ISO IEC 27001 2005



ISO IEC 27001 2005 is now OBSOLETE. Please see ISO IEC 27001 2013.

The following material presents a brief information security management
system development plan
. It summarizes the general approach you would
take to develop your own unique ISMS. It uses a PDCA approach and is
taken directly from our Plain English version of the standard. If you use
our Plain English standard to develop your organizationís ISMS, you
will automatically take the following steps:

  1. Define the scope and boundaries of your ISMS.

  2. Define your organizationís ISMS policy.

  3. Define your approach to risk management.

  4. Identify your organizationís security risks.

  5. Analyze and evaluate your security risks.

  6. Identify and evaluate your risk treatment options.

  7. Select control objectives and controls to treat risks.

  8. Prepare a detailed Statement of Applicability.

  9. Develop a risk treatment plan to manage your risks.

  10. Implement your organizationís risk treatment plan.

  11. Implement your organizationís security controls.

  12. Implement your organizationís educational programs.

  13. Manage and operate your organizationís ISMS.

  14. Implement your organizationís security procedures.

  15. Use procedures and controls to monitor your ISMS.

  16. Use procedures and controls to review your ISMS.

  17. Perform regular reviews of your organizationís ISMS.

  18. Verify that your security requirements are being met.

  19. Review your risk assessments on a regular basis.

  20. Review your residual risks on a regular basis.

  21. Review acceptable levels of risk on a regular basis.

  22. Perform regular internal audits of your ISMS.

  23. Perform regular management reviews of your ISMS.

  24. Update your organizationís information security plans.

  25. Implement ISMS improvements.

  26. Take appropriate corrective actions.

  27. Take appropriate preventive actions.

  28. Communicate ISMS changes to interested parties.

  29. Establish records that document your decisions.

  30. Document your organizationís ISMS.

  31. Protect and control your ISMS documents.

  32. Establish records for your organizationís ISMS.

  33. Maintain records for your organizationís ISMS.

To see a detailed version of the above ISMS development plan, please
see our plain English ISO IEC 27001 2005 standard (Parts 4 to 8).

Of course, you may already have an existing ISMS. If this is true, you donít
need to follow a detailed ISMS development plan. You would probably find
it easier and more efficient to use a gap analysis approach, instead. If you
already have an existing ISMS, a gap analysis is more targeted and more
efficient because it ignores areas that already comply with the standard.

A gap analysis would compare your existing ISMS with the ISO IEC 27001
requirements. Such a comparison would pinpoint the areas that fall short
of the standard (the gaps). By focusing on filling your unique information
security gaps, you will soon comply with the ISO IEC 27001 standard.

ISO IEC 27001 2013 PAGES

Introduction to ISO IEC 27001 2013

Plain English Outline of ISO IEC 27001 2013

Plain English Overview of ISO IEC 27001 2013

ISO IEC 27000 2014 Definitions in Plain English

ISO IEC 27001 2013 Translated into Plain English

ISO IEC 27001 2005 versus ISO IEC 27001 2013

Introduction to ISO IEC 27001 2013 Annex A

Information Security Gap Analysis Tool

ISO IEC 27002 2013 PAGES

ISO IEC 27002 2013 Introduction

Overview of ISO IEC 27002 2013 Standard

Information Security Control Objectives

How to Use ISO IEC 27002 2013 Standard

ISO IEC 27002 2013 versus ISO IEC 27002 2005

ISO IEC 27002 2013 Translated into Plain English

ISO IEC 27002 2013 Information Security Audit Tool

Plain English ISO IEC 27002 2013 Security Checklist

Updated on May 9, 2014. First published on June 14, 2006.

Home Page

Our Libraries

A to Z Index

Our Customers

How to Order

Our Products

Our Prices

Our Guarantee

Praxiom Research Group Limited        780-461-4514

Legal Restrictions on the Use of this Page
Thank you for visiting this webpage. You are welcome to view our material as often as
you wish, free of charge. And as long as you keep intact all copyright notices, you are also
welcome to print or make one copy of this page for your own personal, noncommercial,
home use. But, you are not legally authorized to print or produce additional copies or to
copy and paste any of our material onto another web site or to republish it in any way.

Copyright © 2006 - 2014 by Praxiom Research Group Limited. All Rights Reserved.

Praxiom Research Group Limited