ethical priorities (e.g., protection of life and health)
- Core business processes (e.g., processes that ensure the survival of the
organization)
- Appropriate information security
+ A crisis management team is defined and approved. The following aspects are
considered:
- Management commitment
- Composition (e.g., participation of all major functions of the organization
including organization leadership (management board), business operations
(production), HR, information security, corporate security, corporate emergency
services, IT/cyber security, communication, finance)
- Structure and roles
- Competences of members
- Expectation and authority
- Decision making procedures
+ Crisis policies and procedures are defined and approved. The following aspects
are considered:
- Exceptional authorities and decision-making processes beyond the crisis
management team
- Primary and backup means of communication
- Emergency operating procedures
- Exceptional organizational structures (e.g., reporting, information gathering,
decision making)
- Exceptional functions, responsibilities, and authority (including reporting)
- Exceptional tools
+ Crisis planning is reviewed and updated regularly.
+ Relevant different potential crisis scenarios are identified. The following aspects
are considered: (A)
- Crisis situations with unavailability of key personnel (e.g. Health crisis,
Kidnapping / accidents affecting organization leadership):
- Crisis situations with unavailable of key physical resources (e.g. fire or natural
disasters at specific sites)
- Crisis situations with outage of key infrastructure (e.g. outage of key
communication channels, complete outage of IT infrastructure)
+ Necessary resources and information to handle crisis (e.g. communication
infrastructure, availability of necessary information such as contact information
and relevant risks in different crisis situations) are identified. (A)
- Appropriate measures to ensure availability of infrastructure or fallback
planning and information considering different crisis scenarios are in place
+ A communication strategy for crisis situations exist. The following aspects are
considered: (A)
- To whom to communicate (e.g., shareholders, affected business partners and
customers, other shareholders, general public)
- When to communicate
- Responsibilities for communication
- Authorization and approval of communication
- Legal and regulatory restrictions of communication (e.g., stock corporation
regulations)
- What to communicate (e.g. prepared templates for statements, contact
information and building blocks for specific scenarios)
- Communication channels (e.g., Media channels, social media)
- Instruments to monitor communication
- Instruction and procedures for employees (in case of direct communication
approaches such as direct contact of employees by business partners)
+ The efficiency, feasibility, and appropriateness of the crisis planning is evaluated
regularly. (A)
+ Spot based testing of crisis planning is conducted ((e.g., simulation, table-top-
exercises involving key personnel) (A)
+ Crisis exercises and simulations involving all relevant persons, decision makers
are conducted regularly. (A)
To what extent is the qualification
of employees for sensitive work
fields ensured?
Competent, reliable and trustworthy employees are a key to
information security within the organization Therefore, it is
important to check the qualifications of potential employees
(e.g. applicants) to an appropriate extent.
+ Sensitive work fields and jobs are determined.
+ The requirements for employees with respect to their job profiles are
determined and fulfilled.
+ The identity of potential employees is verified (e.g. checking identity
documents).
+ The personal suitability of potential employees is verified by means of simple
methods (e.g. job interview).
+ An extended suitability verification depending on the respective work field and
job is conducted. (e.g. assessment centre, psychological analysis, checking of
references, certificates and diploma, checking of certificates of conduct, checking
of professional and private background).
To what extent is all staff
contractually bound to comply with
information security policies?
Organizations are subject to legislation, regulations and
internal policies. Already when hiring staff, it must be ensured
that employees commit to compliance with the policies and
are aware of the consequences of misconduct.
+ A non-disclosure obligation is in effect.
+ An obligation to comply with the information security policies is in effect.
+ A non-disclosure obligation beyond the employment contract or order is in
effect.
+ Information security aspects are considered in the employment contracts of the
staff.
+ A procedure for handling violations of said obligations is described.
To what extent is staff made aware
of and trained with respect to the
risks arising from the handling of
information?
If the requirements and risks of information security are not
known to the employees, there is a risk of misconduct
resulting in damage to the organization. Therefore, it is
important that information security is internalized and
practiced as a natural part of their work.
+ A concept for awareness and training of employees is prepared. As a minimum,
the following aspects are considered:
- Information security policy,
- Reports of information security events,
- Reaction to occurrence of malware,
- Policies regarding user accounts and login information (e.g. password policy),
- Compliance issues of information security,
- Requirements and procedures regarding the use of non-disclosure agreements
when sharing information requiring protection,
- Use of external IT services.
+ Target groups for training and awareness measures (i.e., people working in
specific risk environments such as administrators, employees having access to
customer networks, personnel in areas of manufacturing) are identified and
considered in a training concept.
+ The concept has been approved by the responsible management.
+ Training and awareness measures are carried out both at regular intervals and in
response to events.
+ Participation in training and awareness measures is documented.
+ Contact persons for information security are known to employees.
To what extent is mobile work
regulated?
Working outside the specifically defined security zones
(teleworking) creates risks requiring corresponding protective
measures.
+ The requirements for teleworking are determined and fulfilled. The following
aspects are considered:
- Secure handling of and access to information (in both electronic and paper
form) while considering the protection needs and the contractual requirements
applying to private (e.g. home office) and public surroundings (e.g. during travels),
- Behavior in private surroundings,
- Behavior in public surroundings,
- Measures for protection from theft (e.g. in public surroundings),
+ The organization’s network is accessed via a secured connection (e.g. VPN) and
strong authentication.
+ The following aspects are considered:
- Measures for travelling (e.g. viewing by authorities),
- Measures for travelling to security-critical countries.
+ Employee awareness.
To what extent are security zones
managed to protect information
assets?
Security zones provide physical protection of information
assets. The more sensitive the information assets to be
processed are the more protective measures are required.
+ A security zone concept including the associated protective measures based on
the requirements for the handling of information assets is in place:
- Physical conditions (e.g. premises / buildings / spaces) are considered in the
definition of security zones,
- This also includes delivery and shipping areas.
+ The defined protective measures are implemented.
+ The code of conduct for security zones is known to all persons involved.
+ Procedures for allocation and revocation of access rights are established.
+ Visitor management policies (including registration and escorting of visitors) are
defined.
+ Policies for carrying along and using mobile IT devices and mobile data storage
devices (e.g. registration before they are carried along, identification obligations)
are defined and implemented.
+ Network/infrastructure components (own or customer networks) are protected
against unauthorized access.
+ External properties used for storing and processing information assets are
considered in the security zone concept (e.g. storage rooms, garages, workshops,
test tracks, data processing centres).
+ Protective measures against simple overhearing and viewing are implemented.
(C)
Superseded by 1.6.3, 5.2.8 and
5.2.9
INTERNAL
_x000D_
not public
3.1.3
None
None
None
3.1.4
None
None
4
Identity and Access Management
4.1
Identity Management
4.1.1
+ Identification means can be produced under controlled conditions only.
None
None
4.1.2
None
4.1.3
None
None
None
4.2
Access Management
4.2.1
None
5
5.1
Cryptography
5.1.1
None
None
5.1.2
+ Information is transported or transferred in content-encrypted form. (C)
None
5.2
Operations Security
5.2.1
None
None
5.2.2
None
None
None
To what extent is the handling of
supporting assets managed?
During their lifecycle (e.g. usage, disposal), supporting assets
are subject to risks such as loss, theft or unauthorized
viewing.
+ The requirements for the handling of supporting assets (e.g. transport, storage,
repair, loss, return, disposal) are determined and fulfilled.
+ Supporting assets are protected. Disposal of supporting assets is conducted in
accordance with one of the relevant standards (e.g. ISO 21964, at least Security
Level 4). (C)
To what extent is the handling of
mobile IT devices and mobile data
storage devices managed?
Mobile IT devices (e.g. notebooks, tablets, smartphones) and
mobile data storage devices (e.g. SD cards, hard drives) are
generally used not only on the premises of an organization,
but also in mobile applications. This presents an increased
risk with respect to e.g. loss or theft.
+ The requirements for mobile IT devices and mobile data storage devices are
determined and fulfilled. The following aspects are considered:
- Encryption,
- Access protection (e.g. PIN, password),
- Marking (also considering requirements for use in the presence of customers).
+ Registration of the IT devices.
+ Users are informed of missing data protection on mobile devices.
+ General encryption of mobile data storage devices or the information assets
stored thereon: (C, I)
- Where this is technically not feasible, information is protected by similarly
effective measures.
To what extent is the use of
identification means managed?
To check the authorization for both physical access and
electronic access, means of identification such as keys, visual
IDs,
other physical access devices as well as
cryptographic
tokens are often used. The security features are only reliable
if the use of such identification means is handled adequately.
+ The requirements for the handling of identification means over the entire
lifecycle are determined and fulfilled. The following aspects are considered:
- Creation, handover, return and destruction,
- Validity periods,
- Traceability,
- Handling of loss.
+ The validity of identification means is limited to an appropriate period. (C, I, A)
+ A strategy of blocking or invalidation of identification means in case of loss is
prepared and implemented as far as possible. (C, I, A)
To what extent is the user access to
IT
services and IT systems secured?
Only securely identified (authenticated) users are to gain
access to IT systems. For this purpose, the identity of a user is
securely determined by suitable procedures.
+ The procedures for user authentication have been selected based on a risk
assessment. Possible attack scenarios have been considered (e.g. direct
accessibility via the internet).
+ State of the art procedures for user authentication are applied.
+ The user authentication procedures are defined and implemented based on the
business-related and security-relevant requirements:
- Users are authenticated at least by means of strong passwords according to the
state of the art.
+ Superior procedures are used for the authentication of privileged user accounts
(e.g. Privileged Access Management, two-factor authentication).
+ Depending on the risk assessment, authentication procedure and access control
have been enhanced by supplementary measures (e.g. continuous access
monitoring with respect to irregularities or use of strong authentication,
automatic logout, disabling in case of inactivity, or brute force prevention).
(C, I, A)
+ Before gaining access to data of very high protection needs, users are
authenticated by means of strong authentication (e.g. two-factor authentication)
according to the state of the art. (C, I)
To what extent are user accounts
and login information securely
managed and applied?
Access to information and IT systems is provided via validated
user accounts assigned to a person. It is important to protect
login information and to ensure the traceability of
transactions and accesses.
+ The creating, changing, and deleting of user accounts is conducted.
+ Unique and personalized user accounts are used.
+ The use of “collective accounts” is regulated (e.g. restricted to cases where
traceability of actions is dispensable).
+ User accounts are disabled immediately after the user has resigned from or left
the organization (e.g. upon termination of the employment contract).
+ User accounts are regularly reviewed.
+ The login information is provided to the user in a secure manner.
+ A policy for the handling of login information is defined and implemented. The
following aspects are considered:
- No disclosure of login information to third parties
- not even to persons of authority
- under observation of legal parameters
- No writing down or unencrypted storing of login information
- Immediate changing of login information whenever potential compromising is
suspected
- No use of identical login information for business and non-business purposes
- Changing of temporary or initial login information following the 1st login
-
Requirements for the quality of authentication information (e.g. length of
password, types of characters to be used).
+ The login information (e.g. passwords) of a personalized user account must be
known to the assigned user only.
+ A basic user account with minimum access rights and functionalities is existent
and used.
+ Default accounts and passwords pre-configured by manufacturers are disabled
(e.g. by blocking or changing of password).
+ User accounts are created or authorized by the responsible body.
+ Creating user accounts is subject to an approval process (four-eyes principle).
+ User accounts of service providers are disabled upon completion of their task.
+ Deadlines for disabling and deleting user accounts are defined.
+ The use of default passwords is technically prevented.
+ Where strong authentication is applied, the use of the medium (e.g. ownership
factor) is secure.
+ User accounts are reviewed at regular intervals. This also includes user accounts
in customers' IT systems.
+ Interactive login for service accounts (technical accounts) is technically
prevented.
To what extent are access rights
assigned and managed?
The management of access rights ensures that only
authorized users have access to information and IT
services
.
For this purpose, access rights are assigned to user accounts.
+ The requirements for the management of access rights (authorization) are
determined and fulfilled. The following aspects are considered:
- Procedure for application, verification, and approval,
-
Applying
the minimum (“need-to-know”/
"least privilege"
) principle.
- Access rights are revoked when no longer needed
+ The access rights granted for normal and privileged user accounts and technical
accounts are
reviewed
at regular intervals also within IT systems of customers.
+ Strategies for authorizing access to information are prepared.
+ Authorization roles are used.
+ Rights are allocated on a need-to-use basis and according to the role and/or
area of responsibility.
+ Normal user accounts are not granted privileged access rights.
+ The access rights of a user account are adapted after the user has changed (e.g.
to another field of responsibility).
+ The access rights are approved by the responsible internal Information Officer.
(C, I, A)
+ Prevention of unauthorized persons gaining access and information (privileged
users): (C)
- Information is stored in encrypted form at content level (e.g. file level).
- Where encryption is not feasible, information shall be protected by similarly
effective measures.
+ Existing access rights are regularly reviewed at shorter intervals (e.g. quarterly)
(C)
IT Security / Cyber Security
To what extent is the use of
cryptographic procedures
managed?
When using cryptographic procedures, it is important to
consider risks in the field of availability (lost key material) as
well as risks due to incorrectly applied procedures in the
fields of integrity and confidentiality (poor
algorithms/protocols or insufficient key strengths).
+ All cryptographic procedures used (e.g. encryption, signature, and hash
algorithms, protocols) provide the security required by the respective application
field according to the
recognized industry standard,
- to the extent legally feasible.
+ Preparation of technical rules containing requirements for encryption in order to
protect information according to its classification.
+ A concept for the application of cryptography is defined and implemented. The
following aspects are considered:
- Cryptographic procedures,
- Key strengths,
- Procedures for the complete lifecycle of cryptographic keys, including
generation, storage, archiving, retrieval, distribution, deactivation, renewal, and
deletion.
+ An emergency process for restoring key material is established.
+ Key sovereignty requirements (particularly in case of external processing) are
determined and fulfilled. (C, I)
To what extent is information
protected during transfer?
When being transferred via public or private networks,
information can in some circumstances be read or
manipulated by unauthorized third parties. Therefore,
requirements regarding the protection needs of the
information must be determined and implemented by taking
suitable measures during such transfer.
+ The network services used to transfer information are identified and
documented.
+ Policies and procedures in accordance with the classification requirements for
the use of network services are defined and implemented.
+ Measures for the protection of transferred contents against unauthorized access
are implemented.
+ Measures for ensuring correct addressing and correct transfer of information
are implemented.
+ Electronic data exchange is conducted using content or transport encryption
according to the respective classification.
+ Remote access connections are verified to possess adequate security features
(e.g., encryption, granting and termination of access) and capabilities
.
+ Information is transported or transferred in encrypted form: (C)
- Where encryption is not feasible, information must be protected by similarly
effective measures.
To what extent are changes
managed?
The objective is to ensure that information security aspects
are considered in case of any changes to the organization,
business processes and IT systems (Change Management) in
order to prevent these changes from causing an uncontrolled
reduction in the information security level.
+ Information security requirements for changes to the organization, business
processes, IT systems are determined and applied.
+ A formal approval procedure is established.
+ Changes are verified and assessed for their potential impact on the information
security.
+ Changes affecting the information security are subjected to planning and
testing.
+ Procedures for fallback in fault cases are considered.
+ Compliance with the information security requirements is verified during and
after the changes are applied. (C, I, A)
To what extent are development
and testing environments separated
from operational environments?
The objective of separating the development, testing and
operational environments is to ensure that the availability,
confidentiality and integrity of productive data are
maintained.
+ The IT systems have been subjected to risk assessment in order to determine
the necessity of their separation into development, testing and operational
systems.
+ A segmentation is implemented based on the results of risk analysis.
+ The requirements for development and testing environments are determined
and implemented. The following aspects are considered:
- Separation of development, testing and operational systems,
- No development and system tools on operational systems (except those
required for operation),
- Use of different user profiles for development, testing, and operational systems.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
5.2.3
None
None
None
5.2.4
None
5.2.5
None
None
None
5.2.6
None
5.2.7
None
None
5.2.8
None
5.2.9
None
5.3
System acquisitions, requirement management and development
To what extent are IT systems
protected against malware?
The aim is to both technically and organizationally ensure the
protection of IT systems against malware.
+ Requirements for protection against malware are determined.
+ Technical and organizational measures for protection against malware are
defined and implemented.
+ Unnecessary network services are disabled.
+ Access to network services is restricted to necessary access by means of suitable
protective measures (see examples).
+ Malware protection software is installed and updated automatically at regular
intervals (e.g. virus scanner).
+ Received files and software are automatically inspected for malware prior to
their execution (on-access scan).
+ The entire data contents of all systems is regularly inspected for malware.
+ Data transferred by central gateways (e.g. e-mail, internet, third-party networks)
is automatically inspected by means of protection software:
- Encrypted connections are considered.
+ Measures to prevent protection software from being deactivated or altered by
users are defined and implemented.
+ Case-related staff awareness measures.
+ For IT systems operated without the use of malware protection software,
alternative measures (e.g. special resilience measures, few services, no active
users, network isolation) are implemented.
To what extent are event logs
recorded and analysed?
Event logs support the traceability of events in case of a
security incident. This requires that events necessary to
determine the causes are recorded and stored. In addition,
the logging and analysis of activities in accordance with
applicable legislation (e.g. Data Protection or Works
Constitution Act) is required to determine which user account
has made changes to IT systems.
+ Information security requirements regarding the handling of event logs are
determined and fulfilled.
+ Security-relevant requirements regarding the logging of activities of system
administrators and users are determined and fulfilled.
+ The IT systems used are assessed regarding the necessity of logging.
+ When using external IT services, information on the monitoring options is
obtained and considered in the assessment.
+ Event logs are checked regularly for rule violations and noticeable problems in
compliance with the permissible legal and organizational provisions.
+ A procedure for the escalation of relevant events to the responsible body (e.g.
security incident report, data protection, corporate security, IT security) is defined
and established.
+ Event logs (contents and meta data) are protected against alteration. (e.g. by a
dedicated environment).
+ Adequate monitoring and recording of any actions on the network that are
relevant to information security are established.
+ Information security requirements relevant to the security during the handling
of event logs, e.g. contractual requirements, are determined and implemented.
(C, I, A)
+ Cases of access during connection and disconnection of external networks (e.g.
remote maintenance) are logged. (C, I, A)
+ Logging of any access to data of very high protection needs as far as technically
feasible and as permissible according to legal and organizational provisions. (C, I)
To what extent are vulnerabilities
identified and addressed?
Vulnerabilities increase the risk of IT systems being unable to
meet the requirements for confidentiality, availability and
integrity. Exploitation of vulnerabilities is among the possible
ways for attackers to gain access to the IT system or to
threaten its operating stability.
+ Information on technical vulnerabilities for the IT systems in use is gathered (e.g.
information from the manufacturer, system audits, CVS database) and evaluated
(e.g. Common Vulnerability Scoring System CVSS)
+ Potentially affected IT systems and software are identified, assessed and any
vulnerabilities are addressed.
+ An adequate patch management is defined and implemented (e.g. patch testing
and installation).
+ Risk minimizing measures are implemented, as necessary.
+ Successful installation of patches is verified in an appropriate manner.
To what extent are IT systems
and
services
technically checked
(system
and service
audit)?
The objective of technical checks is the detection of states
which can jeopardize the availability, confidentiality or
integrity of IT systems
and services
.
+ Requirements for auditing IT systems
or services
are determined.
+ The scope of the system audit is specified in a timely manner.
+ System
or service
audits are coordinated with the operator and users of the IT
systems or
services
.
+ The results of system
or service
audits are stored in a traceable manner and
reported to the relevant management.
+ Measures are derived from the results.
+ System and service audits are planned taking into account any security risks they
might cause (e.g. disturbances).
+ Regular system or service audits are performed
- carried out by qualified personnel
- suitable tools (e.g. vulnerability scanners) are used for system and service
audits (if applicable)
- performed from the internet and the internal network
+ Within a reasonable period following completion of the audit, a report is
prepared.
+ For critical IT systems or services, additional system or service audit
requirements have been identified and are fulfilled (e.g., service specific tests and
tools and/or human penetration tests, risk-based time intervals) (A)
+ IT systems and services are regularly scanned for vulnerabilities. (A)
- Suitable protective measures must be implemented for systems and services
that may not be scanned.
To what extent is the network of
the organization managed?
IT systems in a network are exposed to different risks or have
different protection needs. In order to detect or prevent
unintended data exchange or access between these IT
systems, they are subdivided into suitable segments and
access is controlled and monitored by means of security
technologies.
+ Requirements for the management and control of networks are determined and
fulfilled.
+ Requirements regarding network segmentation are determined and fulfilled.
+ Procedures for the management and control of networks are defined.
