ISO27001 Annex A.12 – Operations Security

What is ISO 27001 Annex A.12

Annex A.12 is a standard that helps organisations protect their information assets during the processing, storage, and transportation phases. By following this standard, businesses can ensure the confidentiality, integrity, and availability of their information. This includes implementing measures such as physical and environmental security, secure data transmission, access control, and incident management. Adhering to this standard provides numerous benefits for businesses, including improved protection of sensitive information, reduced risk of data breaches and unauthorised access, increased trust from customers and partners, and enhanced overall security posture. Achieving ISO27001 Annex A.12 compliance demonstrates a commitment to information security and helps organisations stay ahead of potential security threats.

ISO/IEC 27001:2013 Annex A.12 - Operations Security includes the following controls:

A.12.1 Physical and Environmental Security:

This control deals with the protection of information and information processing facilities from physical threats, such as fire, theft, and natural disasters.

How to meet this:

  1. Conduct a risk assessment to identify physical threats to your information processing facilities and information.
  2. Implement security measures to protect against these threats, such as access control, fire suppression systems, and environmental controls.
  3. Train employees on physical security best practices and procedures.
A.12.2 Media Handling:

This control covers the handling of all forms of information storage media, including backups and removable media.

How to meet this:

  1. Develop policies and procedures for the handling of all forms of information storage media.
  2. Ensure that media is stored securely and protected against physical damage, theft, or unauthorised access.
  3. Establish procedures for the safe and secure transport of media, both within and outside the organisation.
A.12.3 Backup:

This control outlines the procedures for creating and maintaining backup copies of information, as well as ensuring the secure storage and retrieval of these backups.

How to meet this:

  1. Develop a backup strategy that covers all critical information and systems.
  2. Schedule regular backups to ensure that current versions of information are available.
  3. Store backups in a secure and off-site location to protect against physical damage or loss.

A.12.4 Protection against Malicious and Mobile Code:

This control is concerned with the protection of information and information processing facilities against malicious software, such as viruses and other types of malware.

How to meet this:

  1. Implement anti-virus and anti-malware software to protect against the spread of malicious software.
  2. Regularly update the software and perform scans to detect any threats.
  3. Train employees on the safe handling of email attachments, downloads, and other sources of malicious software.

A.12.5 Logging and Monitoring:

This control involves the collection and analysis of security-related information generated by information processing systems and networks.

How to meet this:

  1. Implement logging and monitoring systems to capture security-related events and information.
  2. Configure the systems to alert administrators of potential security incidents in real-time.
  3. Regularly review logs to identify trends and potential threats.
A.12.6 Incident Management:

This control outlines the procedures for reporting, investigating, and responding to security incidents.

  1. Develop and implement an incident response plan that covers reporting, investigation, and resolution of security incidents.
  2. Train employees on incident response procedures.
  3. Establish a process for regular review of incident data to identify areas for improvement.
A.12.7 Business Continuity Management:

This control covers the development of plans and procedures to ensure that essential business processes can continue in the event of a disaster or other disruptive event.

  1. Identify essential business processes and the resources required to support them.
  2. Develop plans and procedures to ensure that these processes can continue in the event of a disaster or other disruptive event.
  3. Test the plans and procedures on a regular basis to ensure their effectiveness.

A.12.8 Compliance:

This control ensures that the organization complies with legal and regulatory requirements, as well as with contractual obligations related to information security.

How to meet this:

  1. Stay informed of all relevant legal and regulatory requirements, as well as contractual obligations related to information security.
  2. Implement policies and procedures to ensure compliance with these requirements.
  3. Conduct regular audits to monitor compliance and identify any areas for improvement.

A.12.9 Information Systems Audit:

This control covers the periodic evaluation of the information security controls, policies, and procedures in place to identify any areas for improvement.

  1. Schedule regular information systems audits to evaluate the information security controls, policies, and procedures in place.
  2. Use the results of the audits to identify areas for improvement and prioritize security initiatives.
  3. Incorporate the results of the audits into the continuous improvement process for the information security management system.

Documents, templates, and evidence for meeting the controls within  Annex A.12:

A.12.1 Physical and Environmental Security:
  • Physical security risk assessment report
  • Access control policies and procedures
  • Fire suppression systems test and maintenance records
  • Environmental monitoring and control records
A.12.2 Media Handling:
  • Media handling policies and procedures
  • Media handling logs
  • Inventory of all information storage media
A.12.3 Backup:
  • Backup strategy and procedures
  • Backup logs
  • Records of backup testing and restoration
A.12.4 Protection against Malicious and Mobile Code:
  • Anti-virus and anti-malware software configuration and maintenance records
  • Incident reports related to malicious software
  • Training records for employees on safe handling of software
A.12.5 Logging and Monitoring:
  • Logging and monitoring policies and procedures
  • Log analysis reports
  • Records of log review and trending analysis
A.12.6 Incident Management:
  • Incident response plan
  • Incident reports and investigation records
  • Training records for employees on incident response procedures
A.12.7 Business Continuity Management:
  • Business continuity plan and procedures
  • Records of business continuity testing and exercise
  • Records of business continuity plan updates and revisions
A.12.8 Compliance:
  • Records of legal and regulatory compliance assessments
  • Contracts and agreements related to information security
  • Compliance audit reports
A.12.9 Information Systems Audit:
  • Information systems audit plan
  • Information systems audit reports
  • Records of information systems audit follow-up and improvement actions.

Note: The specific documentation, templates, and evidence required may vary depending on the size, complexity, and nature of the organization and its operations.

Showing evidence to an auditor

Prepare all relevant documents and records:
  • Gather all the relevant documents and records that demonstrate your compliance with the control objectives, such as policies, procedures, risk assessments, incident reports, training records, etc.
Explain the control:
  • Provide a brief explanation of the control and how it is implemented in your organization. This should include a description of the processes, procedures, and technologies used to meet the control objectives.
Present relevant documents and records:
  • Show the auditor the relevant documents and records that support your explanation of the control. This could include copies of policies, procedures, risk assessments, incident reports, training records, etc.
Demonstrate implementation:
  • Provide examples of how the control is implemented in practice, such as a walk-through of the physical security measures, a demonstration of the backup and recovery process, or a review of log analysis reports.
Provide test results:
  • If applicable, provide the results of any tests or assessments that were performed to demonstrate compliance with the control. For example, you could provide the results of anti-virus scans, business continuity testing, or information systems audits.
Answer questions:
  • Be prepared to answer questions from the auditor about the control, the implementation, and the evidence you have provided.

It is important to be organised, concise, and transparent in presenting the evidence to the auditor, and to be able to demonstrate that the control objectives are met consistently and effectively.