{"id":25,"date":"2013-07-13T05:14:00","date_gmt":"2013-07-13T05:14:00","guid":{"rendered":""},"modified":"2022-04-06T20:24:08","modified_gmt":"2022-04-06T20:24:08","slug":"simplifying-iso-27001-clause-a-10-10","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2013\/07\/13\/simplifying-iso-27001-clause-a-10-10\/","title":{"rendered":"Simplifying ISO 27001 Clause A.10.10"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\">\n<div style=\"background-color: white; color: #000099; font-family: verdana, sans-serif; font-size: small; text-align: justify;\">Clause A.10.10 revolves around monitoring with the objective of detecting unauthorized information processing activities. &nbsp;Though there can be many ways to do the same, &nbsp; automation is the most preferred way to do so owing to the size and amount of logged data. &nbsp;It becomes humanly insane task to review logs manually.<\/div>\n<div style=\"background-color: white; color: #000099; font-family: verdana, sans-serif; font-size: small; text-align: justify;\"><\/div>\n<div style=\"background-color: white; color: #000099; font-family: verdana, sans-serif; font-size: small; text-align: justify;\">But when I look at the various sub clauses of the Standard, I tend to infer the following points &#8211;&nbsp;<\/div>\n<div style=\"background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px;\">\n<ol>\n<li style=\"margin-left: 15px; text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\">It is not mandatory to have an SIEM or any automated solution for real time log collection and Analysis. &nbsp;Clause A.10.10.1 states &#8211; &#8220;Audit Logs recording User Activities, exceptions, and information security events shall be produced and kept for an agreed period to assist in future investigations and access control monitoring.&#8221; &nbsp;That means logging is important whether or not you do it real time is not compulsory. &nbsp;<u>A review is indeed required.<\/u><\/span><\/li>\n<li style=\"margin-left: 15px; text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\">Added to the above is Clause A.10.10.2 stating &#8211; &#8220;Procedures for monitoring use of information processing facilities shall be established and the results of the monitoring activities reviewed regularly&#8221;. Going by this the standard is not asserting on Automated or manual process, the organization may choose to do it manually or automate it depending on the business requirements. &nbsp;If in your procedures you mention out that the activity would be done on a manual basis, it would be fine as long as you can evidence that the logs are being reviewed and monitoring is being conducted with regular reports rolling.<\/span><\/li>\n<li style=\"margin-left: 15px; text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\">Nothing in ISO 27001 is mandatory. &nbsp;Not even the clause A.10.10, You may choose or not choose a control to adopt it and develop the &#8220;Statement of Applicability&#8221; limiting&nbsp;the Scope and extent of adopting ISO 27001 standard. &nbsp;The scope may be limited to geographic locations, systems, facilities, departments, personnel involved, operations etc. &nbsp;However, due caution needs to be taken while <u>developing the Statement of Applicability to provide a valid business driven reason to exclude any of the controls and related scope<\/u>. &nbsp;Be cautious that Auditors may call out the inter-dependencies of the systems and or operations citing the touch points and may therefore press that their is a non-conformity.<\/span><\/li>\n<\/ol>\n<div style=\"text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\">Overall, specifically with regards to the clause A.10.10, I see no problem with the manual approach as long as it is duly documented and followed. Auditors generally would tend to call out a &#8220;Need For Improvement&#8221; in their observations and there would be time given till re-certification Audit. &nbsp;It hence would be appropriate to define a plan and lay-out a way forward to achieve automation over a period of time. &nbsp;Auditors would be fine if they see that their is an intent to achieve and they would then Audit accordingly.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\"><br \/><\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"color: #000099; font-family: verdana, sans-serif;\">As I conclude, please note that ISO 27001&nbsp;<u>doesn&#8217;t tell you How to do it<\/u>. The standards&nbsp;<u>lays out What is to be done<\/u>&nbsp;and that too from the Best Practice standpoint.<\/span><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Clause A.10.10 revolves around monitoring with the objective of detecting unauthorized information processing activities. &nbsp;Though there can be many ways to do the same, &nbsp; automation is the most preferred way to do so owing to the size and amount of logged data. &nbsp;It becomes humanly insane task to review logs manually. But when I &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,32,33],"tags":[],"class_list":["post-25","post","type-post","status-publish","format-standard","hentry","category-a-10-10","category-iso-27001","category-logging-monitoring","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/25\/revisions"}],"predecessor-version":[{"id":79,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/25\/revisions\/79"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}