+ For a
risk-based
network segmentation, the following aspects are considered:
- Limitations for connecting IT systems to the network,
- Use of security technologies,
- Performance, trust, availability, security, and safety considerations
- Limitation of impact in case of compromised IT systems
- Detection of potential attacks and lateral movement of attackers
- Separation of networks with different operational purpose (e.g. test and
development networks, office network, manufacturing networks)
- The increased risk due to network services accessible via the internet,
- Technology-specific separation options when using external IT services,
- Adequate separation between own networks and customer networks while
considering customer requirements
- Detection and prevention of data loss/leakage
+ Extended requirements for the management and control of networks are
determined and implemented. The following aspects are considered: (C, I, A)
- Authentication of IT systems on the network,
- Access to the management interfaces of IT systems is restricted.
- Specific risks (e.g. wireless and remote access)
To what extent is continuity
planning for IT services in place?
Continuity (including contingency) planning for IT services is
part of an overall program for achieving continuity of
operations for organizational mission and business critical
functions. Actions addressed in continuity plans include
orderly system degradation, system shutdown, fallback to a
manual mode, alternate information flows, and operating in
modes reserved for when a security incident occurs.
+ Critical IT services are identified, and business impact is considered.
+ Requirements and responsibilities for continuity and recovery of those IT
services are known to relevant stakeholders and fulfilled.
+ Critical IT systems are identified
- the relevant systems are classified to have the appropriate protection need
- adequate and appropriate security measures are implemented
+ Continuity planning includes at least the following scenarios affecting critical IT
systems:
- (Distributed) Denial of Service attacks
- Successful ransomware attacks and other sabotage activities
- System failure
- Natural disaster
+ Continuity planning considers the following cases
- Alternative communication strategies, in case primary communication means
are not available
- Alternative storage strategies, in case primary storage means are not available
- Alternative power and network
+ Continuity planning is regularly reviewed and updated
+ Continuity planning includes predefined time frames (Recovery Time Objective)
for resumption of operation in line with requirements. (A)
+ Appropriate SLAs with external service providers according to continuity
planning are in place. (A)
+ Continuity plans include coordination of contractually agreed communication
with business partners (A)
+ Continuity planning is regularly tested including a full recovery and
reconstitution of the system to a known state and compliance with defined target
times. (A)
+ A backup and recovery strategy for critical IT services and information is defined
and implemented. The following aspects are considered:
- Backups are protected against unauthorized modification or deletion by
malicious software. (I, A)
- Backups are protected against unauthorized access by malicious software or
operators (C, I)
+ Continuity planning is coordinated with the continuity plans of relevant external
service providers. (A)
+ Continuance of essential mission and business functions with minimal or no loss
of operational continuity is possible. The plan for continuance of essential mission
and business functions considers the following aspects:
- Alternate operation strategies and necessary separated standby systems to
retain and/or resume operation to the extent possible if critical IT services
become unavailable. (A)
- Alternate storage and backup sites that provide controls equivalent to that of
the primary site. (C, I, A)
+ Continuity planning is tested regularly. Tests and any lessons learned are
documented. (I, A)
To what extent is the backup and
recovery of data and IT services
guaranteed?
Data and IT services can become unavailable through events
such as hardware failures, software defects, operator errors
or attacks. Backup and recovery enables organizations to
recover from relevant situations and limit potential harm to
the organization to a reasonable amount.
+ Backup concepts exist for relevant IT systems. The following aspects are
considered:
- Appropriate protective measures to ensure confidentiality, integrity, and
availability for data backups.
+ Recovery concepts exist for relevant IT services.
+ A backup and recovery concept exists for each relevant IT service.
- Dependencies between IT services and the sequence for recovery are
considered.
+ Backup and recovery concepts are methodically reviewed at regular intervals.
(A)
+ General restore capability is considered and tested (e.g., sample testing, test
systems) (I, A)
+ Backup and recovery concepts consider the following aspects: (A)
- Recovery Point Objective (RPO).
- Recovery Time Objective (RTO).
- Required resources for recovery (considering capacity and performance incl.
personnel and hardware).
- Avoidance of overload scenarios during recovery.
- Appropriate spatial redundancy (e.g., separate room, separate fire
section,
separate datacentre, separate site).
+ (Additional) Backups are performed via offline procedures, immutable backups
or by using isolated IAM technology. (I, A)
+ Restore procedures are technically tested in a methodical way at regular
intervals. (I, A)
+ Geographical redundancy is considered in data backup and recovery concepts.
(A)
INTERNAL
_x000D_
not public
5.3.1
None
None
5.3.2
None
None
5.3.3
None
None
None
5.3.4
None
None
None
6
Supplier Relationships
6.1.1
None
None
6.1.2
None
None
None
7
Compliance
To what extent is information
security considered in new or
further developed IT systems?
Information security is an integral part of the entire lifecycle
of IT systems. This particularly includes consideration of
information security requirements in the development or
acquisition of IT systems.
+ The information security requirements associated with the design and
development of IT systems are determined and considered.
+ The information security requirements associated with the acquisition or
extension of IT systems and IT components are determined and considered.
+ Information security requirements associated with changes to developed IT
systems are considered.
+ System approval tests are carried out under consideration of the information
security requirements.
+ Requirement specifications are prepared. The following aspects are considered:
- The information security requirements.
- Vendor recommendations and best practices for secure configuration and
implementation
- Best practices and security guidelines
- Fail safe (designed to return to a safe condition in the event of a failure or
malfunction)
+ Requirement specifications are reviewed against the information security
requirements.
+ The IT system is reviewed for compliance with specifications prior to productive
use.
+ The use of productive data for testing purposes is avoided as far as possible (if
applicable, anonymization or pseudonymization):
- Where productive data are used for testing purposes, it shall be ensured that
the test system is provided with protective measures comparable to those on the
operational system,
- Requirements for the lifecycle of test data (e.g. deletion, maximum lifetime on
the IT system),
- Case-related specifications for the generation of test data are defined.
+ The security of
purpose built software
or significantly
customized
software is
tested (e.g. penetration testing)
(C, I, A)
- during commissioning
- in case of significant changes
- or at regular intervals
To what extent are requirements
for network services defined?
Network services have different requirements for information
security, quality of data transfer or management. It is
important to know these criteria and the scope of use of the
different network services.
+ Requirements regarding the information security of network services are
determined and fulfilled.
+ A procedure for securing and using network services is defined and
implemented.
+ The requirements are agreed in the form of SLAs.
+ Adequate redundancy solutions are implemented.
+ Procedures for monitoring the quality of network traffic (e.g. traffic flow
analyses, availability measurements) are defined and carried out. (A)
To what extent is the return and
secure removal of information
assets from external IT services
regulated?
In order to ensure control over the information assets as the
information owner, it is necessary that the information assets
can be safely removed or are returned, if required, when
terminating the IT service.
+ A procedure for the return and secure removal of information assets from each
external IT service is defined and implemented.
+ A description of the termination process is given, adapted to any changes, and
contractually regulated.
To what extent is information
protected in shared external IT
services?
Clear segregation between individual clients must be ensured
such as to always protect own information in external IT
services and to prevent it from being accessed by other
organizations (clients).
+ Effective segregation (e.g. segregation of clients) prevents access to own
information by unauthorized users of other organizations.
+ The provider’s segregation concept is documented and adapted to any changes.
The following aspects are considered:
- Separation of data, functions,
customer-specific software
, operating system,
storage system and network,
- Risk assessment for the operation of external software within the shared
environment.
To what extent is information
security ensured among contractors
and cooperation partners?
An appropriate level of information security is also
maintained while collaborating with cooperation partners
and contractors.
+ Contractors and cooperation partners are subjected to a risk assessment with
regard to information security.
+ An appropriate level of information security is ensured by contractual
agreements with contractors and cooperation partners.
+ Where applicable, contractual agreements with clients are passed on to
contractors and cooperation partners.
+ Compliance with contractual agreements is verified.
+ Contractors and cooperation partners are contractually obliged to pass on any
requirements regarding an appropriate level of information security to their
subcontractors.
+ Service reports and documents by contractors and cooperation partners are
reviewed.
+ Proof is provided that the information security level of the supplier is adequate
for the protection needs of the information (e.g. certificate, attestation, internal
audit). (C, I, A)
To what extent is non-disclosure
regarding the exchange of
information contractually agreed?
Non-disclosure agreements provide legal protection of an
organization’s information particularly where information is
exchanged beyond the boundaries of the organization.
+ The non-disclosure requirements are determined and fulfilled.
+ Requirements and procedures for applying non-disclosure agreements are
known to all persons passing on information in need of protection.
+ Valid non-disclosure agreements are concluded prior to
forwarding sensitive
information.
+ The requirements and procedures for the use of non-disclosure agreements and
the handling of information requiring protection are reviewed at regular intervals.
+ Non-disclosure agreement templates are available and checked for legal
applicability.
+ Non-disclosure agreements include the following information:
- the persons/organizations involved,
- the type of information covered by the agreement,
- the subject of the agreement,
- the validity period of the agreement,
- the responsibilities of the obliged party.
+ Non-disclosure agreements include provisions for the handling of sensitive
information beyond the contractual relationship.
+ Options of demonstrating compliance with specifications (e.g. review by an
independent third party or audit rights) are defined.
+ A process for monitoring the validity period of temporary non-disclosure
agreements and initiating their extension in due time is defined and
implemented.
INTERNAL
_x000D_
not public
7.1.1
None
None
None
7.1.2
None
None
None
None
To what extent is compliance with
regulatory and contractual
provisions ensured?
Non-compliance with legal, regulatory, or contractual
provisions can create risks to the information security of
customers and the own organization. Therefore, it is essential
to ensure that these provisions are known and observed.
+ Legal, regulatory, and contractual provisions of relevance to information security
(see examples) are determined at regular intervals.
+ Policies regarding compliance with the provisions are defined, implemented,
and communicated to the responsible persons.
+ The integrity of records in accordance with the legal, regulatory, or contractual
provisions and business requirements is considered.
To what extent is the protection of
personally identifiable data
considered when implementing
information security?
Privacy and protection of personally identifiable data are
considered in the implementation of information security as
required by relevant national legislation and regulations,
where applicable.
+ Legal and contractual information security requirements regarding the
procedures and processes in the processing of personally identifiable data are
determined.
+ Regulations regarding the compliance with legal and contractual requirements
for the protection of personally identifiable data are defined and known to the
entrusted persons.
+ Processes and procedures for the protection of personally identifiable data are
considered in the information security management system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Reference to other standards
Measures/recommendations
Date of assessment
Date of completion
Contact
Further information
do not remove this text. This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional invisible text for technical reasons. Please do not remove this text.
.
Usual person responsible for
process implementation
Reference to implementation
guidance
Responsible
department
ISO 27001:2013: A.5.1.1, A.5.1.2
ISO 27001:2022: A.5.1
ISA/IEC 62443: 1.1.1
NIST CSF 1.1: ID.GV-1
BSI-Standard 200-2:
3.2, 3.4
BSI IT-Grundschutz-Compendium:
ISMS.1, ORP.1
NIST SP800-53r5:
PT-1, AC-1, AT-1, AU-1, CA-1, CM-
1, CP-1, IA-1, IR-1, MA-1, MP-1,
PE-1, PL-1, PM-1, PM-17, PM-18,
PM-20, PS-1, RA-1, SA-1, SA-15,
SC-1, SI-1, SR-1
Introduction:
The requirements derived from the information security strategy and the context of the organization result in information security guidelines, which can be mapped in a multi-level document
pyramid depending on the size of the company. The context of the organization results, among other things, from the corporate culture, customer requirements or legal requirements. An
overarching guideline is usually the main document on the basis of which further guidelines and regulations are derived.
Justification:
Guidelines and regulations are the basis for joint action to achieve strategic corporate goals. Without central regulations that are visible to relevant persons, misunderstandings can arise from the
point of view of information security and different decisions can be made, which consequently generate incalculable risks to information security. In addition, regulations are a basis for comparing
the actual implementation with the written requirements in regular effectiveness checks and for identifying opportunities for improvement.
Basic information:
It is important to consider the requirements of information security in business processes.
Requirements for information security means the level of security that ensures the safe handling of
information.
The requirements can be brought to the organization from outside or arise from within the organization itself.
The requirements of the individual "interested parties" must be aligned with the objectives of the organization and a strategy must be identified to achieve the requirements and objectives.
Employees will also find detailed explanations of the consequences of non-compliance with guidelines in the guidelines.
The organization examines from its point of view the need for guidelines for achieving the objectives and for operating an ISMS and creates them.
Since framework conditions can change, it makes sense to check the guidelines regularly, e.g. annually, for appropriateness and correctness.
Employees need access to the policies. A central location, such as the intranet, is recommended to ensure that you always have access to the latest version of a policy. This is where printed
guidelines have significant disadvantages.
A business partner may also need access to the guidelines, for example, because he assigns or transfers personnel within the scope of the ISMS. The need for contractual arrangements will be
assessed by the organisation.
"Other relevant security policies" designates all security-relevant policies that are not part of the ISMS and are relevant for Information Security.
ISO 27001:2013: 4
ISO 27001:2022: 4
BSI-Standard 200-2:
3.1, 3.2.1, 3.2.2, 3.2.3, 3.3.4,
3.4.4, 10.1, 10.2
BSI IT-Grundschutz-Compendium:
ISMS.1, ORP.1
NIST SP800-53r5:
PT-1, PL-7, PL-8, PL-9, PM-3, PM-
23, PM-24, PM-26, PM-27, SA-2
ISO 27001:2013: A.6.1.1, A6.1.2
ISO 27001:2022: A.5.2, A.5.3
ISA/IEC 62443: 1.1.3, 1.1.5
NIST CSF 1.1: ID.AM-6, ID.GV-2,
DE.DP-1
BSI-Standard 200-2:
4
BSI IT-Grundschutz-Compendium:
ISMS.1, ORP.1
NIST SP800-53r5:
CP-2, AC-5, PL-7, PM-2, PM-10,
PM-19, PM-29, PT-2
Basic information:
"Other relevant security roles" designates all security-relevant roles that are not part of the ISMS and are relevant for Information Security.
ISO 27001:2013: A.6.1.5
ISO 27001:2022: A.5.8
NIST CSF 1.1: ID.BE-3
BSI-Standard 200-2:
4.1, 4.6, 4.8
NIST SP800-53r5:
PT-1, PL-2, PM-11
ISO 27001:2022: A.8.9
ISO 27017: CLD.6.3.1
ISA/IEC 62443: 1.1.3, 2.1.3
BSI-Standard 200-2:
8.1, 8.2, 8.4
BSI IT-Grundschutz-Compendium:
OPS.2.1, OPS.2.2 , OPS.3.1, ORP.2
NIST SP800-53r5:
MA-4, PT-1, PL-2
ISO 27001:2013: A.8.1.1, A.8.1.2
ISO27001:2022: A.5.9
ISA/IEC 62443: 1.2.4, 2.1.1
NIST CSF 1.1: ID.AM-1, ID.AM-2,
ID.AM-4, ID.BE-1
BSI-Standard 200-2:
8.1
BSI IT-Grundschutz-Compendium:
ISMS.1, ORP.1, CON.9
NIST SP800-53r5:
CP-2, PT-1, CM-8, MA-2, MP-7, PE-
16, PE-20, PE-22, PM-5, SA-5, SR-4
Introduction:
It is important for every organization to know the information that is of value to it (e.g. trade secrets, critical business processes, know-how, patents). These are called information assets (also called
primary assets). The value of information results, among other things, from the economic benefit or the legal necessity (e.g. by laws, customer contracts) that the information creates in a certain
situation, and the costs that have to be incurred.
In addition, the need to protect these information assets is inherited by information carriers (also referred to as secondary assets) (e.g. IT systems, services/IT services, employees) that are
connected. (See also Classification of Information in Control 1.3.2)
Justification:
An inventory of the information assets and the derived information carriers ensures that the organization has an overview of its information assets and can determine the protection needs for
confidentiality, integrity and availability.
On this basis, an organization can determine fundamental protective measures to protect itself and the information assets/carriers.
Basic requirements:
Information values, information carriers and protection requirements change regularly (e.g. in the event of changes to the organisation, the IT landscape or processes). One task of the organization
is to keep identified information values and information carriers up to date. A central process is helpful in order to obtain a complete overview of these values and carriers along the entire life cycle
from generation/commissioning, use to destruction/deletion. Overviews of these information values and information carriers as well as the protection requirements are a supporting instrument in
order to obtain and maintain a comprehensive overview.
For a comprehensive analysis of these information values, a look at the essential business processes and the information values processed in this process helps, since the protection requirements
also depend on the process. In a further step, further information is relevant, the loss or disclosure of which would cause financial or reputational damage (e.g. patents, business documents,
customer lists, customer contracts, personnel files, etc.).
Assets where security is of relevance are all assets where information or cyber security threats have relevant impact to the organization or its business. This includes IT systems, IT services, OT
systems, IOT devices.
ISO 27001:2013: A.8.2.1, A.8.2.2,
A.8.2.3, A.8.3.2
ISO 27001:2022: A.5.10, A.5.12,
A.5.13, A.8.10
ISA/IEC 62443: 5.1.1, 5.1.2, 8.2.4
NIST CSF 1.1: ID.AM-5, ID.BE-5
BSI-Standard 200-2:
8.1
BSI IT-Grundschutz-Compendium:
ISMS.1, ORP.1, CON.9
NIST SP800-53r5:
CP-2, PT-1, MA-2, MA-3, MA-4,
MA-6, PM-7, PM-32, RA-2, RA-9,
SA-23, SC-3
Introduction:
The objective of the classification of information assets is a consistent determination of the need for protection. This allows the organization to standardize and apply appropriate security
measures. The classification of information is based on the upstream determination of the possible information values and information carriers, which is described in more detail in Control 1.3.1.
Justification:
The unambiguous classification of information assets and the description of standardized and specified protective measures for handling information significantly reduces the scope for handling
information assets. In this way, concrete guidelines help both the owners, users and additional departments such as IT to handle the information values appropriately.
INTERNAL
_x000D_
not public
ISO 27017: 14.1.1
BSI IT-Grundschutz-Compendium:
OPS.2.1, OPS.2.2, OPS.3.1, CON.9,
CON.2, ORP.5
NIST SP800-53r5:
CM-5, CM-6, CM-7, MA-7, SA-22
ISO 27001:2013: A.15.1.1
ISO 27001:2022: A.5.19
NIST CSF 1.1: DE.CM-4, DE.CM-5
NIST SP800-53r5:
CM-7(4), CM-10, CM-11, SC-18,
SC-34, SC-49, SC-50, SI-16
Software determines the logic on how information is processed within the organization. A short and pragmatic approval helps to ensure that software does not generate irresponsible risks to the
organization's information and infrastructure.
Evaluation and approval of software enables the organization to limit risks of unintended logic and at the same time is the basis of a solid vulnerability and patch management (see 5.2.5) as well as
maintaining a compliant license management (see 7.1.1). Its important to also consider software for admin and maintenance use such as debugging and firmware updating tools.
When it comes to software management, the first step should be to determine on which level software needs to be approved. Finding a good compromise between the need for security and
practicallity is the main driver of this consideration. For example, dedicated approval of every application or software library that comes with the base installation of the operating system would be
excessive in many scenarios. Similarly, the commitment to a specific device usually means that not approving necessary firmware and/or device drivers significantly impacts the devices usability.
A repository of approved software prevents that people inside your organization accidentally install unapproved or modified software. Maintaining software versions and patch levels simplifies
patch-management, but does not necessarily mean that every patch needs to be individually evaluated before approval.
Especially if you have software that allows you to conduct administrative tasks, additional requirements might be necessary. A tool allowing to monitor network traffic for security or debugging
purposes or manipulate configuration of critical system might be restricted for use requiring individual approval while maintaining a 4-eyes principile.
Key is to keep the evaluation and approval processes simple enough to be practical. If approval becomes to difficult or time-consuming, your administration will become reluctant to approve
relevant software and users in the organization will circumvent the appvoal process to get the software they need. Accordingly, a good evaluation process is
designed, to adapt to the protection
need of the software. This means first of all, to decide on the level of evaluation necessary for specific classes of software.
When it comes to evaluation, the control already gives good indications what steps the evaluation processes should follow:
+ Determine the intended or forseeable use scenario of the software and what security requirements apply for that scenario (i.e. is the approval including special high risk scenarios with specific
security requirements or is the approval for normal risk use cases with a limited set of security requirements only)
+ Determine if your organization has the right to use the software (i.e. does the (to be) acquired licensing permit the intended use-case)
+ Consider the source of the software. Do your organization trusts the source (e.g. is it provided or distributed by a known and trusted software vendor)
The outcome of these three steps will determine additional evaluation need. When deciding on further steps, keep in mind that further testing or evaluation might not only remidiate risks, but also
creates a time delay which can be a risk in itself. For example, in many cases the risk of not installing a security relevant patch because testing has not been conducted11 yet is higher than the risk
that the patch creates issues that would have been detected by testing. A good approach always aims to find an appropriate balance.
