Overview
  • ISO 27001 is the world’s most popular information security standard for organizations to achieve and demonstrate ongoing security compliance.
  • ISO 27001 has 140 individual requirements each of which needs to be implemented to get certified. Implementation involves setting objectives, policies, procedures, risk assessment, technology deployment, audits and ongoing measurement program.
  • We have a well-defined implementation methodology that ensures the implementation and certification will reduce cyber security risks, and security in everything that a business does.
  • In Coral we have implemented ISO 27001 for companies across the world, covering almost all industry sectors.
  • For startups, and small and medium enterprises, ISO 27001 implementation can be achieved within 3-4 months. For larger organisation the time period can be determined generally post a gap analysis.
  • In Coral we help clients to get certified first and then if needed help them manage their ISMS program.

Kindly share your details for ISMS requirements

Captcha
Information  Security Management System
WHAT IS ISO 27001: 2013?

The standard is divided into management system controls and annexure controls

Key Processes include the followings

Management System Controls (Clause 4 to 10)

  • Clause 4. Organisational Context
  • Clause 5 - Leadership
  • Clause 6 - Planning
  • Clause 7 - Support
  • Clause 8 - Operation
  • Clause 9 - Performance Evaluation
  • Clause 10 - Improvement

Annexure Controls (14 domains 35 control objectives and 114 detail controls)

  • A.5 Security Policies
  • A.6 Organization of Information Security
  • A.7 Human Resource Security
  • A.8 Asset Management
  • A.9 Access Control
  • A.10 Cryptography
  • A.11 Physical & Environmental Security
  • A.12 Operations Security
  • A.13 Communications Security
  • A.14 System Acquisition, Development & Maintenance
  • A.15 Supplier Relationships
  • A.16 Information Security Incident Management
  • A.17 Information Security Aspects of Business Continuity Management
  • A.18 Compliance
Our Approach to Successful ISMS - ISO 27001 Implementation

We bring our world-class experience in delivery ISMS ISO 27001 implementation leading to successful certification.

PHASE I - Understanding Business and Security Objectives

Understanding the business context and ISMS context.

PHASE II - Gap Analysis and Risk Assessment

Detail risk assessment/gap analysis that includes asset identification, risk assessment, and existing control identification. As a result of new ISO 31000 requirement, we provide three dimensions of risk management.

PHASE III - Design and Documentation

Design - In this phase we help create a framework of compliance for the organisation, in which every team in the scope has their respective controls, policies/procedures, access control, business/security transactions and communication methods.

PHASE IV - Tracking

4 Dimensional Tracking - We track your risks, we track your documentation, we track accountability of controls, and completion of individual ISO 27001 controls.

PHASE V - Control Measurement

Performance Monitoring - We determine whether the controls that are documented are performing using a 0-100% score.

PHASE VI - Internal Audit

Internal Audit involves verifying the effectiveness of the implemented controls through interviews and checking of all applicable controls.

PHASE VII - External Certification Support

ISO 27001 Registration body certification. This has is two stages:
1 - documentation, and
2 - implementation verification.

We support you in all the above phases to build a comprehensive ISMS.
Training

We provide bespoke training, listed below are our offerings.

  • Shorter Sessions from 1 hour to 4 hours
  • Interpretation of the ISO 27001 requirements
  • 1 Day Awareness Session
  • 2 Days Internal Audit Course
  • 3 Days Implementation Course covering 10+ hands on exercises

Upon receiving your request, we will provide you further details.

Documentation Toolkit

ISO 27001 requires documentation of policies, procedures and records. As a result of several consulting assignments, we have some of the best content available that covers all the requirements.

Our documentation has the following salient features:

  • Alignment with all ISO 27001-documentation requirements
  • Our experiences turned into documentation templates
  • Project Tracking tools to support the implementation
  • Q & A support

Upon receiving your request, we will provide you further details.

Internal Audit

An independent assessment helps to assess the state of compliance. Our internal audit methodology includes people, process, technology and measurements to assure and provide management the degree of ISO 27001 compliance. Typically 3-5 days is required to perform a comprehensive internal audit.

Upon receiving your request, we will provide you further details.

Annual Risk Assessment

Risk Assessment is a mandatory requirement for achieving and maintaining ISO 27001. We have one of the most comprehensive risk assessments that comprises asset, controls and security policy objective wise risk assessment. Let us know if you are interested.

Upon receiving your request, we will provide you further details.

Program Management

Our consulting methodology experience has helped us to understand – what it takes to design and maintain a successful ISO 27001 compliance. ISO 27001 Program managemen removes the compliance responsibility to an external team, whereas the management focuses on customer/business delivery.

We currently manage program management for customers who has one location to another set of customers who have more than 8 locations worldwide

Upon receiving your request, we will provide you further details.

Information Security ‘measurement’ System

We have a successful framework for measurement of ISMS. The measurements checks ISMS objectives, as well as control wise objectives to provide you a scoring method applied. The measurements help the organisation provide a performance analysis and take actions proactively.

Upon receiving your request, we will provide you further details.

Call or write to us at :
for proposal / roadmap / information