ISO 27001 controls: What is Annex A:6?
Explore ISO 27001 Annex A:6 to boost your organisation’s information security and compliance. Learn key...
The A:8 clause of Annex A in ISO 27001 focuses on managing your business’s assets. It outlines a set of valuable requirements that any business must meet to maintain a robust information security system. The objective of Annex A:8 is to identify information assets within the management system’s scope and ensure accountability. Organisations should recognise that all assets need to be managed in an integrated and universal manner. For example:
An organisation should identify assets relevant to the lifecycle of information and document their importance. The lifecycle of information includes creation, processing, storage, transmission, deletion, and destruction. Documentation should be maintained in dedicated or existing inventories as appropriate. The asset inventory should be accurate, up to date, consistent, and aligned with other inventories. For each identified asset, ownership should be assigned and the classification identified. Compiling an inventory of assets is a crucial prerequisite for risk management.
Individuals or entities with approved management responsibility for the asset lifecycle qualify to be assigned as asset owners. A process to ensure timely assignment of asset ownership is usually implemented. Ownership should be assigned when assets are created or transferred to the organisation. The asset owner should be responsible for the proper management of an asset throughout its lifecycle. The asset owner should:
Rules for the acceptable use of information and assets associated with information and information processing facilities should be identified, documented, and implemented.
Employees and external party users who use or have access to the organisation’s assets should be made aware of the information security requirements. They should be responsible for their use of any information processing resources and any such use carried out under their responsibility.
All employees and external party users should return all organisational assets in their possession upon termination of their employment, contract, or agreement.
The termination process should be formalised to include the return of all previously issued physical and electronic assets owned by or entrusted to the organisation. In cases where an employee or external party user purchases the organisation’s equipment or uses their own personal equipment, procedures should ensure all relevant information is transferred to the organisation and securely erased from the equipment. Important knowledge for ongoing operations should be documented and transferred to the organisation.
To ensure that information receives an appropriate level of protection in accordance with its importance to the organisation.
Classifications and associated protective controls for information should consider business needs for sharing or restricting information, as well as legal requirements. Owners of information assets should be accountable for their classification. The classification should be included in the organisation’s processes, consistent and coherent across the organisation. An example of an information confidentiality classification scheme could be based on four levels:
a) Disclosure causes no harm. b) Disclosure causes minor embarrassment or minor operational inconvenience. c) Disclosure has a significant short-term impact on operations or tactical objectives. d) Disclosure has a serious impact on long-term strategic objectives or puts the organisation’s survival at risk.
Procedures for information labelling need to cover information and its related assets in physical and electronic formats. The labelling should reflect the classification scheme established in A.8.2.1. The labels should be easily recognisable. Procedures should provide guidance on where and how labels are attached, considering how the information is accessed or the assets are handled depending on the types of media. Classified assets are easier to identify and accordingly, to steal by insiders or external attackers.
Procedures for handling assets should be developed and implemented in accordance with the information classification scheme adopted by the organisation.
Procedures should be drawn up for handling, processing, storing, and communicating information consistent with its classification. The following items should be considered:
To prevent unauthorised disclosure, modification, removal, or destruction of information stored on media.
Procedures should be implemented for managing removable media in accordance with the classification scheme adopted by the organisation. The following guidelines should be considered:
Media should be disposed of securely when no longer required, using formal procedures. The procedures for the secure disposal of media containing confidential information should be proportional to the sensitivity of that information. The following items should be considered:
Media containing information should be protected against unauthorised access, misuse, or corruption during transportation. The following guidelines should be considered to protect media containing information being transported:
For more guidance and support on achieving ISO 27001 certification and understanding Annex A:8, contact Citation Certification today. We provide comprehensive support and training to help your organisation meet all necessary requirements and achieve compliance with ISO 27001 standards.