Accordingly, granularity of software approval vary by scenario and can be very broad. For example, it might be practical to approve all system software that comes with a baseline operating system
installation (i.e. operating system components, drivers, etc.). Also approval of trusted software repositories (i.e. based on the app classification of a mobile device store or operating system
distribution) can be a valid approach, especially when limited to use in standard scenarios (i.e. without access to information with a significant protection need)
When it comes to the type of approval, its important to notice that there is no need to keep centrallized approval lists. Based of the organization, the approval can be done in a decentralized way
(i.e. in some cases, the development department has its specific evaluation and approval capabilities within the framework of the centralized processes). Similarly, its often more pratical and
accurate to maintain an overview over installed software versions and patch levels by automated management tools rather than by manually maintaining lists.
ISO 27001:2013: 6.1.2, 6.1.3
ISO 27001:2022: A.5.3, A.5.5
ISA/IEC 62443: 1.2.1
NIST CSF 1.1: ID.GV-4, ID.RA-4,
ID.RA-5, ID.RA-6, ID.RM-1, ID.RM-
2, ID.RM-3, ID.SC-1, RS.MI-3
BSI IT-Grundschutz-Compendium:
ISMS.1
NIST SP800-53r5:
CA-7(4), PM-9, PM-28, RA-3, RA-7,
RA-8, SR-2
ISO 27001:2013: A.18.2.2,
A.18.2.3
ISO 27001:2022: A.5.36, A.8.8
NIST CSF 1.1: PR.IP-8, DE.DP-2,
DE.DP-3
BSI-Standard 200-2:
10.1
BSI IT-Grundschutz-Compendium:
ISMS.1
NIST SP800-53r5:
PT-1, CA-2, CA-5, PM-4, PM-6, PM-
14, PM-31
ISO 27001:2013: A.18.2.1
ISO 27001:2022: A.5.35
BSI-Standard 200-2:
10.1.4
BSI IT-Grundschutz-Compendium:
DER.3.1
NIST SP800-53r5:
CA-2(1), CA-7(1)
ISO 27001:2013: A.16.1.1, A16.1.2
ISO 27001:2022: A.5.24, A.6.8
ISA/IEC 62443: 1.1.6, 7.1.1, 7.1.2,
7.1.7, 7.1.8
BSI IT-Grundschutz-Compendium:
DER.1
NIST SP800-53r5:
AC-3(10), IR-4(10), IR-4(13), IR-
4(8)
ISO 27001:2013: A.16.1.1,
A16.1.1.4, A.16.1.5, A.16.1.6
ISO 27001:2022: A.5.24-27
NIST CSF 1.1: RS.CO-2, RC.CO-1 ,
RC.CO-2, RC.CO-3
BSI IT-Grundschutz-Compendium:
DER.2.1, DER.2.2, DER.2.3
NIST SP800-53r5:
IR-6
INTERNAL
_x000D_
not public
Contractual requirements include, for example, customer requirements
ISO 27001:2013: A.17.1
ISO 27001:2022: A.5.29
NIST CSF 1.1: ID.BE-2, ID.SC-5,
PR.IP-7, PR.IP-9, PR.IP-10, RS.RP-1,
RS.CO-3, RS.CO-4, RS.AN-1, RS.AN-
2, RS.AN-3, RS.AN-4, RS.MI-1,
RS.MI-2, RS.IM-1, RS.IM-2, RC.RP-
1, RC.IM-1, RC-IM-2
BSI IT-Grundschutz-Compendium:
DER.4
NIST SP800-53r5:
CP-2, CP-3, CP-4, CP-6, CP-7, CP-8,
CP-9, CP-9(3), CP-10, CP-11, CP-12,
CP-13, PE-8, PE-13(2), IR-4, IR-5,
IR-7, IR-8, IR-9, PM-8, SI-17
ISO 27001:2013: A.7.1.1
ISO 27001:2022: A.6.1
ISA/IEC 62443: 1.1.2
NIST CSF 1.1: PR.IP-11
BSI IT-Grundschutz-Compendium:
ORP.2
NIST SP800-53r5:
PS-2, PS-3, PS-7, PS-9, SA-21
ISO 27001:2013: A.7.1.2, A.7.3.1
ISO 27001:2022: A.6.2, A.6.5
BSI IT-Grundschutz-Compendium:
ORP.2
NIST SP800-53r5:
PL-4, PS-4, PS-6, PS-8
ISO 27002: A.7.2.1, A.7.2.2
ISA/IEC 62443: 1.1.4
NIST CSF 1.1: PR.AT-1, PR.AT-2,
PR.AT-3, PR.AT-4, PR.AT-5, PR.IP-
11, RS.CO-1
BSI IT-Grundschutz-Compendium:
ORP.2
NIST SP800-53r5:
IR-2, AT-2(2), AT-2(3), AT-3(5), AT-6,
AC-21(1), AT-3, AT-4, IR-2, IR-3,
PM-12, PM-13, SA-16
ISO 27001:2013: A.6.2
ISO 27001:2022: A.6.7, A.8.1
BSI IT-Grundschutz-Compendium:
INF.8, INF.9, CON.7, NET.3.3
NIST SP800-53r5:
PE-17
ISO 27001:2013: A.11.1
ISO 27001:2022: A.7.1 - A.7.6
ISA/IEC 62443: 1.3.1, 8.1.3
NIST CSF 1.1: ID.BE-4, PR.AC-2,
DE.CM-2, DE.CM-3
BSI IT-Grundschutz-Compendium:
ORP.1, INF.1, INF.2, INF.5, INF.6,
INF.7, INF.8, INF.9, INF.10, OPS.2.1
NIST SP800-53r5:
PE-3, MA-5, MP-3, MP-4, PE-2, PE-
6, PE-8, PE-9, PE-10, PE-11, PE-13,
PE-14, PE-15, PE-18, PE-23
Introduction:
The concept of security zones basically describes different physical areas with different protection requirements. How a corresponding zone is to be protected is derived from the protection
requirements of the assets located there. The more important the assets located there, the higher the protection requirements of the security zone.
For example, personnel data or prototype data and the areas in which they are processed are more sensitive than areas of the canteen where menus are displayed.
In principle, each company can freely choose the number of existing zone types. One approach would be, for example, to link the classification levels "public" to, for example, "strictly confidential"
and the analogous definition of 4 security zones.
Basic information:
An effective security zone concept separates different security zones from each other by means of suitable measures. These separations can be represented by the following measures, among
others:
- Technical measures such as detectors and alarm monitoring.
- Physical measures such as the use of walls, doors, locking systems
- Personnel measures such as security guards, doormen, receptionists
- Organizational measures such as processes for granting and withdrawing access authorizations.
Only if a zone is separated from the previous zones by one or more measures, it can be considered as an independent zone. If there is no protective measure between the respective security zones,
the higher security zone falls back to the lower zone.
Using the example of an open-plan office, it is not possible to define one part as a highly sensitive zone for handling strictly confidential data, for example, and the other part as an internal zone.
Using the example of a server room, this falls back to the protection level of the existing area such as corridors if the doors to the server room are not locked and no monitoring takes place.
Security zones should be built on the basis of an onion-shell model. A highly protected zone is usually not adjacent to a public area (e.g. The prototype warehouse is located directly next to the
publicly accessible canteen). Ideally, between a public area and a highly sensitive area such as the prototype warehouse, there is an "internal" zone as a buffer, which only the company's own
employees can enter.
A direct derivation of protective measures from the security zones is the implementation of the need-to-know principle. The more security-relevant the security zone, the fewer people should be
able to enter the area. For example, if the entire workforce can enter an open-plan office, only administrators usually need access authorizations for the server room. For the implementation of a
security zone concept, the implementation of an access concept is therefore always necessary. However, it should be noted that locking concepts do not correspond 1-to-1 with the security zones,
since, for example, a prototype responsible for the highly sensitive zone of the prototype protection may not enter the highly sensitive zone of the server room, or the administrator does not
necessarily have to enter prototype areas.
The definition of security zones can affect the following areas, among others:
- Technical measures: use of alarm systems, motion detectors, video cameras + Physical measures: walls, barbed wire, fences, resistance classes of doors & windows
- Personnel measures: use of doormen, security services with stripes, use of external service providers such as cleaning companies
- Organizational measures: Allocation of access authorizations (need-to-know), frequency of rights review of access authorizations; the introduction of sound recording devices; masking of optics
from smartphones of employees and employees; Clear Screen and Clean Desk requirements; visitor registration requirements; Conclusion of confidentiality agreements (GHV); Use or prohibition of
smart devices (e.g. with microphones)
#####Technik with organizational measures#####
Design aids for defining security zones in the security zone concept:
The use of a zone scheme based on the classification scheme with four zone types has established itself as good practice for security zones: public area, normal protection area, high protection area
and very high protection area. It is easier to transfer the protection requirements of the assets into a zone scheme, especially when first sketching security zones.
It has also proven to be useful to mark the security zones on premises and building floor plans in color in order to provide the company itself and possible auditors with a quick overview of the
location of the security zones. One possibility is the use of clearly defined and intuitive colors for each security zone. For example, the following color scheme could be chosen:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
+ In case of externally operated IT infrastructure (e.g. server) and/or cloud solutions, compliance with the encryption requirements according to control question 5.1.1 is ensured.
ISO 27001:2013:
A.8.1.3, A.8.1.4
ISO 27001:2022: A.5.10, A.5.11
ISA/IEC 62443: 4.1.2
BSI IT-Grundschutz-Compendium:
SYS.4.5, CON.6
NIST SP800-53r5:
MP-6(2), PE-4, PE-5
Introduction:
The term "supporting asset" refers to all media on which information can be permanently stored. These include fixed IT devices (e.g. workstation PCs, workstations, servers, etc.), mobile IT devices
(e.g. USB sticks, memory cards, notebooks, smartphones, etc.) as well as analogue media such as paper documents. For all supporting assets, information security and thus a secure application
from creation to use to disposal is of fundamental importance.
Justification:
During the entire life cycle of supporting assets, there is a risk that sensitive information, e.g. If the data is not adequately protected, it can be lost and/or spied on. Therefore, supporting assets are
to be protected according to the need for protection of the information stored on them.
Basic information:
Before the creation phase, therefore, the question of the need for protection and the associated classification of the supporting assets already arises. These are usually dependent on the
information values (information assets) that are stored on them (see Control 1.3.1 and 1.3.2). Based on the need for protection under the classification, appropriate protective measures for the
creation, use and disposal of the supporting assets can then be defined and implemented.
ISO 27001:2013: A.6.2, A.8.3
ISO 27001:2022: A.6.7, A.7.10,
A.8.1
ISA/IEC 62443: 4.1.2
NIST CSF 1.1: PR.PT-2
BSI IT-Grundschutz-Compendium:
SYS.4.5, SYS.3.1, SYS.3.2.1, SYS.3.3
NIST SP800-53r5:
SC-41, SC-42
ISO 27001:2013: A.9.2.6
ISO 27001:2022: A.5.18
NIST CSF 1.1: PR.AC-1
BSI IT-Grundschutz-Compendium:
ORP.4
NIST SP800-53r5:
PE-3, AC-2, IA-2, IA-10, IA-11, IA-
12
ISO 27001:2013: A.9.1, A.9.4.2
ISO 27001:2022: A.5.15, 8.5
ISA/IEC 62443: 3.1.7, 6.1.11
NIST CSF 1.1: PR.AC-3, PR.AC-7
BSI IT-Grundschutz-Compendium:
ORP.4, OPS.1.1.2
NIST SP800-53r5:
AC-2(12), AC-3(14), IA-11, MA-4,
AC-7, AC-10, AC-11, AC-12, AC-14,
AC-17, AC-18, AC-20, AC-24, AC-
25, IA-3, IA-5, IA-9
ISO 27001:2013: A.9.2.1, A.9.2.2,
A.9.2.4, A.9.3.1, A.9.4.3
ISO 27001:2022: A.5.16, A.5.17,
A.5.18, A.8.9
ISA/IEC 62443: 3.1.7, 6.1.1, 6.1.2
NIST CSF 1.1: PR.AC-6
BSI IT-Grundschutz-Compendium:
ORP.4, OPS.1.1.2
NIST SP800-53r5:
AC-2(2), IA-5(13), IA-11, AC-16,
AC-20, CA-9, IA-2, IA-4, IA-6, IA-7,
IA-8, SC-2
Reference to ISO 27001: A.9.2.3,
A.9.2.5, A.9.4.1
ISA/IEC 62443: 6.1.4, 6.2.1
NIST CSF 1.1: PR.AC-4, PR.PT-3
BSI IT-Grundschutz-Compendium:
ORP.4, OPS.1.1.2
NIST SP800-53r5:
AC-2(7), AC-3, IA-11, AC-2(3), AC-
4, AC-6, AC-19, CA-3(6), CA-6, MP-
2, PS-4, PS-5
ISO 27001:2013: A.10.1
ISO 27001:2022: A.8.24
ISA/IEC 62443: 5.1.8
NIST CSF 1.1: PR.DS-1, PR.DS-5
BSI IT-Grundschutz-Compendium:
CON.1, ORP.5
NIST SP800-53r5:
CM-3(6), SC-12, SC-13, SC-17, SC-
28
ISO 27001:2013: A.13.2.1,
A.13.2.3
ISO 27001:2022: A.5.14
NIST CSF 1.1: PR.DS-2, PR.PT-4,
PR.DS-5
BSI IT-Grundschutz-Compendium:
NET.1.1, CON.1, CON.9, OPS.1.1.7
NIST SP800-53r5:
SC-8, SC-23, SC-37
ISO 27001:2013: A.12.1.2
ISO 27001:2022: A.8.32
ISA/IEC 62443: 2.1.4
NIST CSF 1.1: PR.IP-3, PR.MA-1,
PR.MA-2
BSI IT-Grundschutz-Compendium:
ORP.5, OPS.1.1.2, OPS.1.1.3
NIST SP800-53r5:
CM-2, CM-3, CM-9, SA-10
ISO 27001:2013: A.12.1.4
ISO 27001:2022: A.8.31
ISA/IEC 62443: 1.2.3
NIST CSF 1.1: PR.DS-7
BSI IT-Grundschutz-Compendium:
CON.8, CON.10
NIST SP800-53r5:
CM-4(1), SA-17(6)
INTERNAL
_x000D_
not public
ISO 27001:2022: A.5.30
ISO 27001:2013: A.12.2
ISO 27001:2022: A.8.1
ISA/IEC 62443: 4.1.1, 4.2.1, 4.2.2
BSI IT-Grundschutz-Compendium:
OPS.1.1.4, DER.1, OPS.1.1.2
NIST SP800-53r5:
CM-7(2), RA-10, SC-35, SI-3
ISO 27001:2013: A.12.4.1,
A.12.4.2, A.12.4.3
ISO 27001:2022: A.5.17, A.8.15,
3.1.10
ISA/IEC 62443: 5.1.5, 7.1.4, 7.1.5
NIST CSF 1.1: PR.PT-1, DE.AE-2,
DE.AE-3, DE.AE-4, DE.AE-5,
DE.CM-1, DE.CM-7, DE.DP-4,
DE.DP-5
BSI IT-Grundschutz-Compendium:
OPS.1.1.5, DER.2.2, DER.2.3
NIST SP800-53r5:
AC-2(4), AC-2(7), AC-2(12), AC-
6(9), PE-8, AU-2, AU-3, AU-4, AU-
5, AU-6, AU-7, AU-8, AU-11, AU-
12, SC-43, SI-4, SI-11
ISO 27001:2013: A.12.6
ISO 27001:2022: A.8.8, A.8.19
ISA/IEC 62443: 4.3.2, 7.1.9
NIST CSF 1.1: ID.RA-1, PR.IP-12,
DE.CM-8, RS.CO-5, RS.AN-5
BSI IT-Grundschutz-Compendium:
OPS.1.1.2, OPS.1.1.3, IND.1
NIST SP800-53r5:
RA-5, CM-8, RA-10, SA-11, SC-31,
SI-2, SI-4, SI-5
Introduction:
The basic objective of this control is to continuously deal with current vulnerabilities in IT systems of any kind in order to mitigate known gaps as quickly as possible before they can be exploited.
Justification:
Attackers can exploit vulnerabilities in IT systems, for example, to gain access to the network and thus to information carriers and information values. Vulnerability detection therefore plays a
central role in information security. It is the basis for the necessary vulnerability management and thus also for the following risk analyses and derivation of measures.
Basic information:
Since exploited vulnerabilities can have extremely far-reaching effects, especially if the attack is not detected at all (e.g. "listening" without direct damage), a systematic approach makes sense. It is
important to obtain as much information as possible about the IT systems used in your own organization and external systems, such as:
- Operating Systems
- Firmware
- Apps
- Cloud Services
An ISMS can generally play to its strengths here. Controls that can help here are, for example:
- Defining responsibilities (see 1.2.2 and 1.2.4)
- Identify relevant systems (cf.1.3.1)
- Identify risks (see 1.4.1)
- Training and sensitizing employees (see 2.1.3)
- Preparation for exceptional situations (see 3.1.2)
- Change Management (see 5.2.1)
- Review of information systems (see 5.2.6)
ISO 27001:2013: A12.7, A.18.2.3
ISO 27001:2022: A.5.36, A.8.34,
A.8.8
NIST CSF 1.1: PR.DS-6, PR.DS-8
NIST SP800-53r5:
RA-5, AU-5, AU-6, CA-7, CM-4, PL-
10, PL-11, RA-6, SI-6, SI-7, SI-15,
SR-10, SR-11
ISO 27001:2013: A.13.1.1,
A.13.1.3
ISO 27001:2022: A.8.20, A.8.22
ISA/IEC 62443: 1.2.2, 3.1.1, 3.1.6,
3.1.8
NIST CSF 1.1: ID.AM-3, PR.AC-5,
PR.PT-4, PR.PT-5, DE.AE-1
BSI IT-Grundschutz-Compendium:
NET.1.1, NET.1.2
NIST SP800-53r5:
SC-5, SC-6, SC-7, SC-10, SC-11, SC-
20, SC-21, SC-22, SC-24, SC-25, SC-
26, SC-27, SC-29, SC-30, SC-32, SC-
36, SC-38, SC-39, SC-40, SC-44, SC-
48, SI-23
BSI IT-Grundschutz-Compendium:
DER.4, INF.1
NIST SP800-53r5:
CP-2, CP-9, CP-9(3), PE-8, PE-13(2)
ISO 27001:2013: A.12.3.1
ISO 27001:2022: A.8.13
ISA/IEC 62443: 8.2.9
NIST CSF 1.1: PR.IP-4
BSI IT-Grundschutz-Compendium:
CON.3, OPS.1.2.2
NIST SP800-53r5:
CP-2, CP-9, CP-9(3), PE-8, PE-13(2)
INTERNAL
_x000D_
not public
ISO 27001:2013: A.14.1, A.14.2
ISO 27001:2022: A.5.8, A.8.25
NIST CSF 1.1: PR.IP-1, PR.IP-2
BSI IT-Grundschutz-Compendium:
CON.8, CON.10, OPS.1.1.2,
OPS.1.1.6
NIST SP800-53r5:
SA-3, SA-4, SA-5, SA-8, SA-20, SI-
13, SR-5
ISO 27001:2013: A.13.1.2
ISO 27001:2022: A.8.21
ISA/IEC 62443: 3.1.8
NIST CSF 1.1: PR.DS-4
BSI IT-Grundschutz-Compendium:
NET.1.1, NET.1.2
NIST SP800-53r5:
SA-3, SA-4, SA-17
ISO 27001:2022: A.5.23
ISO 27017: CLD.8.1.5
ISA/IEC 62443: 5.1.6
NIST CSF 1.1: PR.DS-3, PR.IP-6,
PR.IP-11
BSI IT-Grundschutz-Compendium:
ORP.5, CON.2, CON.6, CON.9,
ORP.2
NIST SP800-53r5:
MP-6, MP-8, SR-12
ISO 27017: CLD.9.5.1, CLD.9.5.2
NIST CSF 1.1: DE.CM-7
BSI IT-Grundschutz-Compendium:
OPS.2.1, OPS.2.2, OPS.3.1
NIST SP800-53r5:
SA-9, SC-4, SC-46
ISO 27001:2013: A.15.1, A.15.2.1
ISO 27001:2022: A.5.19 - A.5.22
NIST CSF 1.1: ID.SC-2, ID.SC-3,
ID.SC-4
BSI IT-Grundschutz-Compendium:
OPS.2.1, OPS.2.2, OPS.3.1, ORP.2
NIST SP800-53r5:
MA-4, CA-3, CA-6, PM-16, PM-30,
SR-2, SR-3, SR-6, SR-7, SR-8
Within the context of ISA, the term contractor includes both classic suppliers and subcontractors but also classic service providers, freelancers or other partner companies. It also includes
cooperation partners (e.g. academic institutions, institutes).
The explanations below describe a possible procedure for fulfilling the requirements:
Identification of contractors and specification of protection needs and security requirements:
At first, all contractors must be identified (e.g. via the list of creditors of the accountants department) in order to gain an initial overview.
