ISO 27001:2013

ISO 27001-A
ISO 27001-B

In today’s business environment, information is the lifeblood for any organization. Increasingly, organizations and their information systems are exposed to security threats from a wide range of sources, including computer assisted fraud, espionage, sabotage, vandalism, fire or flood. Computer viruses, hacking and denial of service attacks have become more common and increasingly sophisticated.
Achieving ISO 27001 significantly minimizes the risk and mitigates the organization against internal human error or misdemeanor.
Successful ISMS compliance and certification requires a methodical approach, careful consideration of scope and a thorough understanding of your information security needs. As one of the pioneers in ISO27001 consulting in Middle East, backed by a team of consultants having sound knowledge and experience of business management systems, T.Q.T Management Consultant Pvt. Ltd. is well placed to advise you on the steps required to ensure that your information security practices conform to those identified in the Standard.

Information Security is the protection of information to ensure:

Confidentially: ensuring that the information is accessible only to those authorized to access it.

Integrity: ensuring that the information is accurate and complete and that the information is not modified without authorization

Availability: ensuring that the information is accessible to authorized users when required. Information security is achieved by applying a suitable set of controls (policies, processes, procedures, organizational structures, and software and hardware functions.)

An Information Security Management System (ISMS) is a management system based on a systematic business risk approach, to establish, implement, operate, monitor, review, maintain, and improve information security. It is an organizational approach to information security. ISO/IEC 27001 (BS 7799) is a standard for information security that focuses on an organization’s ISMS

T.Q.T offers expert consulting services for effective implementation of ISO27001.

Properly scoping an ISO27001 project is an essential first step in any compliance initiative. Our consultants help you identify the business processes critical to your organization and which would be best targeted for initial compliance to the world-wide recognized Standard.

Gap analysis is the next step where our consultants develop a comprehensive report identifying the work required to become compliant as well as an action plan that includes prioritized actions for security improvement.

Risk assessment is a mandatory component of ISO27001 and we’ll help you analyze the levels of information security risk inherent in your business processes. Assessments can be performed.

Our consultants provide whatever level of support you need to implement the required security improvements and are able to suggest practical solutions in each of the different areas of the Standard.

Our consultants will explain both the benefits and the relatively minor, additional costs involved in certification. T.QT can prepare you for certification and help you implement any final changes necessary to your ISMS. Finally, we can assist during the audit process itself by dealing with a certification body on your behalf and addressing any audit observations that arise.

1) Define an information security policy
2) Define scope of the information security management system
3) Perform a security risk assessment
4) Manage the identified risk
5) Select controls to be implemented and applied
6) Prepare an SOA (a “statement of applicability”).