For all contractors, the respective protection needs should be specified and the security requirements derived according to their tasks and the relevance to own and customer’s processes.
Generally, a large number of contractors is found not to require the assignment of relevant protection needs and to be therefore not subject to security requirements (e.g. suppliers of office
stationary).
Ensuring implementation by the contractor:
In the next step, the applicable requirements must be made known to all security-relevant contractors in a suitable manner and (contractually) fixed as being mandatory. Finally, a decision should
be made as to how the implementation of the security requirements can be appropriately verified. For this purpose, adequate verification processes and procedures should be defined according to
the respective risk (and the associated protection needs). Their purpose is to ensure that contractors implement the necessary requirements.
Establishment in standard processes:
The insights gained should be used to develop a comprehensible procedure and to integrate it into the existing processes of the B2B / supplier management. This starts with the selection of the
contractor, where aspects of information security should already be considered alongside criteria such as quality, adherence to delivery dates, credit rating etc. The procurement process should be
such that the relevance of information security has already been considered beforehand (with respect to the procurement decision; contract design; inspection requirements).
Furthermore, it is recommended to incorporate information security aspects into existing processes for supplier evaluation which have already been established by e.g. an existing quality
management system.
Contractually specified deliverables (e.g. availability requirements) should be verified at regular intervals. This can be done by e.g. regular analysis of service reports and SLAs.
ISO 27001:2013: A.13.2.2,
A.13.2.4
ISO 27001:2022: A.5.14, A.6.6
BSI IT-Grundschutz-Compendium:
OPS.2.1, OPS.2.2, OPS.3.1, ORP.5,
CON.2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
ISO 27001:2013: A.18.1.1,
A.18.1.2, A.18.1.3, A.18.1.5
ISO 27001:2022: A.5.31, A.5.32,
A.5.33
NIST CSF 1.1: ID.GV-3, PR.IP-5
BSI IT-Grundschutz-Compendium:
ORP.5
Introduction:
Durch laws, regulations such as standards, contracts or even specially imposed requirements result in different requirements for processes, infrastructure, projects and / or workflows. Some of
these requirements relate specifically to information security. Control therefore helps to identify and understand the existing requirements and to regulate the handling to meet the requirements.
Reason:
Die risks arising from non-compliance with specifications can result in serious financial and material damage as well as reputation-damaging consequences in one's own company or with customers
and business partners. If requirements and specifications are not complied with or are not determined, this may result in breaches of contract or laws with corresponding consequences or risks for
the company and its business partners.
Basic information:
Im general, Control is concerned with determining and monitoring compliance with requirements arising from laws, regulations and contracts as well as self-imposed requirements. The focus is on
the relevance to the ISMS. It can be helpful here to first identify all relevant requirements, check them regularly and collect them in a kind of legal cadastre. In addition, it is necessary to define, in
accordance with the requirements, how the corresponding provisions are to be fulfilled and for which group of persons these provisions are relevant. This can be done, for example, in the context
of guidelines, action plans or work instructions that have been made known to the corresponding responsible persons.
If requirements arise with regard to the integrity of documents and records, such as protection against loss, retention periods or access authorizations, these must also be recorded and considered.
ISO 27001:2013: A.18.1.4
ISO 27001:2022: A.5.34
BSI IT-Grundschutz-Compendium:
CON.2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Possible questions (examples, not mandatory)
Possible evidence (not mandatory)
Support:
Examples “Normal protection need”
Support:
Examples “High protection need”
Support:
Examples “Very high protection need”
- What information security requirements have been identified?
- What are the guidelines on information security?
- Who released them?
- Are the requirements aligned with the organization's goals?
- What are the objectives of the organization with regard to the ISMS
and how are they to be achieved?
- Who is responsible for implementation?
- What are the consequences of not following the guidelines?
- Who regularly reviews the guidelines and when?
- How are the guidelines communicated to employees?
Projects can be classified as follows
- CIAA (Confidentiality, Integrity, Availability, Authenticity)
- CIA (Confidentiality, Integrity, Availability)
- What projects related to information security have been carried
out?
- What risks have been identified in this context for the individual
project?
- What criteria are used to assess the risk of projects?
- What measures have been derived?
- Have the measures been documented?
- Has the risk been checked for changes during the project?
It is not necessary to list all information assets individually; instead, categories can be
established (e.g. master data of employees – responsible body: Human Resources)
- Which core processes are required to perform the company's task?
- What sensitive information do you receive from your customers?
- What information do you have in your company that is worth
protecting?
- How is the process of identifying, recording and maintaining
information values carried out?
- How are responsibilities for information assets determined?
- How is the handling of information values described?
- How are the responsibilities for determining company values
documented in the organization?
- Which information directories are used to document the
information values?
- How and who ensures that the directories are up-to-date?
- How are the regulations checked for up-to-dateness?
- What evidence (e.g. impact analyses, etc.) is available?
- How are the primary and supporting information values used
determined, classified and documented?
- How and when are the directories checked for completeness,
timeliness and traceability?
- How are the least critical information values evaluated and
documented?
- What protection levels are defined in the company and what
criteria are used to classify them?
- What measures are defined for each protection level?
- How can the classification of the information be recognized by
employees?
- How is information classified?
- What regulations are derived for the protection of information
(storage media/documents)?
- How do employees know how to classify information?
- What are the tools for classifying the classification?
- How are information objects labelled?
- Who is responsible for classifying the classification?
- How are unmarked documents handled?
- What measures must be taken for each protection requirement in
different situations (e.g. travel, destruction, storage, transport,
storage)?
- What contact channels are available so that employees can receive
support in classification?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
The protection need of software can be derived from the intended use-case or from the design
of the software. This means all software that do not have access to information with high or
very confidentiality or integrity need and that does not run on systems that have high or very
high availability requirements can be considered software with normal protection need.
Additionally, software where the risk to information is limited by the fact that it is not designed
to access relevant information and does not have elevated privilegies can be considered having
a normal protection need.
An organization might adopt the following policiy: For normal protection need software, a bulk-
approval based on licensing terms and a well-known or otherwise sufficiently trusted distributor
seems the appropriate solution. If the software in question is not available from trustworthy
distributor, the organization will do a brief evaluation of the software functionality by testing
the software for obvious undesired functionality such as adware or spyware by means of
individual recherche and testing.
Updated software will regularly inherit the approval of previous versions unless significant
changes are detected.
For this example, software that has only access to information with high protection need in
terms of availability or integrity or are relevant for availability on systems with a respective need
or software that faces specific security risks (software that is used to communicate with
untrusted communication ends such as externally reachable server software, network clients
such as web browsers), is considered software with high protection need.
For such software and use-cases, the example organization may maintanin a list of repositories
and vendors that are trusted for these cases (such as baseline software installation of the
operating system and drivers and firmware for the used hardaware with well-known licensing
terms). To get to this list, a vendor and repository can either be well-known and widely
accepted (i.e. common operating systems and their base software, drivers for standard
hardware) or individually known by the organization (such as a vendor for special hardware or
machines that have been carefully selected. A software that is not on such a list can be
individually evaluated by checking licensing conditions and then searching for bad reputation
and finally by doing a test-installation to check for undesired available features or functionality
such as adware or spyware.
Updated software will regularly inherit the approval of previous versions unless significant
changes are detected.
For this example, software that has access to information with very high protecton need in
terms of availability and integritcy or software that is relevant for the availability of Critical IT
Systems.
Even such software and use-cases , the example organization may maintanin a list of
repositories and vendors that are trusted for these cases (such as baseline software installation
of the operating systems designed for the purpose and drivers and firmware for the used
hardaware with well-known licensing terms. However, to gain the trust the vendor and
distributor must have an excellent reputation.
All other software is individiually approved.
Depending on the risk profile, this may include not only testing but also careful analysis of
available documentation (or even a technical audit of the functionality of a specific software).
Change logs for software wil
Updated software will regularly inherit the approval of previous versions for minor software
versions. However, the organization will actively monitor release notes and (if available)
relevant other sources to detect changes that might require a re-evaluation. Major software
versions always require re-evaluation before approval.
+ What is your strategy when it comes to software approval?
+ Do you differentiate approval on protection need or usage
scenario?
+ What software is currently approved for working with a specific
protection need?
+ How does your software approval process work?
+ For what use case is software A approved?
+ Where can i see what software is installed on a specific client or
server?
+ How does the software repository work? How do users and/or
administrators access it to install software?
+ Process documentation for approval process
+ Exports of lists of approved software from software repositories
+ Screenshots from software management software (such as MDM)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
For example, security zones can be represented as follows:
- Public (typical color coding in the security zone plan: grey): Public street, parking lot without
fences, company premises if no fencing is present, stairwell in a house with several tenants.
- Normal protection requirements (typical color coding in the security zone plan: green) (e.g.
internal data): Company premises, if a complete fencing is given, reception areas, conference
rooms, corridors, general areas where every employee can stay, but these cannot be entered
from the public areas.
- Special protection requirements (typical color coding in the security zone plan: purple): server
room, infrastructure switch and distribution rooms, chemical warehouse
Example of a zone with normal protection requirements:
The following example contains selected measures for an open-plan office of the shipping
department, in which only internal information such as shipping information, delivery notes and
package labels are produced and processed. The classification of the assets located there has at
most an "internal character".
- Example of technical measures: The open-plan office has not implemented any separate
technical protection measures.
- Example of physical measures: The façade as well as doors and windows are built in solid
construction and thus enable a resistance class against burglary according to RC 2 according to
DIN EN 1627. Doors to the open-plan office are open during the day so that every employee of
the company can enter the room at any time. In the evening the door is locked.
- Example of personnel measures: At night, a security service sporadically carries out strip
searches. An external cleaning company cleans the open-plan office unattended outside regular
working hours and uses its own keys.
- Example of organizational measures: Each employee of the open-plan office has his own key. A
ban on the use of company and private smartphones is not pronounced. Employees can use
these devices freely. A review of the assigned access authorizations takes place sporadically.
Employees are allowed to leave documents such as delivery notes on the tables after work.
Visitors (and suppliers) may enter the area alone after registration and if necessary and do not
have to conclude an explicit confidentiality agreement in advance.
For example, security zones can be represented as follows:
- High protection requirements (typical color coding in the security zone plan: yellow/orange)
(e.g. confidential data): HR department, design office, IT office, management offices
Example of a zone with high protection needs:
The following example contains selected measures for design offices in which tender
documents, specifications and calculations are created, edited and stored. The classification of
the assets located there has a "confidential character".
- Example of technical measures: The design office is equipped with motion sensors. After the
daily working hours, the alarm system for the entire building is activated at 22:00 and
automatically deactivated at 6:00.
- Example of physical measures: The façade as well as doors and windows are built in solid
construction and thus enable a resistance class against burglary according to RC 2 according to
DIN EN 1627. Doors to the design office are open during the day when construction employees
are working within the zone. In the evening and in the absence of the employees, the door is
locked.
- Example of personnel measures: At night, a security service carries out sporadic strip searches.
An external cleaning company cleans the design office during regular working hours only under
the supervision of employees present. The cleaning company does not have its own keys to the
design office.
- Example of organizational measures: Only employees of the construction have their own key.
A ban on the use of company and private smartphones is not pronounced. Employees can use
these devices freely, but there is a ban on taking photographs in the room. A review of the
assigned access authorizations takes place once a year. Employees of the construction are
obliged to lock confidential documents in cabinets after work. Visitors (and suppliers) are not
allowed to enter the area alone and are accompanied in this area at all times.
For example, security zones can be represented as follows:
- Very high protection requirements (typical color coding in the security zone plan: red) (e.g.
strictly confidential data): prototype area, project offices for customers.
Example of a zone with high protection needs:
The following example contains selected measures for a project office with special customer
projects. The classification of the assets located there is "strictly confidential".
- Example of technical measures: The area is equipped with motion sensors. When leaving the
area, it is alarmed. A loud siren sounds when a burglary attempt is made. In addition, the alarm
system is connected to a security service.
- Example of physical measures: The façade as well as doors and windows are built in solid
construction and thus enable a resistance class against burglary according to RC 2 acc. DIN EN
1627. The area has an external knob so that it is not possible to forget to close the door. So a
key must always be used to enter the room. In addition, door closers are fitted to ensure that
the door does not remain open.
- Example of personnel measures: External service providers may only enter the area in
exceptional cases, after prior announcement and registration, accompanied by employees of
the area. Employees are qualified and sensitized before obtaining project-related access
permits.
- Example of organizational measures: Only employees of the department have their own key. A
review of the assigned access authorizations takes place once a year.
- What are the different security zones you have?
- How are your security zones designed?
- Why did you choose your security zones?
- Where are the areas with a very high need for protection?
- What happens in the event of a break-in?
- How many people have access to zone XYZ?
- Who assigns the respective access authorizations for area XYZ?
- When was the last check of the assigned access authorizations for
selected areas carried out?
- When was the last time you revoked an access authorization?
- How do you document the request, approval and allocation of
access authorizations?
- How does the visitor registration process work?
- Security zone concept and plan (site plan)
- Key lists
- Extracts of the assigned authorizations of an electronic access control
system
- Access logs of selected areas
- Visitor Policy
- Guideline for the handling of mobile IT devices
- Protocols of reviews
- Photos of the respective areas with recognizable security measures
- Contracts with security companies
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
- Where have you defined which supporting assets exist and which
information values may be stored on them?
- How are supporting assets with high protection requirements
protected?
- Which encryption methods are used?
- Where are the requirements for the life cycle of different suporting
assets described?
- What do employees have to do with documents when leaving the
workplace?
- How are hard drives, e.g. from purchased or leased devices,
disposed of?
- How do you dispose of paper documents?
- Where are the shredders / data protection bins?
- What user authentication methods are used in the organization?
- What criteria were used to select the user authentication methods
(risk assessment, state of the art, business and security
requirements, etc.)?
- What methods are used to authenticate privileged user accounts?
- How is it ensured that the password standard used in the
organization corresponds to the current state of the art?
- Have sensitive resources been identified and which sensitive
resources and systems are accessed with two-factor authentication?
- How is it ensured that privileged access rights are restricted,
controlled and secured by higher-level authentication procedures?
- Is information with a very high need for protection identified and
the associated access mistaken with a second factor?
- How are user accounts created, changed, blocked and deleted?
Does it use unique and personalized user accounts?
- What security measures have been implemented when using
"collective accounts"?
- Are user accounts checked at regular intervals? Can you show the
last review?
- How are user credentials delivered?
- Which regulations have been defined and implemented for the
handling of login information?
- What training have the employees received regarding credential
handling?
- What security considerations have you taken to ensure that
credentials are not compromised?
- Which shares are used for setting up user accounts?
- e-mail encryption by means of TLS
- access to websites via https://
- e-mail encryption by means of S/MIME, PGP
- encrypted PDF files, encrypted ZIP files
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Desktop firewall, Linking to loopback interfaces
- What information about technical vulnerabilities can be
determined?
- What are your sources?
- Where do you list hardware and software?
- How do you reconcile this information with your IT systems?
- Which vulnerabilities can be identified on the basis of risk
assessments?
- When do you respond to identified vulnerabilities?
- How is the process from identification to elimination of the
vulnerability defined?
Possible measures:
- Use of security technologies such as firewall systems, intrusion detection and prevention
systems (IDS/IPS), network management tools, security software for networks for preventing
unintended data exchange.
- What requirements have you defined for managing and controlling
your network?
- How do you check that these requirements are complied with or
fulfilled?
- How did you evaluate the segmentation of your network?
- How is the transition from one subnetwork to another prevented?
- Which evaluation results have you documented?
- Which requirements for your network have you determined and
recorded?
- Who manages, controls and maintains your network?
- How do you identify new IT systems in the network that were not
installed by IT?
- What access rights do the administrators have with regard to all
devices such as firewalls, switches and routers?
- Which protocols do you use and which do you not use?
- Who has access to network components and how?
- Who has access to the services in the network and how?
- Which protection mechanisms should be used in the network (e.g.
firewall, IDS/IPS)
- What are the availability requirements?
- How is the network documented?
- What are the requirements when using cloud services / externally
hosted systems?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
- How are the requirements for information security determined in
the development of IT systems?
- How are legal or regulatory requirements for IT system
development considered?
- Is a standard/guideline/framework used for IT system
development?
- How are the design changes of the IT system controlled?
- How is the external development process of the IT system (third-
party development) controlled?
- How is the development environment managed? (commissioning,
configuration, access, decommissioning)
How are risks related to IT system development assessed and
documented?
- How is compliance with information security requirements verified
during IT system development?
- How are real test data sets, if any, controlled during IT system
development?
Identification of contractors and specification of protection needs and security requirements:
It is crucial for this evaluation, whether the contractor’s work includes
1) gaining access to information or security zones of the company with normal protection needs
regarding confidentiality; or
2) providing or being able to modify relevant information with normal protection needs
regarding integrity; or
3) having relevant influence on processes or IT systems with normal protection needs regarding
availability (comp. to internal or customer-related SLAs).
Typical contractors with normal protection needs are e.g. cleaning services for general areas,
classic logistics companies or maintenance staff.
The minimum requirements for information security (in relation to the respective protection
goal) should be defined in a policy (e.g. information security policy for service providers). These
requirements can be based on the requirements of the ISA described herein in addition to the
company-specific requirements. This policy can be supplemented according to the specific
order.
Ensuring implementation by the contractor:
The security requirements should be made known to the contractor, e.g. at procurement, in
briefings (project meetings) by corresponding documents (e.g. information security policy for
service providers) or when entering the premises (in case of contractors providing their services
on site). Compliance with the information security requirements should be contractually fixed.
At this point already, potential further subcontractors of the contractor should also be
considered, as relevant. This can be done by individual agreements such as general terms and
conditions of purchase, for example.
In many cases, suppliers (e.g. IT service providers) already
assure compliance with security requirements in their standard contracts.
In order to ensure compliance with the requirements in a suitable manner, simple mechanisms
should be established. This may include, for example:
- The submission of at least a self-disclosure confirmed by the management (e.g. ISA) or an
adequate attestation/certificate
- The right to and execution of irregular sampling and event-related inspections.
Identification of contractors and specification of protection needs and security requirements:
It is crucial for this evaluation, whether the contractor’s work includes
1) gaining access to information or security zones of the company with high protection needs
regarding confidentiality; or
2) providing or being able to modify relevant information with high protection needs regarding
integrity; or
3) having relevant influence on processes or IT systems with at least high protection needs
regarding availability (comp. to internal or customer-related SLAs).
Typical contractors with high protection needs are e.g. cleaning services autonomously cleaning
relevant security zones, IT service providers (e.g. data base administrators), consultants,
agencies and subcontractors (e.g. tool designers to whom project data need to be forwarded).
Obviously, contractors with high protection needs are subject to the minimum information
security requirements regarding the respective protection goal. These requirements should be
supplemented particularly by necessary general (see e.g. ISA high protection needs) and order-
specific requirements.
Ensuring implementation by the contractor:
Here, the procedure described for normal protection needs can be used for orientation.
Besides the obligation regarding implementation of an adequate information security level and
the non-disclosure obligation, a right to audit should be contractually fixed or appropriate
controls (regular auditing of the contractor) should be ensured. This may also include an
obligation to participate in TISAX.
In order to ensure compliance with the requirements in a suitable manner, simple mechanisms
should be established. This may include, for example:
- contractor requires TISAX label for high protection needs or equivalent (e.g. ISO 27001,
certificate of corresponding scope)
- right to and execution of regular sampling and event-related inspections.
Identification of contractors and specification of protection needs and security requirements:
It is crucial for this evaluation, whether the contractor’s work includes
1) gaining access to information or security zones of the company with very high protection
needs regarding confidentiality; or
2) providing or being able to modify relevant information with very high protection needs
regarding integrity; or
3) having relevant influence on processes or IT systems with at least very high protection needs
regarding availability (comp. to internal or customer-related SLAs).
Typical contractors with very high protection needs are IT service providers (e.g. domain
administrators), consultants, agencies, subcontractors (e.g. CAD designers to whom extensive
project data of very high protection needs need to be forwarded) and prototype manufacturers.
Obviously, contractors with very high protection needs are subject to the minimum information
security requirements regarding the respective protection needs. These requirements should be
supplemented particularly by necessary general (see e.g. ISA very high protection needs) and
order-specific requirements. The difference to high protection needs is essentially the number
and quality of the necessary additional requirements.
Ensuring implementation by the contractor:
Here, the procedure described for high protection needs can be used for initial orientation.
Besides the obligation regarding implementation of an adequate information security level and
the non-disclosure obligation, a right to audit should be contractually fixed or appropriate
controls (regular auditing of the contractor) should be ensured. This should also include an
obligation to participate in TISAX.
In order to ensure compliance with the requirements in a suitable manner, simple mechanisms
should be established. This may include, for example:
- contractor requires TISAX label for very high protection needs
- right to and execution of regular and event-related thorough inspections (if applicable,
supplemented with supporting certificates).
- Which contractors/service providers receive or process data in need
of protection?
- Which contractors/service providers are granted access to security
zones?
- Are any further contractual agreements regarding information
security other than the non-disclosure agreement in effect?
- How is the compliance with contractual agreements by the
contractor/service provider verified?
- At which points within the company are risk assessments regarding
the employment of contractors/service providers conducted?
- Is an information security policy for contractors/service providers in
place?
- How is the compliance with policies by the contractors/service
providers verified?
- Which contractors/service providers have been/are reviewed?
- How is the review documented?
- Which criteria trigger an assessment process?
- How are the services rendered by contractors/service providers
reviewed?
- Are networks/IT systems maintained by contractors/service
providers?
- How do you prevent that contractors/service providers can gain
unauthorized access to information of high/very high protection
needs?
- Template NDA with contractor
- Example of undersigned NDA
- Example of risk assessment (Focus point: Information security aspects)
- Information security policy for service providers/contractual terms and
conditions regarding information security
- Process description B2B/supplier management (e.g. selection, evaluation,
qualification of suppliers)
- Viewing of self-disclosures
- Viewing of attestations/certificates of selected suppliers (e.g. TISAX label;
ISO 27001 certificate)
- Example of conducted supplier evaluation (focus on information security
aspects)
- Viewing of audit reports
- List of approved contractors
- Viewing of SLA Reporting
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Corresponding provisions can be included in the following, for example:
- Author’s rights
- Cryptography
- Copyright
- Intellectual property
- Archiving
- Information security legislation
- Data protection
- Trade Secrets Act
- Contractually agreed provisions (GTC, terms and conditions of purchase, framework contracts,
individual contracts)
- What are the legal and regulatory requirements that are relevant to
you and that you must take into account in your ISMS?
- What are the contractual requirements relevant to you that you
need to take into account in your ISMS?
- Are these requirements maintained in a corresponding legal
register?
- Are the legal and regulatory requirements checked at regular
intervals to ensure that they are up to date?
- Which person(s) are responsible for the legal, regulatory and
contractual requirements and their implementation and compliance
(process owners)?
- Is compliance documented in a report?
- When and with what result was this process last audited?
Raising awareness:
- How often and at what interval are awareness-raising measures
carried out?
- What are the contents of awareness-raising activities?
- How do you ensure that the awareness-raising measures reach all
employees?
Intellectual property:
- What are the contractual provisions on "intellectual property" in
the contracts with subcontractors?
- What are the contractual provisions on "intellectual property" in
the employee contracts?
License:
- How do you handle licenses for internal use (license management)?
- What is your policy on the use of licenses?
- What is your policy on downloading software from the Internet?
Open source:
- How is the use of "Open Source" products in software development
regulated?
- How are the license terms of "Open Source" products regularly
reviewed and made transparent to customers?
- What are the contractual regulations for the use of "open source"
products by subcontractors?
What are the contractual requirements relevant to you that you
need to take into account in your ISMS?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Control question
Measures/recommendations
Further information
8
Prototype Protection
8.1
Physical and Environmental Security
8.1.1
.
8.1.2
8.1.3
8.1.4
8.1.5
8.1.6
8.1.7
8.1.8
Information Security Assessment
Additional prototype protection requirements
Control
number
Maturity
level
To what extent is a security concept
available describing minimum
requirements regarding the physical and
environmental security for prototype
protection?
To what extent is perimeter security
existent preventing unauthorized access
to protected property objects?
To what extent is the outer skin of the
protected buildings constructed such as
to prevent removal or opening of outer-
skin components using standard tools?
To what extent is view and sight
protection ensured in defined security
areas?
To what extent is the protection against
unauthorized entry regulated in the
form of access control?
To what extent are the premises to be
secured monitored for intrusion?
To what extent is a documented visitor
management in place?
To what extent is on-site client
segregation existent?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
8.2
Organizational Requirements
8.2.1
8.2.2
8.2.3
8.2.4
8.2.5
8.2.6
8.2.7
8.3
To what extent are non-disclosure
agreements/obligations existent
according to the valid contractual law?
To what extent are requirements for
commissioning subcontractors known
and fulfilled?
To what extent do employees and
project members evidently participate
in training and awareness measures
regarding the handling of prototypes?
To what extent are security
classifications of the project and the
resulting security measures known?
To what extent is a process defined for
granting access to security areas?
To what extent are regulations for image
recording and handling of created image
material existent?
To what extent is a process for carrying
along and using mobile video and
photography devices in(to) defined
security areas established?
Handling of vehicles, components, and
parts
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
8.3.1
8.3.2
8.4
Requirements for trial vehicles
8.4.1
8.4.2
8.4.3
8.5
Requirements for events and shootings
8.5.1
To what extent are transports of
vehicles, components or parts classified
as requiring protection arranged
according to the customer
requirements?
To what extent is it ensured that
vehicles, components, and parts
classified as requiring protection are
parked/stored in accordance with
customer requirements?
To what extent are the predefined
camouflage regulations implemented by
the project members?
To what extent are measures for
protecting approved test and trial
grounds observed/implemented?
To what extent are protective measures
for approved test and trial drives in
public observed/implemented?
To what extent are security
requirements for presentations and
events involving vehicles, components
or parts classified as requiring
protection known?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
8.5.2
To what extent are the protective
measures for film and photo shootings
involving vehicles, components or parts
classified as requiring protection
known?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Support:
Examples “Normal protection need”
Support:
Examples “High protection need”
Support:
Examples “Very high protection need”
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Possible questions (examples, not mandatory)
Possible evidence (not mandatory)
Column4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Assessment
Control question
Objective
9
Data Protection
This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional invisible text for
9.1
Data Protection Policies
9.1.1
To what extent do data protection policies exist?
9.2
Organization of Data Protection
9.2.2
Successful data protection requires clear responsibilities in the organization.
9.3
Processing directory
9.3.1
9.4
Data protection impact assessment
9.4.1
9.5
Data transfers
9.5.1
To what extent is the transfer of data managed?
The company knows and secures data transmissions.
9.5.2
The company is aware of and secures data transfers to subcontractors.
9.5.3
The company is aware of and secures data transfers to third countries.
9.6
Handling requests and incidents
9.6.1
9.6.2
9.7
Human Resources
9.7.1
9.7.2
9.8
Instructions
9.8.1
Information Security Assessment
Additional requirements for Data Protection/Privacy
Control
number
Requirements
(must)
This tab supplements the Information Security tab on information security with data
protection. In order to obtain an effective TISAX assessment of data protection, the
information security questionnaire must be also assessed. Therefore, an isolated
assessment of the data protection module cannot lead to a TISAX certification.
The organization needs at least one policy on privacy. This reflects the importance and
significance of data protection and is adapted to the organization. Other policies may
be appropriate depending on the size and structure of your organization.
+ A policy is created, regularly updated, and approved by the organization's management.
To what extent are the responsibilities for data
protection organized?
+ A data protection officer is appointed, if required by Art. 37 GDPR
- Determination of whether the appointment of a data protection officer is voluntary or mandatory
- otherwise determination of a data protection function or comparable
+ Publication of contact details (e.g. on the Internet)
+ Integration into the organization's structure
+ Exercise of the control obligations as defined in Art. 39 (1) (b) GDPR and corresponding documentation
+ Documentation of the data protection status and report to organization's top management
+ Equipped with sufficient capacities and resources
- Determination of whether the data protection function is full-time or part-time
- adequate professional qualification
- regular professional training
- access to specialist literature
- support of the data protection officer by data protection coordinators in the companies organizational units,
depending on the company size (e.g. marketing, sales, personnel, logistics, development, etc.)
To what extent are processing activities identified
and recorded?
The company fulfils its duty of accountability and transparency and thus creates an
overview of the respective data processing.
+ If required by law, a register of processing activities as defined in Article 30 (1) and/or (2) GDPR (in the latter case
only information relating to the order, expressly not other information/details on internal processing) exists and is
up to date.
- Technical and organizational measures required for processing as required by the information security
questionnaire are adequatly implemented for the processing activities
- There is a process description / sequence description with defined responsibilities.
To what extent is adequate handling of high-risk
processing activities ensured (data protection
impact assessment)?
The handling of high-risk processing is secured in cooperation with the service provider
with appropriate measures to identify and, if necessary, reduce risks to the rights and
freedoms of the data subjects.
+ Processing activities that require a data protection impact assessment are known.
+ Data protection impact assessments are carried out.
- Responsibilities/tasks and support possibilities in the context of data protection impact assessments are defined
and known.
+ Appropriate processes and workflows for the transmission of data are implemented (e.g. valid contracts within
the meaning of Art. 28 GDPR, suitable transfer instruments like standard contractual clauses, transfer impact
assessments, adequacy decisions)
- Ensuring the consent or the right of objection of the person responsible for subcontracting
To what extent are contractual obligations passed
through to and enforced at subcontractors and
cooperation partners?
+ Applicable contractual obligations to clients are passed on to subcontractors and cooperation partners (sub
processors).
+ Compliance with contractual agreements is reviewed.
- Contact details of the contact persons of the subcontractor are available and up to date.
To what extent are data transfers to third
countries managed?
+ Transfers to third countries are known and systematically recorded.
- e.g. through corresponding documentation in the processing directory
+ Sufficient guarantees (Chapter V GDPR, consideration of decisions of the ECJ on international data transfer,
Transfer Impact Assessment in case of relevance, especially in the role of data exporter) are available for data
transfers.
+ In the case of data transfers to third countries, it is determined whether the consent of the person responsible is
to be obtained for each transfer to third countries.
To what extent are data subject requests
processed?
The objective is to ensure the timely processing and fulfilment of data subject requests
in order to secures the rights of data subjects guaranteed by law.
+ Requests from data subjects are processed in a timely manner.
- Procedures are in place to assist the controller in responding to data subject requests.
- Employees are trained to the effect that they must immediately contact the respective person responsible in the
event of an incoming request from a data subject and coordinate the further procedure with this person.
To what extent are data protection incidents
processed?
The objective of processing data protection incidents is to ensure that possible damage
to the data subjects is limited and that a recurrence is prevented. In addition, the
legally required documentation and, if necessary, timely reporting to the supervisory
authority must be ensured.
+ Data protection incidents (e.g. unauthorized access to personal data) are processed in a timely manner.
+ The requirements from 1.6 of the information security questionnaire also take into account data protection
incidents or, alternatively, there is an emergency plan for dealing with data protection incidents.
+ In addition, procedures are established and documented to ensure the following aspects:
- immediate notification to the respective responsible person, as far as his order is affected
- Documentation of the incident handling activities
- Training of employees on the defined measures/processes
- Support of the respective controller in the processing of data protection incidents
To what extent are employees obliged to
maintain confidentiality?
Organizations are subject to laws, regulations, and internal policies. For employment
(hiring/implementation/termination), it is important that employees commit to
compliance with the guidelines.
+ Employees whose tasks include the processing of personal data are obliged to maintain confidentiality (even
beyond the duration of the employment relationship) and to comply with applicable data protection laws.
- The obligation is documented
To what extent are employees trained in data
protection?
If the requirements and risks of data protection are not known to employees, there is a
risk that employees will behave incorrectly and thus damage the organization. It is
therefore important that data protection is internalized and lived as a natural part of
their work.
+ Employees are trained and sensitized.
- Scope, frequency, and content of the training is determined according to the protection needs of the data
- Employees in critical areas (e.g. IT administrators) are instructed and trained specifically for their work (e.g.
specific training courses or instructions, short videos, etc.).
To what extent are instructions of processing
relationships handled?
The orderly and defined handling of instructions with regard to the processing by the
controller is intended to ensure that the tasks of the processor are fulfilled, and that
the processor fulfils the planned and contractually agreed obligations (in particular also
to determine a possible exceeding of the contractually agreed framework).
+ The instructions by the controller regarding the processing of personal data are handled.
+ Procedures and measures are in place to ensure that:
- Received instructions are documented
- Instructions can be implemented (e.g. procedures for correcting, deleting, ...)
- Data is separated by client and specific order or project
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Reference to other standards
Measures/recommendations
Further information
r technical reasons. Please do not remove this text. This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional invisible text for technical reasons. Please do not remove this text. This is intentional
Usual person responsible for
process implementation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Possible questions (examples, not binding)
Possible evidence (not binding)
l invisible text for technical reasons. Please do not remove this text.
Assistance:
Examples of "normal protection needs"
Assistance:
Examples of "High protection requirements"
Assistance:
Examples of "very high protection needs"
It is not necessary to list all information values individually, but categories can also be formed (e.g. master
data of the employees - responsible office: Human Resources Department).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Company:
0
Scope ID:
0
Date:
12/30/1899
Maximum score:
3.00
Result per chapter (without cutback):
Result per subchapter (without cutback):
Information Security Assessment
Results
Result with cutback to target
maturity level:
1 IS Policies and Organization
2 Human Resources
3 Physical Security
4 Identity and Access Management
5 IT Security/Cyber Security
6 Supplier Relationships
7 Compliance
8 Prototypte Protection (na)
0
1
2
3
4
5
Target maturity level
Result
1.1 Information Security Policies
1.2 Organization of Information Security
1.3. Asset Management
1.4. IS Risk Management
1.5 Assessments
1.6 Incident and Crisis Management
2.1 Human Resources
3.1 Physical Security and Business Continuity
4.1 Identity Management
4.2 Access Management
5.1 Cryptography
5.2 Operations Security
5.3 System acquisitions, requirement management and development
6.1 Supplier Relationships
7.1 Compliance
8.1 Prototypte Protection - Physical and Environmental Security (na)
8.2 Prototypte Protection - Organizational Requirements (na)
8.3 Prototypte Protection - Handling of vehicles, components and parts (na)
8.4 Prototypte Protection - Requirements for trial vehicles (na)
8.5 Prototypte Protection - Requirements for events and shootings (na)
0
1
2
3
4
5
Target maturity level
Result
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Maximum score:
3.00
Details:
No.
Subject
Result
1.1.1
To what extent are information security policies available?
3
1.2.1
To what extent is information security managed within the organization?
3
1.2.2
To what extent are information security responsibilities organized?
3
1.2.3
To what extent are information security requirements considered in projects?
3
1.2.4
3
1.3.1
To what extent are information assets identified and recorded?
3
1.3.2
To what extent are information assets classified and managed in terms of their protection needs?
3
1.3.3
3
1.3.4
3
1.4.1
To what extent are information security risks managed?
3
1.5.1
To what extent is compliance with information security ensured in procedures and processes?
3
1.5.2
To what extent is the ISMS reviewed by an independent authority?
3
1.6.1
To what extent are information security relevant events or observations reported?
3
1.6.2
3
1.6.3
3
2.1.1
To what extent is the qualification of employees for sensitive work fields ensured?
3
2.1.2
To what extent is all staff contractually bound to comply with information security policies?
3
2.1.3
3
2.1.4
To what extent is mobile work regulated?
3
3.1.1
To what extent are security zones managed to protect information assets?
3
3.1.2
Superseded by 1.6.3, 5.2.8 and 5.2.9
na
na
3.1.3
To what extent is the handling of supporting assets managed?
3
3.1.4
To what extent is the handling of mobile IT devices and mobile data storage devices managed?
3
4.1.1
To what extent is the use of identification means managed?
3
4.1.2
To what extent is the user access to IT services and IT systems secured?
3
4.1.3
To what extent are user accounts and login information securely managed and applied?
3
4.2.1
To what extent are access rights assigned and managed?
3
5.1.1
To what extent is the use of cryptographic procedures managed?
3
5.1.2
To what extent is information protected during transfer?
3
Information Security Assessment
Results
Result with cutback to target
maturity level:
Target
maturity
level
To what extent are the responsibilities between external IT service providers and the own organization
defined?
To what extent is it ensured that only evaluated and approved external IT services are used for
processing the organization’s information assets?
To what extent is it ensured that only evaluated and approved software is used for processing the
organization’s information assets?
To what extent are reported security events managed?
To what extent is the organization prepared to handle crisis situations?
To what extent is staff made aware of and trained with respect to the risks arising from the handling of
information?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
5.2.1
To what extent are changes managed?
3
5.2.2
To what extent are development and testing environments separated from operational environments?
3
5.2.3
To what extent are IT systems protected against malware?
3
5.2.4
To what extent are event logs recorded and analysed?
3
5.2.5
To what extent are vulnerabilities identified and addressed?
3
5.2.6
To what extent are IT systems and services technically checked (system and service audit)?
3
5.2.7
3
5.2.8
To what extent is continuity planning for IT services in place?
3
5.2.9
To what extent is the backup and recovery of data and IT services guaranteed?
3
5.3.1
To what extent is information security considered in new or further developed IT systems?
3
5.3.2
To what extent are requirements for network services defined?
3
5.3.3
3
5.3.4
To what extent is information protected in shared external IT services?
3
6.1.1
3
6.1.2
To what extent is non-disclosure regarding the exchange of information contractually agreed?
3
7.1.1
To what extent is compliance with regulatory and contractual provisions ensured?
3
7.1.2
3
Method:
- comparison of the top 41 security topics
3.00
To what extent is the network of the organization managed?
To what extent is the return and secure removal of information assets from external IT services
regulated?
To what extent is information security ensured among contractors and cooperation partners?
To what extent is the protection of personally identifiable data considered when implementing information
security?
- based on ISO 27001 controls
- evaluated according to SPICE ISO 15504
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Maximum score:
3.00
Details:
No.
Subject
Result
8.1
Physical and Environmental Security
8.1.1
Security concept
3
8.1.2
Perimeter security
3
8.1.3
Stability of outer skin
3
8.1.4
View and sight protection
3
8.1.5
Protection against unauthorized entry and access control
3
8.1.6
Intrusion monitoring
3
8.1.7
Visitor management
3
8.1.8
Client segregation
3
8.2
Organizational Requirements
8.2.1
Non-disclosure obligations
3
8.2.2
Subcontractors
3
8.2.3
Awareness
3
8.2.4
Security classification
3
8.2.5
Access control
3
8.2.6
Film and photo regulations
3
8.2.7
Mobile video and photography devices
3
8.3
Handling of vehicles, components and parts
8.3.1
Transport
3
8.3.2
Parking and storage
3
8.4
Requirements for trial vehicles
8.4.1
Camouflage
3
8.4.2
Test and trial ground
3
8.4.3
Test and trial drives on public roads
3
8.5
Requirements for events and shootings
8.5.1
Presentations and events
3
8.5.2
Film and photo shootings
3
Information Security Assessment
Results - Prototype Protection
Result with cutback to target
maturity level:
Target
maturity
level
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
Control ISA
4.1.3 To what extent are user accounts and login information securely managed and applied?
5.2.1 To what extent are changes managed?
5.2.3 To what extent are IT systems protected against malware?
Scope
COVERAGE
EFFECTIVENESS
COVERAGE
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
ID
“Collective accounts”
Change - error rate
Description
Objective (Vision)
Error-free performance of changes
Recipients
Information Security; supervisors
Information Security
Information Security
Information Security
Information Security
Information Security
Information Security
Local IT, Information Security
Local IT, Information Security
Frequency (reporting)
Threshold levels
Number red: > 0, Green = 0
Measurement
Frequency (measurement)
Interfaces
Incident Management
User Management
AV Management, IT Operations
AV Management, IT Operations
Components
AV console, CMDB
AV console, CMDB
Information Security Assessment
Examples of KPIs
2.1.3 To what extent is staff made aware of and trained with respect
to the risks arising from the handling of information?
Coverage degree of awareness
measures
Effectiveness of awareness
measures
Coverage degree review “User
accounts”
Coverage degree review
“authorizations”
Coverage degree Change
Management
Coverage degree Endpoint
Security
Effectiveness of updating
Endpoint Security
Employees with raised awareness
represent an important pillar for
the information security in a
company. Awareness measures
should reach all employees, as far
as possible. The KPI measures the
coverage degree of trainings such
as e-learnings, classroom
trainings.
The contents of awareness
measures should consider
outcomes of information security
incidents.
The KPI measures the
effectiveness of awareness
measures by recording (based on
number or cost) security incidents
with human errors as a cause.
Regular reviews of systems for
unnecessary accounts are the
prerequisite for a consistent and
current user base according to the
need-to-know principle. The KPI
measures the coverage degree of
the measure “Regular user
review”.
Regular reviews of user accounts
for unnecessary authorizations
are the prerequisite for a
consistent and current
authorization base according to
the need-to-know principle. The
KPI measures the coverage degree
of the measure “regular
authorization review”.
Collective accounts should
principally not be used or used
only in exceptional cases since an
explicit allocation of user activities
is impeded. The KPI measures the
number of used collective
accounts in consideration of
approved exceptions.
A comprehensive and consistently
observed change management
process is the basis for secure
operation. The KPI measures the
coverage degree of changes
complying with the policies.
A high quality of the change
management process leads to
lower error rates among the
performed changes and
contributes to a secure operation.
The KPI measures the error rate of
changes.
A comprehensive Endpoint
Security provides a company with
an essential protection against
malware. The KPI measures the
ratio of protected IT systems in
consideration of approved
exceptions.
Current virus signatures are the
prerequisite for an effective
Endpoint Security. The KPI
measures the target state and the
actual state of virus definitions on
reporting deadline.
All employees are trained with
respect to information security
No information security incidents
with human error as a cause
All IT systems have valid user
accounts only
All authorizations comply with
current needs
All collective accounts are
reviewed for their necessity
All changes are made in
conformance to policies
Comprehensive protection of all IT
systems threatened by malware
All IT systems have up-to-date
protection
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (0-
20 low, 20-50 medium, 50+ high)
possible characteristic for
comparability of business units: in
relation to the number of
employees, e.g. unit:
incidents/100 employees
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%, special case of IT
systems relevant to billing: target
coverage = 100%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%, special case of IT
systems relevant to billing: target
coverage = 100%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%, special case of IT
systems relevant to billing: target
coverage = 100%)
to be determined individually (e.g.
Green: < 10%, Yellow: 10-30%,
Red: > 30%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
target: 100% after max. 30
minutes,
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
Assessment of training
management
Quotient: number of
participants/total number of
employees
Determining the number of
security incidents with human
error as a cause
Quotient: number of performed
reviews/total number of IT
systems in scope
Quotient: number of performed
reviews/total number of users in
scope
determining the number of
collective accounts (adjusted for
authorized exceptions)
Quotient: number of approved
and requested changes
(RFC)/total number of performed
changes
Quotient: number of reversed
changes/total number of
performed changes
Quotient: number of protected IT
systems/total number of IT
systems (adjusted for authorized
exceptions)
time comparison
average actual rollout state vs.
target state
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
annually)
HR - Training Department - IKS -
Internal Audit Department
Data Owner, User Management,
Supervisors
Data Owner, User Management,
Supervisors
IT Operations, Change
Management
IT Operations, Change
Management
E-learnings, classroom training,
training plan, training register
Incident Mgt. Tool, Ticket System,
ISMS Tool
User registry, authorization
management tool, IAM platform,
CMDB
User registry, authorization
management tool, IAM platform
User registry, authorization
management tool, IAM platform
Project Management, Change
Management
Project Management, Change
Management
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
5.2.9 To what extent is the backup and recovery of data and IT services guaranteed?
5.2.5 To what extent are vulnerabilities identified and addressed?
1.6.2 To what extent are reported security events managed?
1.1.1 To what extent are informa
COVERAGE
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
Coverage degree of backup
Backup effectiveness
Effectiveness of patch installation
Correct backups
Local IT, Information Security
Local IT, Information Security
Initial version
Number red: > 0, Green = 0
Number red: > 1, Green = 1
Backup process, IT Operations
Backup process, IT Operations
Backup process, IT Operations
Backup software, CMDB
Backup software, CMDB
Backup software, CMDB
1.6.1 To what extent are information security relevant events or
observations reported?
Coverage degree of restoration
tests
Coverage degree Patch
Management
Detection rate of information
security incidents
Timely processing of information
security incidents
Creation degree of required
policies/documentations
A regular and complete backup
provides protection against the
loss of data, e.g. in case of a
system failure or malware
infection of IT systems.
The KPI measures the degree of
backup coverage.
Regular restoration tests (e.g. by
restoring data or systems) is
essential to the availability of
business information.
The KPI measures the coverage
degree of restoration tests.
Backup quality must be ensured
by correlating controls. Measures
are e.g. data restore, system
restorations.
The KPI measures the number of
incorrect data restores.
A comprehensive patch
management protects the
company against malware and
exploits. The KPI measures the
inclusion of IT systems and
applications in the patch
management process.
The timely installation of patches
ensures the security of IT systems
and applications and therefore
reduces the exploit windows for
the company. The KPI measures
the recording of the target state
and the actual state of patches.
Information security incidents
have to be detected and timely
handled in order to protect the
company from damages. The KPI
measures the compliance of the
incident reporting process
between the involved interfaces.
Information security incidents
have to be adequately prioritized
and handled according to their
criticality. The KPI measures the
appropriate timely handling of
information security incidents.
Under an ISMS,
mandatory/voluntary
policies/documentations must be
prepared.
All relevant data is adequately
secured
Regular restoration tests for all
backed-up IT systems
All IT systems are involved in the
patch process
All IT systems are at current patch
level
All information security incidents
will be detected, reported and
handled within the scope of the
incident management process
All information security incidents
will be handled within an
appropriate time frame
All necessary
policies/documentations are
present
Local IT, Information Security,
service owner
Local IT, Information Security,
service owner
Local IT, Information Security,
service owner
IT, Information Security,
Compliance
IT, Information Security,
Compliance
Information Security, Corporate
Security, IT Security, HR, Business
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
Green: = 100% (of IT systems to
be secured), Yellow: 70-99%, Red:
< 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
target: 100% after max. 10 days,
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
according to the category
maximum periods for solution:
-PRIO 1: Days
-PRIO 2: Weeks
-PRIO 3: Months
unsolved incidents within a
period, e.g. Green: < 2%, Yellow:
2-5%, Red: > 5%)
to be determined individually
(target coverage = 100 %)
Quotient: number of IT systems
covered by backups/total number
of IT systems (adjusted for
authorized exceptions)
Quotient: number of IT systems
with tested restoration from
backup/total number of all
backed-up IT systems
Quotient: number of restorations
with errors/total number of all
restoration tests
Quotient: number of currently
patched IT systems/total number
of IT systems (adjusted for
authorized exceptions)
time comparison
average actual rollout state vs.
target state
Quotient: number of information
security incidents reported in the
incident management/total
number of incidents (known to
the surveying unit)
For each individual criticality level:
All unsolved incidents within
defined period/all incidents
Quotient: number of existing
policies/population of necessary
policies
to be determined individually (e.g.
annually)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
Patch/Change Management, IT
Operations
Patch/Change Management, IT
Operations
IT, CERT, Incident Management,
Helpdesk, Service Management
IT, CERT, Incident Management,
Helpdesk, Service Management
Information Security, Corporate
Security, IT Security, HR, Business
Change Management Console,
Software Distribution Platform,
CMDB, WSUS
Change Management Console,
Software Distribution Platform,
CMDB, WSUS
Incident Management
System/Workflow
Incident Management
System/Workflow
Contents derived from the
Statement of Applicability (SoA)
and documented in accordance
with ISO 27001
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
ation security policies available?
3.1.1 To what extent are security zones managed to protect information assets?
5.2.4 To what extent are event
COVERAGE
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
COVERAGE
EFFECTIVENESS
Functioning log activity
IT Security, Information Security
number of incorrectly written logs
IT Operations, IT Security
IT Operations, IT Security
Logistics, Access Management
Overview of projects per PMO
Overview of projects per PMO
Overview of mobile devices
Overview of mobile devices
CMDB, Logging server
CMDB, Logging server
1.2.3 To what extent are information security requirements taken
into account in projects?
3.1.4 To what extent is the handling of mobile IT devices and mobile
data storage devices managed?
Actuality of required
policies/documentations
Coverage degree of information
security in projects
Protective measures -
implementation in projects
Coverage degree of mobile device
security
Effectiveness of implementation
of mobile device security
measures
Implementation degree of zone
concept
Implementation of protective
measures for zone concept
Coverage degree review “Access
authorizations”
Coverage degree of event logs on
security-critical IT systems
For the ISMS, the prepared
policies/documentations must be
reviewed for their actuality.
Information security topics shall
be addressed during projects.
Projects subject to information
security requirements
A comprehensive and consistent
protection of all relevant mobile
devices is the basis for their
secure operation. The KPI
measures the coverage degree of
the defined protective measures.
A strong implementation of
protective measures regarding
relevant mobile devices reduces
vulnerabilities.
Properties must be adequately
protected; this can be achieved by
implementation of a zone
concept. The zone concept should
be implemented comprehensively.
Zones must be adequately
protected according to criticality.
Regular verifications of access
rights with respect to their
necessity are an absolute
prerequisite for a secure delivery
and shipping zone.
Event logging enables traceability
of activities in a process or
process step/on an IT system/in
an application. This functionality
helps to solve system
failures/abnormalities. Logs
should be activated in security-
critical IT systems.
Results of logging activities must
allow analysis. Reliable end-to-
end recording of the activities to
be monitored is essential for
traceability, if required.
All necessary
policies/documentations are
reviewed for actuality/content
Information security requirements
are considered in all projects
Information security requirements
are implemented in all projects
All relevant mobile devices are
subject to protective measures
All relevant mobile devices are
subject to up-to-date protection
Zones are defined for all
properties
Security zones are protected
according to internal
specifications (see e.g. References
“Security zones”)
All employees working in the
delivery and shipping area are
subject to regular review of access
rights
All relevant IT systems and
applications are integrated into
event logging
Completeness and correctness of
logs
Information Security, Corporate
Security, IT Security, HR, Business
Information Security, Corporate
Security, IT Security
Information Security, Corporate
Security, IT Security
IT Security, Information Security,
Corporate Security
Information Security, Corporate
Security
Information Security, Corporate
Security
Corporate Security, Logistics,
authorities
Local IT, Information Security,
Compliance
Local IT, Information Security,
Compliance
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually
(target coverage = 100 %)
to be determined individually
(target coverage = 100 %)
to be determined individually
(target coverage = 100 %)
to be determined individually
(target coverage = 100 %)
to be determined individually
(target coverage = 100 %)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually
(target coverage = 100 %)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%, special case of IT
systems relevant to billing: target
coverage = 100%)
Number of incorrect logs
Red: > 0, Green = 0
Quotient: number of policies
reviewed according to
cycle/population of policies to be
reviewed
Quotient: number of projects
considering security/total number
of relevant projects
Quotient: number of projects
considering security aspects/total
number of relevant projects
Quotient: number of protected
mobile devices/total number of
mobile devices
Quotient: number of mobile
devices protected in a timely
manner/total number of mobile
devices
Quotient: number of properties
with zone concept/population of
properties
Quotient: number of adequately
secured zones/population of all
zones
Quotient: number of employees
working in the delivery and
shipping area who are subject to
regular access rights
reviews/population of employees
working in the delivery and
shipping area
Quotient: number of logged
security-critical IT systems/total
number of security-critical IT
systems
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
quarterly)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
quarterly)
Information Security, Corporate
Security, IT Security, HR, Business
Project customer, Project
Management Office (PMO)
Project customer, Project
Management Office (PMO)
Plant security, local security
functions, specialized
departments
Plant security, local security
functions, specialized
departments
IT, IT System Owner, Data Owner,
Risk Owner
IT, System Owner, Data Owner,
Risk Owner
Contents derived from the
Statement of Applicability (SoA)
and documented in accordance
with ISO 27001
Property plans, zone concept,
information classification
Property plans, zone concept,
information classification
Staff registry (internal/external),
access control system
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
t logs recorded and analyzed?
5.3.2 To what extent are requirements for network services defined?
5.3.1 To what extent is information security considered in new or further developed IT systems?
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
COVERAGE
EFFECTIVENESS
Functioning log activity
Coverage degree system audits
Effectiveness of observing SLAs
Local IT, Information Security
Local IT, Information Security
Local IT, Information Security
Local IT, Information Security
CMDB, Logging server, IAM
CMDB, Logging server, IAM
CMDB
CMDB, Audit system
CMDB
CMDB
Acquisition system
5.2.6 To what extent are IT systems and services technically checked
(system and service audit)?
6.1.2 To what extent is non-
disclosure regarding the exchange
of information contractually
agreed?
Coverage degree of admin logs on
security-critical IT systems
Effectiveness of system audit
implementation
Coverage degree review service
level agreements (SLA)
Coverage degree non-disclosure
agreements
Effectiveness of risk handling in IT
system acquisition processes
Coverage degree of risk
assessment in software
development process
Effectiveness of risk handling in
development process
Admin logging allows traceability
of administrator activities in a
process or process step/on an IT
system/in an application. This
functionality helps to solve
abnormalities. Admin logs should
be activated in security-critical IT
systems and protected against
(admin) manipulations.
Results of admin logging activities
must allow analysis. Reliable and
manipulation-protected end-to-
end recording of the admin
activities to be monitored is
essential for traceability, if
required.
IT systems processing or storing
information of high or very high
protection needs must be
subjected to audits at regular
intervals.
Measures resulting from those
audits must be implemented in
time in order to eliminate any
detected vulnerabilities.
Regular verifications of the SLAs
for network services ensure
consideration of current security
requirements at all times.
The agreed measures resulting
from the SLAs must be
implemented.
The protection of information
confidentiality must be subject to
contractual agreement where at
least confidential information is
exchanged with external partners.
Risks identified during the
acquisition process are treated in
a timely and effective manner.
Information security risks
associated with the applications
to be developed must be
identified as early as possible in
the process of software
development.
Risks identified in the process of
software development are treated
in a timely and effective manner.
All relevant IT systems and
applications are integrated into
admin logging
Completeness and integrity of
admin logs
All relevant IT systems are
subjected to audits at regular
intervals
All measures are implemented in
time
All SLAs include the current
security requirements
All requirements resulting from
the SLAs are implemented
Non-disclosure agreements have
been entered with all external
partners
Security risks identified in
acquisition are handled in an
effective manner
Security risks are taken into
account in the software
development process
Security risks are addressed in the
development process in an
effective manner
Local IT, Information Security,
Compliance
Local IT, Information Security,
Compliance
Acquisition, Information Security,
specialized department
Information Security, Local IT,
Procurement
Information Security, Local IT, Risk
Management
Information Security, Local IT, Risk
Management
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%, special case of IT
systems relevant to billing: target
coverage = 100%)
Number of incorrect admin logs
Red: > 0, Green = 0
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
Quotient: number of logged
security-critical IT systems/total
number of security-critical IT
systems
number of incorrectly written
admin logs
Quotient: number of audited IT
systems/total number of security-
critical IT systems
Quotient: number of measures
implemented in time/number of
measures still to be implemented
Quotient: number of verified
SLAs/total number of SLAs
Quotient: number of measures
implemented/number of
measures agreed
Quotient: number of orders with
concluded non-disclosure
agreement/total number of
relevant orders
Quotient: number of treated
risks/population of risks identified
in the acquisition process
Quotient: number of software
development projects that
underwent risk
assessment/population of
relevant development projects
Quotient: number of treated
risks/population of risks identified
in the development process
to be determined individually (e.g.
annually)
to be determined individually (e.g.
quarterly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
monthly)
to be determined individually (e.g.
quarterly)
to be determined individually (e.g.
quarterly)
to be determined individually (e.g.
quarterly)
IT, System Owner, Data Owner,
Risk Owner, User Management
IT, System Owner, Data Owner,
User Management
Audit Management, IT
Operations, System Owner
Audit Management, IT
Operations, System Owner
IT Operations, Information
Security
IT Operations, Information
Security
Acquisition, Information Security,
specialized department
Procurement, specialized
departments (requisitioner), Local
IT
Procurement, specialized
departments (requisitioner), Local
IT
Procurement, specialized
departments (requisitioner), Local
IT
Acquisition register, ordering
system
Development system,
development project data base
Development system,
development project data base
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
_x000D_
not public
COVERAGE
EFFECTIVENESS
1.5.1 To what extent is compliance with information security ensured
in procedures and processes?
Coverage degree of activities to
eliminate vulnerabilities
determined during audits
Timely elimination of
vulnerabilities determined during
audits
Vulnerabilities identified in the
course of information security
audits (internal and external)
must be eliminated in a
consequent and traceable
manner. Findings must not remain
unhandled.
Vulnerabilities identified in the
course of information security
audits (internal and external) are
eliminated within the deadlines
agreed (with the audited
departments).
All vulnerabilities identified in the
course of audits are traced and
assigned to activities
Vulnerabilities identified in the
course of audits are eliminated
within the defined time and in an
effective manner
Information Security, Corporate
Security, Local IT, Internal Audit
Information Security, Corporate
Security, Local IT, Internal Audit
to be determined individually (e.g.
annually)
to be determined individually (e.g.
annually)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
to be determined individually (e.g.
Green: > 90%, Yellow: 70-90%,
Red: < 70%)
Quotient: number of findings
subject to subsequent
activities/population of identified
findings
Quotient: number of activities for
eliminating vulnerabilities within
the defined period for
implementation/population of all
specified activities
to be determined individually (e.g.
quarterly)
to be determined individually (e.g.
quarterly)
Internal Auditors, Information
Security, Local IT, specialized
departments (Auditees)
Internal Auditors, Information
Security, Local IT, specialized
departments (Auditees)
Audit data base, follow-up data
base
Audit data base, follow-up data
base
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
You are free to:
Under the following terms:
Creative Commons Attribution-NoDerivatives 4.0 International Public License
Information Security Assessment
License
© 2023 ENX Association, an Association according to the French Law of 1901, registered under No. w923004198 at the Sous-
préfecture of Boulogne-Billancourt, France.
This work of ENX's Working Group ISA was provided to the VDA in the present version by the ENX Association for published by
the VDA as the VDA ISA. It is made to all interested parties free of charge under the following licensing terms. The release in the
VDA is done by the VDA's Working Group Information Security and Economic Protection. Publication takes place with the consent
of the rights holder. The VDA is responsible for the publication of the VDA ISA.
The Tab "Data Protection" is provided, owned and copyrighted by VERBAND DER AUTOMOBILINDUSTRIE e. V. (VDA, German
Association of the Automotive Industry); Behrenstr. 35; 10117 Berlin
This work has been licensed under Creative Commons Attribution - No Derivative Works 4.0 International Public License. In
addition, You are granted the right to distribute derivatives under certain terms as detailed in section 9 which are not part of the
Creative Commons license. The complete and valid text of the license is to be found in line 17ff.
·
Share
— copy and redistribute the material in any medium or format
·
for any purpose, even commercially.
·
The licensor cannot revoke these freedoms as long as you follow the license terms.
·
Attribution
— You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do
so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
·
Restricted derivatives
— If you change or otherwise build directly upon the material, You may only distribute the modified
material if it is clearly marked as a derivative not
approved by the licensor and
if all logos and/or trademarks of the licensor have
been removed.
·
No additional restrictions
— You may not apply any additional legal terms or technological measures that legally restrict
others from doing anything the license permits.
By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative
Commons Attribution-NoDerivatives 4.0 International Public License ("Public License"). To the extent this Public License may be
interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions,
and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material
available under these terms and conditions.
Section 1 – Definitions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
a.
Adapted Material
means material subject to Copyright and Similar Rights that is derived from or based upon the Licensed
Material and in which the Licensed Material is translated, altered, arranged, transformed, or otherwise modified in a manner
requiring permission under the Copyright and Similar Rights held by the Licensor. For purposes of this Public License, where the
Licensed Material is a musical work, performance, or sound recording, Adapted Material is always produced where the Licensed
Material is synched in timed relation with a moving image.
b.
Copyright and Similar Rights means copyright and/or similar rights closely related to copyright including, without limitation,
performance, broadcast, sound recording, and Sui Generis Database Rights, without regard to how the rights are labelled or
categorized. For purposes of this Public License, the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar Rights.
c.
Effective Technological Measures
means those measures that, in the absence of proper authority, may not be circumvented
under laws fulfilling obligations within the meaning of Article 11 of the WIPO Copyright Treaty adopted on December 20, 1996,
and/or similar international agreements.
d.
Exceptions and Limitations
means fair use, fair dealing, and/or any other exception or limitation to Copyright and Similar
Rights that applies to Your use of the Licensed Material.
e.
Licensed Material
means the artistic or literary work, database, or other material to which the Licensor applied this Public
License.
f.
Licensed Rights
means the rights granted to You subject to the terms and conditions of this Public License, which are limited
to all Copyright and Similar Rights that apply to Your use of the Licensed Material and that the Licensor has authority to license.
g.
Licensor
means the individual(s) or entity(ies) granting rights under this Public License.
h.
Share
means to provide material to the public by any means or process that requires permission under the Licensed Rights,
such as reproduction, public display, public performance, distribution, dissemination, communication, or importation, and to
make material available to the public including in ways that members of the public may access the material from a place and at a
time individually chosen by them.
i.
Sui Generis Database Rights
means rights other than copyright resulting from Directive 96/9/EC of the European Parliament
and of the Council of 11 March 1996 on the legal protection of databases, as amended and/or succeeded, as well as other
essentially equivalent rights anywhere in the world.
j.
You
means the individual or entity exercising the Licensed Rights under this Public License.
Your
has a corresponding meaning.
Section 2 – Scope.
a.
License grant.
1.
Subject to the terms and conditions of this Public License, the Licensor hereby grants You a worldwide, royalty-free, non-
sublicensable, non-exclusive, irrevocable license to exercise the Licensed Rights in the Licensed Material to:
A.
reproduce and Share the Licensed Material, in whole or in part; and
B.
produce and reproduce, but not Share, Adapted Material.
2.
Exceptions and Limitations. For the avoidance of doubt, where Exceptions and Limitations apply to Your use, this Public
License does not apply, and You do not need to comply with its terms and conditions.
3.
Term. The term of this Public License is specified in Section 6(a).
4.
Media and formats; technical modifications allowed. The Licensor authorizes You to exercise the Licensed Rights in all media
and formats whether now known or hereafter created, and to make technical modifications necessary to do so. The Licensor
waives and/or agrees not to assert any right or authority to forbid You from making technical modifications necessary to exercise
the Licensed Rights, including technical modifications necessary to circumvent Effective Technological Measures. For purposes of
this Public License, simply making modifications authorized by this Section 2(a)(4) never produces Adapted Material.
5.
Downstream recipients.
A.
Offer from the Licensor – Licensed Material. Each recipient of the Licensed Material will automatically receive an offer from
the Licensor to exercise the Licensed Rights under the terms of this Public License.
B.
No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any
Effective Technological Measures to, the Licensed Material if doing so restricts exercise of the Licensed Rights by any recipient of
the Licensed Material.
6.
No endorsement. Nothing in this Public License constitutes or may be construed as permission to assert or imply that You
are, or that Your use of the Licensed Material is, connected with, or sponsored, endorsed, or granted official status by, the
Licensor or others designated to receive attribution as provided in Section 3(a)(1)(A)(i).
b.
Other rights.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
Your exercise of the Licensed Rights is expressly made subject to the following conditions.
For the avoidance of doubt, You do not have permission under this Public License to Share Adapted Material.
Where the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed Material:
1.
Moral rights, such as the right of integrity, are not licensed under this Public License, nor are publicity, privacy, and/or other
similar personality rights; however, to the extent possible, the Licensor waives and/or agrees not to assert any such rights held by
the Licensor to the limited extent necessary to allow You to exercise the Licensed Rights, but not otherwise.
2.
Patent and trademark rights are not licensed under this Public License.
3.
To the extent possible, the Licensor waives any right to collect royalties from You for the exercise of the Licensed Rights,
whether directly or through a collecting society under any voluntary or waivable statutory or compulsory licensing scheme. In all
other cases the Licensor expressly reserves any right to collect such royalties.
Section 3 – License Conditions.
a.
Attribution.
1.
If You Share the Licensed Material, You must:
A.
retain the following if it is supplied by the Licensor with the Licensed Material:
i.
identification of the creator(s) of the Licensed Material and any others designated to receive attribution, in any reasonable
manner requested by the Licensor (including by pseudonym if designated);
ii.
a copyright notice;
iii.
a notice that refers to this Public License;
iv.
a notice that refers to the disclaimer of warranties;
v.
a URI or hyperlink to the Licensed Material to the extent reasonably practicable;
B.
indicate if You modified the Licensed Material and retain an indication of any previous modifications; and
C.
indicate the Licensed Material is licensed under this Public License, and include the text of, or the URI or hyperlink to, this
Public License.
2.
You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium, means, and context in
which You Share the Licensed Material. For example, it may be reasonable to satisfy the conditions by providing a URI or
hyperlink to a resource that includes the required information.
3.
If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)(A) to the extent reasonably
practicable.
Section 4 – Sui Generis Database Rights.
a.
for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and Share all or a substantial
portion of the contents of the database, provided You do not Share Adapted Material;
b.
if You include all or a substantial portion of the database contents in a database in which You have Sui Generis Database
Rights, then the database in which You have Sui Generis Database Rights (but not its individual contents) is Adapted Material;
and
c.
You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the contents of the database.
For the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under this Public License where
the Licensed Rights include other Copyright and Similar Rights.
Section 5 – Disclaimer of Warranties and Limitation of Liability.
a.
Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor offers the Licensed Material
as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether
express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a
particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors,
whether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in part, this disclaimer may
not apply to You.
b.
To the extent possible, in no event will the Licensor be liable to You on any legal theory (including, without limitation,
negligence) or otherwise for any direct, special, indirect, incidental, consequential, punitive, exemplary, or other losses, costs,
expenses, or damages arising out of this Public License or use of the Licensed Material, even if the Licensor has been advised
of the possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not allowed in full or in part,
this limitation may not apply to You.
c.
The disclaimer of warranties and limitation of liability provided above shall be interpreted in a manner that, to the extent
possible, most closely approximates an absolute disclaimer and waiver of all liability.
Section 6 – Term and Termination.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
3. any logos and/or trademarks of the Licensor have been removed.
a.
This Public License applies for the term of the Copyright and Similar Rights licensed here. However, if You fail to comply with
this Public License, then Your rights under this Public License terminate automatically.
b.
Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates:
1.
automatically as of the date the violation is cured, provided it is cured within 30 days of Your discovery of the violation; or
2.
upon express reinstatement by the Licensor.
For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek remedies for Your violations
of this Public License.
c.
For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate terms or conditions or stop
distributing the Licensed Material at any time; however, doing so will not terminate this Public License.
d.
Sections 1, 5, 6, 7, and 8 survive termination of this Public License.
Section 7 – Other Terms and Conditions.
a.
The Licensor must not be bound by any additional or different terms or conditions communicated by You unless expressly
agreed.
b.
Any arrangements, understandings, or agreements regarding the Licensed Material not stated herein are separate from and
independent of the terms and conditions of this Public License.
Section 8 – Interpretation.
a.
For the avoidance of doubt, this Public License does not, and must not be interpreted to, reduce, limit, restrict, or impose
conditions on any use of the Licensed Material that could lawfully be made without permission under this Public License.
b.
To the extent possible, if any provision of this Public License is deemed unenforceable, it must be automatically reformed to
the minimum extent necessary to make it enforceable. If the provision cannot be reformed, it must be severed from this Public
License without affecting the enforceability of the remaining terms and conditions.
c.
No term or condition of this Public License will be waived and no failure to comply consented to unless expressly agreed to
by the Licensor.
d.
Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of, any privileges and
immunities that apply to the Licensor or You, including from the legal processes of any jurisdiction or authority.
Section 9 – Distribution of Derivatives (additional rights granted and not part of the Creative Commons license)
a.
In addition to those rights granted under Sections 2(a)(3), the Licensor grants You the right to distribute modified material
provided:
1. this material is clearly marked as a modified version not approved by the Licensor; and
2. the license terms have not been modified, and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
1.0
1.1
1.2
1.3
2.0
2.0.1
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
3.0.2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
4.0.0
4.0.1
4.0.2
4.0.3
4.1.0
5.0.0
5.0.2
5.0.3
5.0.4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
5.1
6.0.0
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
First release (Initial version)
Changing open questions to solved questions
More precise level descriptions
Incorporating examples from practice
Spelling errors corrected
8.2 and 10.1 reference adjustment
10.2 change from production environment to productive environment
10.5 change from IDS/IPS to HIDS/HIPS
11.2 changes to the translation
11.3 and 11.4 restructuring of controls
11.4 add “IT” to systems
9.4 revision Maturity Level 2
Revision due to the new edition of ISO 27002:2013
Adjustment of the maturity levels
Fix for error in calculation and spider web diagram
Revision of the maturity levels, corrections of some controls
Release version 2.1
Print area adjusted
Spider web diagram shows results without cutback
Control 13.5 revised
Control 7.1 Maturity Level 1 revised
Controls 9.4 and 9.5 reference revised
Maturity Control changed from 12.4 to 4
Maturity Control changed from 16.3 to 3
Addition of KPIs
Spell checking in Maturity Level 3
Revision for TISAX
Module Connection of third parties included
Module Prototype Protection (25) included, derived from the Whitepaper of 06/10/2016
“Questions” renamed “ISMS”
Including KPIs in controls with Maturity Levels “4”
Removal of KPI from Control 18.2
Information Security Assessment
Change history
Module Data Protection (24) included, reference to 18.2 deleted, maturity levels removed from the module, references from
generated instead, reference included (ISMS, 18.2) showing that the data protection module will be used only in commissio
processing according to §11 BDSG, introduction of questions “fulfilled [yes/no]”
Upon agreement with the data protection working group, Maturity Level “4” has been removed from Control 18.2 and set to
Control 10.21 Cryptography has been raised from “2” to “3”.
Introduction of the protection needs “normal”, “high” and “very high” to represent the protection goals “integrity”, “availability
“confidentiality”; mapping from “internal” to “normal”, from “confidential” to “high” and from “secret/strictly confidential” to “ve
Assignment of requirements within Maturity Level “1” in the different controls.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
Introduction of references to several information security topics
Readability enhancement for information security controls
Categorizing the requirements of the individual controls into ‘must’, ‘should’ and ‘may’ in order to clarify the degree of obliga
Introduction of tab “Explanations”
Introduction of tab “Maturity levels”
Extension of tab “KPIs”
Extension of tab “Information Security” with additional controls to clarify requirements for usage of cloud services
KPI link at Control 12.2 has been deleted
Correction of the link of Control 14.4 on the results page, Level 3 adaptation: Established in tab “Maturity levels”
Tab Results: The results will only be indicated for controls that have been subject to processing.
8.4, 13.3 correction in description of objective
9.1 addition of control and objective description
10.1, 11.1, 12.5, 12.6, 12.9 adaptation of requirements
18.2 and Data Protection (24) adaptation to DSGVO
References: 'secret' changed to 'strictly confidential' and classification levels supplemented to protection classes
Prototype Protection (25) revised
Topical restructuring of VDA ISA in the module Information Security
New table format in all modules for improved overview and easier export options
Deletion of the module Connection to third parties and transfer of its requirements to the module Information Security
Integration of Notes and Explanations into the module Information Security, consequently deletion of the tabs Notes and Ex
Revision of ally questions, objectives and requirements
Harmonization of the target maturity level across all controls to a target value of 3
Integration of Control 1.2 into the new Control 1.4.1
Integration of Control 1.3 into the new Control 1.2.1
Integration of Control 9.4 into the new Control 4.1.3
Integration of Control 12.4 into the new Controls 3.1.2 and 3.1.4
New Control “Teleworking” (2.1.4)
New Control “Qualification of employees” (2.1.1)
New Control “Handling of identification means” (4.1.1)
Change of the License to Creative Commons BY ND 4.0 + special terms and conditions for the distribution of derivatives
Correction of overall maturity level calculation
Input check of “Maturity level” column
Correction of change history
Renumbering in “Data Protection” module
Correction of diagram designations in “Results” module
Supplementation of print areas
Correction of orthography and expression
Adaptation of Chapter 24 to DSGVO and minor modifications to those controls designated with 4.1.0
Integration of Controls 1.2 into the new Control 1.2.4
Integration of Controls 1.2 into the new Control 1.2.1
Integration of Controls 1.2 into the new Control 1.2.2
Integration of Controls 1.2 into the new Control 1.2.1
Integration of Controls 1.2 into the new Control 1.2.4
Integration of Controls 1.2 into the new Control 1.2.7
Integration of Controls 14.2 and 14.3 into the new Control 5.3.1
Integration of Controls 1.2 into the new Control 1.2.1
Integration of Controls 1.2 into the new Control 1.2.1
Deletion of Control 12.9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
Correction of orthography and expression, linguistic clarification, elimination of ambiguities
Restructuring of "Welcome” tab, Definitions of tabs moved to “Definitions”
Supplementation of protection goals with respect to requirements for high and very high protection needs in the “Information
Deletion of column “Addressed protection goals” in “Information Security” and “Prototype Protection” tabs
Content deleted from column “Usual person responsible for process implementation” in the “Information Security” and “Prot
Additional requirements to improve availabability
New Control 1.3.4 ("Software approval")
Renamed control section 1.6 ("Incident and Crisis Management")
Revised Control 1.6.1 ("Reporting of security events")
New Control 1.6.2 ("Managing of security events")
New Control 1.6.3 ("Handling crisis situations") (supersedes 3.1.2)
Supersesed Control 3.1.2
New Control 5.2.8 ("IT-service continuity planning")
New Control 5.2.9 ("Backup and recovery")
Removal of ISA 4 compatibility
Update module “Data Protection” (revised requirements provided by VDA Working Group "Datenschutz")
References to ISA/IEC 62443-2, ISO 27001:2022 and NIST CSF
References to implementation guide (BSI IT-Grundschutz, NIST SP800-53)
Additional scope of IT-systems on Operational Technology (OT)
Added further information, examples, typical auditor questions, and typical evidence to help and support auditees for many
Correction of references ISO 27001
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
_x000D_
#
not public
n” tabs
mns W to AB)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
2a
2b
2c
4
5
Control
Column
Previous wording
Information Security
1.1.1
Should
Information Security
1.2.2
should
(expand the requirement)
Tab (e.g. information
security)
Change suggestion /
new wording
+
Further
relevant
information
security policies
are prepared.
+
Other
relevant security policies are prepared
-
Other
relevant security roles are considered
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.3.4
all
New control: To what extent is software used
for processing the organization’s assets
managed?
Objective: Information processing is mostly
done through the use of specific software.
Security issues in software will easily become a
risk for the information processed. Accordingly,
software must be appropriatly managed.
Must:
+ Software is approved before installation or
use. The following aspects are considered:
- Limited approval for specific use-cases or
roles
- Conformance to the information security
requirements
- Software use rights and licensing
- Source / reputation of the software
+ Software approval also applies to special
purpose software such as maintenance tools
Should:
+ The types of software such as firmware,
operating systems, applications, libraries,
device drivers to be managed are determined.
+ Repositories of managed software exist
+ The software repositories are protected
against unauthorized manipulation
+ Approval of software is regularly reviewed
+ Software versions and patch levels are
known
High:
Very High:
+ Additional requirements for software use
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.4.1
should
Information Security
2.1.3
Should
Information Security
2.1.4
Must
none
+ A procedure is in place defining how to identify,
assess and address
information
security risks within
the organization.
+ Criteria for the assessment and handling of
information
security risks exist.
+ Measures for handling
information
security risks
and the persons responsible for these are specified
and documented:
- A plan of measures or an overview of their state
of implementation
exists.
+ In case of changes to the environment (e.g.
organizational structure, location, changes to
regulations), reassessment is carried out in a timely
manner.
+ A procedure is in place defining how to identify,
assess and address security risks within the
organization.
+ Criteria for the assessment and handling of
security risks exist.
+ Measures for handling security risks and the
persons responsible for these are specified and
documented:
- A plan of measures or an overview of their state
of implementation
is followed
.
+ In case of changes to the environment (e.g.
organizational structure, location, changes to
regulations), reassessment is carried out in a timely
manner.
+ Target groups for training and awareness
measures (e.g. new employees, administrators,
employees having access to customer networks)
are identified and taken into account in a training
concept.
+ Target groups for training and awareness
measures (
i.e., people working in specific risk
environments such as
administrators, employees
having access to customer networks,
personnel in
areas of manufacturing
) are identified and taken
into account in a training concept.
'+ Remote access connections are verified to
possess adequate security features (encryption,
granting and termination of access) and capabilities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
4.1.1
Objective
Information Security
4.1.2
Information Security
4.2.1
Must
none
Information Security
4.2.1
Must
Information Security
5.2.6
Should
To check the authorization for both physical access
and electronic access, means of identification such
as keys, visual IDs or cryptographic tokens are often
used. The security features are only reliable if the
use of such identification means is handled
adequately.
To check the authorization for both physical access
and electronic access, means of identification such
as keys, visual IDs,
other physical access devices as
well as
cryptographic tokens are often used. The
security features are only reliable if the use of such
identification means is handled adequately.
additional req for
high protection
needed
+ Depending on the risk assessment, authentication
procedure and access control have been enhanced
by supplementary measures (e.g.
permanent
access monitoring with respect to irregularities or
use of strong authentication, automatic logout or
disabling in case of inactivity)
'+ Depending on the risk assessment, authentication
procedure and access control have been enhanced
by supplementary measures (e.g.
continuous
access
monitoring with respect to irregularities or use of
strong authentication, automatic logout, disabling
in case of inactivity, or
brute force prevention
)
- Access rights are revoked once no longer needed
(as additional 3rd point under the first +)
- Procedure for application, verification and
- Procedure for application, verification, approval
+ System audits are planned taking into account
any security risks they might cause (e.g.
disturbances).
+ System audits are carried out by trained experts.
+ Suitable tools (e.g. vulnerability scanners) are
available for system audits.
+ Within a reasonable period following completion
of the audit, a report is prepared.
+ System audits are planned taking into account any
security risks they might cause (e.g. disturbances).
+ Regular system or service audits are performed
- carried out by qualified personnel
- suitable tools (e.g. vulnerability scanners) are
used for system and service audits (if applicable)
- performed from the internet and the internal
network
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
5.2.6
High
none
Information Security
5.2.6
very high
none
+ Critical IT services and systems relevant to them
are regularly scanned for vulnerabilities. (A
)
For critical IT systems or services, additional system
audit requirements have been identified and are
fulfilled (e.g., service specific tests and tools and/or
human penetration tests, risk-based time intervals)
(A)
+ IT systems and services are regularly scanned for
vulnerabilities. (A)
- Suitable protective measures must be
implemented for systems and services that may not
be scanned.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
5.2.7
should
Information Security
5.2.7
High
+ Procedures for the management and control of
networks are defined.
+ For network segmentation, the following aspects
are considered:
- Limitations for connecting IT systems to the
network,
- Use of security technologies,
- The increased risk due to network services
accessible via the internet,
- Technology-specific separation options when
using external IT services,
- Adequate separation between own networks
and customer networks while considering customer
requirements.
+ Procedures for the management and control of
networks are defined.
+ For a
risk-based
network segmentation, the
following aspects are considered:
- Limitations for connecting IT systems to the
network,
- Use of security technologies,
- performance, trust, availability, and safety
considerations
- Limitation of impact in case of compromised IT
systems
- Detection of potential attacks and lateral
movement of attackers
- Separation of networks with different operational
purpose (e.g. test and development networks,
office network, manufacturing networks)
- The increased risk due to network services
accessible via the internet,
- Technology-specific separation options when
using external IT services,
- Adequate separation between own networks and
customer networks while considering customer
requirements
- Detection and prevention of data loss/leakage
+ Extended requirements for the management and
control of networks are determined and
implemented. The following aspects are
considered: (C, I, A)
- Authentication of IT systems on the network,
- Access to the management interfaces of IT
systems is restricted.
+ Extended requirements for the management and
control of networks are determined and
implemented. The following aspects are considered:
(C, I, A)
- Authentication of IT systems on the network,
- Access to the management interfaces of IT
systems is restricted.
- specific risks (e.g. wireless and remote access)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
New: 5.2.8
all
none
New control:
5.2.8: To what extent is continuity planning for IT-
Services in place?
Objective:
Continuity (including contingency) planning for IT-
Services is part of an overall program for achieving
continuity of operations for organizational mission
and business critical functions. Actions addressed in
continuity plans include orderly system
degradation, system shutdown, fallback to a manual
mode, alternate information flows, and operating in
modes reserved for when a security incident occurs.
Must:
+ Critical IT-services are identified, and business
impact is considered.
+ Requirements and responsibilities for continuity
and recovery of those IT-Services are known to
relevant stakeholders and fulfilled.
Should:
+ Critical IT-Systems are identified
- the relevant systems are classified to have the
appropriate protection need
- adequate security measures are implemented
+ Continuity planning includes at least the following
scenarios affecting critical IT-systems:
- (Distributed) Denial of Service attacks
- Successful ransomware attacks and other
sabotage activities
- System failure
- Natural disaster
+ Continuity planning considers the following cases
- Alternative communication strategies, in case
primary communication means are not available
- Alternative storage strategies, in case primary
storage means are not available
- Alternative power and network
+ Continuity planning is regularly reviewed and
updated
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
New: 5.2.9
all
none
New control:
5.2.9: To what extent is the backup and recovery of
data and IT services guaranteed?
Data and IT services can become unavailable
through events such as hardware failures, software
defects, operator errors or attacks. Backup and
recovery enables organizations to recover from
relevant situations and limit potential harm to the
organization to a reasonable amount.
Must
+ Backup concepts exist for relevant IT systems. The
following aspects are considered:
- Appropriate protective measures to ensure
confidentiality, integrity and availability for data
backups.
+ Recovery concepts exist for relevant IT services.
Should
+ A backup and recovery concept exists for each
relevant IT service.
- Dependencies between IT services and the
sequence for recovery are taken into account
High
+ Backup and recovery concepts are methodically
reviewed at regular intervals. (A)
+ General restore capability is considered and
tested (e.g., sample testing, test systems) (A) (I)
+ Backup and recovery concepts consider the
following aspects: (A)
- Recovery Point Objective (RPO).
- Recovery Time Objective (RTO).
- Required resources for recovery (considering
capacity and performance incl. personnel and
hardware).
- Avoidance of overload scenarios during recovery.
- Appropriate spatial redundancy (e.g., separate
room, separate fire section, separate datacenter,
separate site)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
5.3.1
should
Information Security
5.3.1
very high
none
Information Security
6.1.1
should
'+ Requirement specifications are prepared under
consideration of the information security
requirements.
+ Requirement specifications are prepared.
The
following aspects are considered:
- The information security requirements.
- Vendor recommendations and best practices for
secure configuration and implementation
- Best practices and security guidelines
- Fail safe (designed to return to a safe condition in
the event of a failure or malfunction)
+ The security of non-standard
software
applications
or significantly adapted software is
tested (e.g. penetration testing)
- during commissioning
- in case of significant changes
- or at regular intervals
+ Contractors and cooperation partners are
contractually obliged to
also
pass on any
requirements regarding an appropriate level of
information security
also
to their subcontractors.
+ Contractors and cooperation partners are
contractually obliged to pass on any requirements
regarding an appropriate level of information
security to their subcontractors.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
definitions
all
none
Information Security
definitions
all
none
Information Security
definitions
all
none
Definitions
Glossary
-na-
New definition for "Critical IT-Service":
Critical IT-Services are essential to the business or
organization. When such a service fails or is
interrupted, business operations are severely
impacted.
New definition for "Critical IT-Systems":
Critical IT-Systems are essential to operate Critical
IT-Services.
New definition for "IAM Technology":
Identity and access management (IAM or IdAM)
Technology, is a framework of technologies to
ensure that the right users (that are part of the
ecosystem connected to or within an enterprise)
have the appropriate access to technology
resources. Identity and access management systems
not only identify, authenticate, and control access
for individuals who will be utilizing IT resources but
also the hardware and applications employees need
to access.
Glossary: IT Systems - Examples (Computer, server,
cloud, communication systems, video conference
systems, smartphones, tablets)
Glossary: IT Systems - Examples (Computer, server,
cloud, communication systems, video conference
systems, smartphones, tablets,
Industrial
automation and control system
)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
-na-
Discussion
4.2.1
- Application the minimum (“need-to-know”)
principle.
- Application the minimum (“need-to-know”
/"least
privilege-only")
principle.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
Information Security
all
none
Discussion SW
Services interactive
login rights
4.1.2
high protection
needs
+ A basic user account with minimum access rights
and functionalities is existent and used.
+ Default accounts and passwords pre-configured
by manufacturers are disabled (e.g. by blocking or
changing of password).
+ User accounts are created or authorized by the
responsible body.
+ Creating user accounts is subject to an approval
process (four-eyes principle).
+ User accounts of service providers are disabled
upon completion of their task.
+ Deadlines for disabling and deleting user
accounts are defined.
+ The use of default passwords is technically
prevented.
+ Where strong authentication is applied, the use
of the medium (e.g. ownership factor) is secure.
+ User accounts are reviewed at regular intervals.
This also includes user accounts in customers' IT
systems.
+ A basic user account with minimum access rights
and functionalities is existent and used.
+ Default accounts and passwords pre-configured
by manufacturers are disabled (e.g. by blocking or
changing of password).
+ User accounts are created or authorized by the
responsible body.
+ Creating user accounts is subject to an approval
process (four-eyes principle).
+ User accounts of service providers are disabled
upon completion of their task.
+ Deadlines for disabling and deleting user accounts
are defined.
+ The use of default passwords is technically
prevented.
+ Where strong authentication is applied, the use of
the medium (e.g. ownership factor) is secure.
+ User accounts are reviewed at regular intervals.
This also includes user accounts in customers' IT
systems.
+ interactive login for service accounts (technical
accounts) is technically prevented.
New column
"Reference to
implementation
guidance"
Content from separate change list as proposed by
the German Federal Bureau for Information Security
(BSI) + NIST SP800-53 revision 5 mapping
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
3.1.2
all
Information Security
3
Section Headline
Physical Security
Information Security
1.6
Section Headline
Incident Management
Remove entire control (replaced by 1.6.3 and 5.2.8
and 5.2.9)
Physical Security
and Business Continuity
Incident
and Crisis
Management
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.6.1
entire control
Control: To what extent are information security
events processed?
Objective:
Organized processing of information security events
aims at limiting potential damage and preventing
recurrence.
Must:
'+ A definition of information security
events/vulnerabilities exists.
+ A procedure for reporting and recording
information security events/vulnerabilities is
defined and implemented.
+ The following aspects are considered:
- Reaction to information security
events/vulnerabilities
- Report form and channel
- Processing body
- Feedback procedure
- Indications regarding technical and
organizational measures (e.g. disciplinary action).
+ Procedures for ensuring traceability in case of
information security events/vulnerabilities are
established and documented.
+ Information security events/vulnerabilities are
assessed and documented in order to ensure
traceability.
+ An adequate reaction to information security
events/vulnerabilities is given.
+ A strategy for an adequate reaction to events of
information security violations:
- This includes escalation procedures, remedial
actions and communication to relevant internal and
external bodies as well as a procedure for deciding
whether a cybercriminal attack will be prosecuted.
Should:
'+ Information security events/vulnerabilities
(problem management) are analyzed.
+ Measures to prevent further occurrence of similar
Control: To what extent are information security
relevant events reported?
Objective :
Potential security events or observations are
detected by anyone. It is vital that anyone can and
knows when and how to report anything that one
has observed and that has potential security
implications (observations) or events so that the
experts can decide if and how it needs to be
handled.
Must:
+ A definition for a reportable security event or
observation exists and is known by employees and
relevant stakeholders. The following aspects are
considered:
- Events and observations related to personnel
(e.g., misconduct / misbehavior)
- Events and observations related to physical
security (e.g., intrusion, theft, unauthorized access
to security zones, vulnerabilities in the security
zones)
- Events and observations related to IT and cyber
security (e.g., vulnerable it-systems, detected
successful or unsuccessful attacks)
- Events and observations related to suppliers and
other business partners (e.g., any incidents that can
have negative effect on the security of the own
organization)
+ Adequate mechanisms based on perceived risks
to report security events is defined, implemented,
and known to all relevant potential reporters
+ Adequate channels for communication with event
reporters exist.
Should
+ A single point of contact (SPOC) for event
reporting exists.
+ Different reporting channels according to
perceived severity exist (i.e., real time
communication for significant events / emergencies
in addition to asynchronous mechanisms such as
tickets or email) are available.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.6.2
all
new control
Control: To what extents are reported security
events managed?
Objective
Once security events are reported, it is vital that the
handling of the events is managed. This means to
ensure that the type and criticality of the reported
event as well as the persons responsible are quickly
identified to ensure that time-critical aspects can be
handled in time. Once identification is done,
ensuring that the responsible persons become
aware and deal with the event within a reasonable
time frame is necessary. Furthermore, if the event
affects multiple different persons, or management
also include coordinating communication is a
important part of event management. Finally, if
there are external (contractual or regulatory)
reporting requirements, its important to ensure
that these are also fulfilled in a professional way.
Must:
+ Reported events are processed without undue
delay.
+ An adequate reaction to reported security events
is ensured.
+ Lessons learned are incorporated into continuous
improvement.
Should:
+ During processing, reported events are
categorized (e.g. by responsibility into personnel,
physical and cyber), qualified (e.g. not security
relevant, observation, suggested security
improvement, security vulnerability, security
incident) and prioritized (e.g. low, moderate, severe,
critical).
+ Responsibilities for handling of events based on
their category are defined and assigned. The
following aspects are considered:
- Coordination of incidents and vulnerabilities
across multiple categories
- Qualification and resources
- Contact mechanisms based on type and priority
(e.g., non-time-critical communication, time-critical
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.6.3
all
new control
Control: To what extents is the organization
prepared to handle crisis situations?
Objective
A crisis situation occurs If exceptional situations
(e.g. natural disasters, physical attacks, pandemics,
exceptional social situations, cyber-attacks causing
major infrastructure failures) are severly disrupting
key business operations. In such cases, the main
priority of the organization is to handle the situation
as gracefully as possible and recover as quickly as
possible. To achieve that and since time is of the
essence, switching to a crisis management mode
executing pre-planned procedures having specific
distribution of responsibilities and structures
enables an organization to deal with such a
situation is the usual approach.
Must:
+ An appropriate planning to react to and recover
from crisis situations exists.
- The required resources are available.
+ Responsibilities and authority for crisis
management within the organization are defined,
documented and assigned.
+ The responsible employees are defined and
qualified for their task.
Should:
+ Methods to detect crisis situations are
established.
- General indications for the existence or
imminence of a crisis situation and specific
predictable crisis situations are identified
+ A procedure to invoke and/or escalate crisis
management is in place.
+ Strategic goals and their priority in crisis situations
are defined and known to relevant personnel. The
following aspects are considered:
- Ethical priorities (e.g., protection of life and
health)
- Core business processes (e.g., processes that
ensure the survival of the organization)
- Appropriate information security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Definitions
-
all
Information Security
all
ISO 27001
27001 + ISA/IEC 62443 Controls
Information Security
all
ISO 27001:2013
ISO 27001:2022
Information Security
1.1.1
-
Information Security
1.2.1
-
Information Security
1.2.2
-
Original Equipment Manufacturer (OEM): Within
the context of VDA ISA, this refers to an automobile
manufacturer.
Original Equipment Manufacturer (OEM): The
owner of the IP controlling the exact design and
specification of the product in question.
Reference to other
standard P
Reference to other
standard P
New column
"Additional
Requirements for
Simplified Group
Assessments
+ Policies are published and implemented in the
entire scope.
New column
"Additional
Requirements for
Simplified Group
Assessments
+ The management system is approved by an entity
that has the necessary authority for the entire
scope (i.e., all locations within the scope).
New column
"Additional
Requirements for
Simplified Group
Assessments
+ A named person with overall responsibility for the
management system exists and is available.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.5.1
-
Information Security
1.6.2
-
Definitions
Information Asset
all
Information Security
4.1.2
Control Question
Information Security
4.2.1
Objective
Information Security
5.3.4
Should
New column
"Additional
Requirements for
Simplified Group
Assessments
+ Internal controls are implemented for all entities
within the assessment scope.
- The implementation of all applicable security
requirements and control objectives are included.
+ Suitably qualified and appropriate information
security audit responsibilities and resources are
defined.
+ A detailed internal audit plan and schedule is
defined and followed. The following aspects are
considered:
- The entire scope of the assessment is covered
- Internal audits are conducted regularly
- Results of internal audits are tracked within the
ISMS structures
New column
"Additional
Requirements for
Simplified Group
Assessments
+ Standard mechanisms to report and track
relevant security events are established.
Information of
essential
value to the organization.
Information of
relevant
value to the organization.
To what extent is the user access to network
services, IT systems and IT applications secured?
To what extent is the user access to IT services and
IT systems secured?
The management of access rights ensures that only
authorized users have access to information and IT
applications. For this purpose, access rights are
assigned to user accounts.
The management of access rights ensures that only
authorized users have access to information and IT
services
. For this purpose, access rights are assigned
to user accounts.
+ The provider’s segregation concept is
documented and adapted to any changes. The
following aspects are considered:
- Separation of data, functions, applications,
operating system, storage system and network,
- Risk assessment for the operation of external
software within the shared environment.
+ The provider’s segregation concept is documented
and adapted to any changes. The following aspects
are considered:
- Separation of data, functions,
customer-specific
software
, operating system, storage system and
network,
- Risk assessment for the operation of external
software within the shared environment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
5.1.1
Must
Information Security
5.2.3
ü
+ All cryptographic procedures used (e.g.
encryption, signature, and hash algorithms,
protocols,
applications
) provide the security
required by the respective application field
according to the state of the art.
+ The legal parameters for the use of cryptography
are taken into account.
+ All cryptographic procedures used (e.g.
encryption, signature, and hash algorithms,
protocols) provide the security required by the
respective application field according to the state of
the art.
+ The legal parameters for the use of cryptography
are taken into account.
+ Unnecessary network services are disabled.
+ Access to network services is restricted to
necessary access by means of suitable protective
measures (see examples).
+ Malware protection software is installed and
updated automatically at regular intervals (e.g.
virus scanner).
+ Received files and programs are automatically
inspected for malware prior to their execution (on-
access scan).
+ The entire data contents of all systems is regularly
inspected for malware.
+ Data transferred by central gateways (e.g. e-mail,
internet, third-party networks) is automatically
inspected by means of protection software:
- Encrypted connections are taken into account.
+ Measures to prevent protection software from
being deactivated or altered by users are defined
and implemented.
+ Case-related staff awareness measures.
+ For IT systems operated without the use of
malware protection software, alternative measures
(e.g. special resilience measures, few services, no
active users, network isolation) are implemented.
+ Unnecessary network services are disabled.
+ Access to network services is restricted to
necessary access by means of suitable protective
measures (see examples).
+ Malware protection software is installed and
updated automatically at regular intervals (e.g. virus
scanner).
+ Received files and
software
are automatically
inspected for malware prior to their execution (on-
access scan).
+ The entire data contents of all systems is regularly
inspected for malware.
+ Data transferred by central gateways (e.g. e-mail,
internet, third-party networks) is automatically
inspected by means of protection software:
- Encrypted connections are taken into account.
+ Measures to prevent protection software from
being deactivated or altered by users are defined
and implemented.
+ Case-related staff awareness measures.
+ For IT systems operated without the use of
malware protection software, alternative measures
(e.g. special resilience measures, few services, no
active users, network isolation) are implemented.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Definitions
IT service
Definition
Definitions
Critical IT service
Examples
Definitions
IT system
Examples
Definitions
Software
Data Protection
All
All
<old data protection tab>
Information Security
Multple
Multiple
different use of words "application", "software", "p
Conistent use of "Software"
Information Security
4.1.2
Must
IT Service refers to a specified set of software
running on one or more IT systems that satisfies a
business need.
Examples: Active Directory, Corporate Network, ERP,
Corporate phone system
Computer, server, cloud, communication systems,
video conference systems, smartphones, tablets
Computer, server, cloud, communication systems,
video conference systems, smartphones, tablets,
industrial automation and control system, OT
devices, IoT
Definition +
Examples
Software is a generic term used to refer to
applications, scripts and programs that run on a IT
system.
Examples: Operating systems, applications, libraries,
device drivers, apps
<new data protection tab as provided by VDA AK
Datenschutz>
been selected based on a risk assessment. Possible
attack scenarios have been considered (e.g. direct
accessibility via the internet).
+ The procedures applied for user authentication
comply with the current state of the art.
selected based on a risk assessment. Possible attack
scenarios have been considered (e.g. direct
accessibility via the internet).
+ State of the art procedures for user authentication
are applied.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
5.1.3
Should
Information Security
Integration Examples
Results
Spider diagram
Welcome
n/a
n/a
© 2023 Verband der Automobilindustrie e.V.
© 2023 ENX Association, an Association according to
Welcome
n/a
n/a
License
n/a
n/a
Wrong CC logo, unclarity about what is covered by CRephrasing
Data Protection
9 Control Question
Data Protection
+ Requirement specifications are prepared. The
following aspects are considered:
- The determined information security
requirements.
- Vendor recommendations and best practices for
secure configuration and implementation
- Publically available best practice guidelines
- fail safe (graceful handling of failure)
+ Requirement specifications are reviewed against
the information security requirements.
+ The IT system is reviewed for compliance with
specifications prior to productive use.
+ The use of productive data for testing purposes is
avoided as far as possible (if applicable,
anonymization or pseudonymization):
- Where productive data are used for testing
purposes, it shall be ensured that the test system is
provided with protective measures comparable to
those on the operational system,
- Requirements for the lifecycle of test data (e.g.
deletion, maximum lifetime on the IT system),
- case-related specifications for the generation of
test data are defined.
+ Requirement specifications are prepared. The
following aspects are considered:
- The determined information security
requirements.
- Vendor recommendations and best practices for
secure configuration and implementation
- Publically available best practice guidelines
- Commonly known risks such as OWASP Top 10
- fail safe (graceful handling of failure)
+ Requirement specifications are reviewed against
the information security requirements.
+ The IT system is reviewed G73for compliance with
specifications prior to productive use.
+ The use of productive data for testing purposes is
avoided as far as possible (if applicable,
anonymization or pseudonymization):
- Where productive data are used for testing
purposes, it shall be ensured that the test system is
provided with protective measures comparable to
those on the operational system,
- Requirements for the lifecycle of test data (e.g.
deletion, maximum lifetime on the IT system),
- case-related specifications for the generation of
test data are defined.
ENX WG ISA and VDA Working Group Information
Securtiy of this document wish you every success.
The authors of this document wish you every
success.
Data Protection
Policies and Organization
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Data Protection
9 Objective
This questionnaire supplements the ISA information s
Information Security
all
ISA4
ISA4
Remove ISA4 columns
Information Security
1.3.4
W to AB
as baseline software installation of the operating
systems designed for the purpose and drivers and
firmware for the used hardaware with well-known
licensing terms. However, to gain the trust the
vendor and distributor must have an excellent
reputation.
All other software is individiually
approved. Depending on the risk profile, this may
include not only testing but also careful analysis of
available documentation (or even a technical audit
of the functionality of a specific software). Change
logs for software wil
Updated software will regularly inherit the approval
of previous versions for minor software versions.
However, the organization will actively monitor
release notes and (if available) relevant other
sources to detect changes that might require a re-
evaluation. Major software versions always require
re-evaluation before approval.
Typical Questions
What is your strategy when it comes to software
approval?
Do you differentiate approval on protection need or
usage scenario?
What software is currently approved for working
with a specific protection need?
How does your software approval process work?
For what use case is software A approved?
Where can i see what software is installed on a
specific client or server?
How does the software repository work? How do
users and/or administrators access it to install
software?
Typical Evidence:
Process documentation for approval process
Exports of lists of approved software from software
repositories
Screenshots from software management software
(such as MDM)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Information Security
1.1.1
Should
+ These policies (or extracts thereof) are provided t
-
Information Security
1.5.2
New column "Additi
-
Information Security
5.2.6
Control Question
Information Security
5.2.6
Objective
Information Security
5.2.6
Must
Information Security
all
Reference to other -
NIST CSF 1.1
+ In case of fundamental changes, audits are
conducted by an independent and appropriately
qualified entity (i.e., external entities or special
internal departments which are objective,
competent and free from undue influence
(independent)
- Findings and implementation of corrective
actions is tracked by the independent entity.
To what extend are IT systems technically checked
(system audit) ?
To what extent are IT systems
and services
technically checked (system
and service
audit)?
The objective of technical checks is the detection of
states which can jeopardize the availability,
confidentiality or integrity of IT systems.
The objective of technical checks is the detection of
states which can jeopardize the availability,
confidentiality or integrity of IT systems
and
services
.
+ Requirements for auditing IT systems are
determined.
+ The scope of the system audit is specified in a
timely manner.
+ System audits are coordinated with the operator
and users of the IT systems.
+ The results of system audits are stored in a
traceable manner and reported to the relevant
management.
+ Measures are derived from the results.
+ Requirements for auditing IT systems
or services
are determined.
+ The scope of the system audit is specified in a
timely manner.
+ System
or service
audits are coordinated with the
operator and users of the IT systems or
services
.
+ The results of system
or service
audits are stored
in a traceable manner and reported to the relevant
management.
+ Measures are derived from the results.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
6b
Reason for change/comment (opt)
ISA/IEC 62443-2-1 ORG 1.1
Policy should integrate OT and IT
ISA/IEC 62443-2-1 ORG 1.5
OT security roles to be considered
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
NIST 800-53 Mapping
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
ISA/IEC 62443-2-1 ORG 2.1
Expand security risk assessment to
production environment
ISA/IEC 62443-2-1 ORG 1.4
Example groups in OT for security
awareness training
ISA/IEC 62443-2-1 NET 3.1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
NIST 800-53 Mapping
ISA/IEC 62443-2-1 USER 1.15
NIST 800-53 Mapping
NIST 800-53 Mapping
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
To what extent are IT systems and
service technically checked (system
and service audit)?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
ISA/IEC 62443-2-1 NET 2.1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Redefine IT systems to include
OT/IACS
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
ISA/IEC 62443-2-1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
ISA/IEC 62443-2-1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
ISO22361
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
OEM als Begriff in "Definitions"
entfernen, Änderung des Begriffs
im Bereiche PTS (Neudef.)
all references added based on the
analysis from the OT group
old wording updated to ISO
27001:2013 and added
27001:2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Ergänzung zu Change Nr. 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
o the French Law of 1901, registered under No. w923004198 at the Sous-préfecture of Boulogne-Billancourt, France
Now everything is in chapter 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
security TAB with data protection. In order to obtain an effective verification of compliance to data protection, the information security questionnaire must be checked.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
INTERNAL
#
DD.MM.YYYY
|
Responsible Department for filing: xxxx-xx
|
CSD-class: xx.x – xx years |
Author
_x000D_
#
not public
Therefore, the sole examination of the data protection module cannot lead to a valid result.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help