Save 20% on accredited ISO 27001 course exams.
Limited-time offer – ends July 18, 2024
Use promo code:

Characteristics of online tools for ISO 27001 security incidents

Unfortunately, security incidents cannot be avoided – no matter how hard you try, something will always happen that will damage your information.

ISO 27001, a leading information security standard, requires you to record all the security incidents – but why is this needed, and what is the best way to do it? If you are looking for some helpful ISO 27001 incident managements tools, here is the answer.

ISO 27001 requirements regarding security incidents

ISO 27001 defines a security incident as an unwanted event that could endanger the confidentiality, integrity, or availability of information, whereas an event is any kind of technical occurrence or an activity that could indicate a possible breach of data.

The requirements of this standard for security incidents are numerous – according to section A.16 from ISO 27001, a company needs to:

  • define responsibilities for handling incidents
  • report all events and vulnerabilities that could turn into incidents
  • set up a process of decision making on how to assess the events
  • define the procedure for response to incidents
  • learn from incidents, and thereby prevent future incidents from happening
  • collect all the evidence that might be relevant for an incident

See this article to learn more: How to handle incidents according to ISO 27001 A.16.

Characteristics of online tools for ISO 27001 security incidents - Advisera

What should an ISO 27001 incident management tool have?

When thinking about what kind of tool would be needed to handle incidents in compliance with ISO 27001, such tool should have the following characteristics:

  1. It should enable the definition of responsibilities through various policies and procedures, but also responsibilities for a particular incident.
  2. It should enable the recording of all events, vulnerabilities, and incidents, including all details for making an assessment and notification of responsible persons.
  3. It should enable the definition of a checklist of activities that need to be performed in order to resolve an incident, and notification of all persons regarding who needs to do what.
  4. It should be able to record all the details related to an incident, and enable the collaboration necessary to learn from the incident.

How does this look in practice?

Here’s how we implemented incident management in Conformio, a Software-as-a-Service tool focused on compliance with ISO 27001. During the ISO 27001 implementation, Conformio wizards will guide you in the creation of an Incident Management Procedure compliant with ISO 27001 requirements. Additionally, there is a folder called “Policies and Procedures,” where a company can upload all of its internal rules, including those related to incident management – such documents can be shared easily with other employees in the company:

Incident Management Procedure
Figure 1. Incident Management Procedure

All incidents, as well as events and/or vulnerabilities, are recorded in the Incident Register – here’s what an overview of all the items looks like:

Incident register overview
Figure 2. Incident register overview

Once you open a particular item, then you can see various fields like status, date/time, type of incident, description, classification, related risks, etc.:

Overview on Incident items
Figure 3. Overview on Incident items

In the “assigned to” field, you can define who is responsible for the incident and which tasks need to be performed, and you can also communicate with members of your team; you can also upload the files with relevant analysis, add related risks, if any, and, in case you need something more systematic, you can define corrective actions, involving actions to fix incident impact, investigate and solve root causes, and perform disciplinary actions if needed:

Edit incident details
Figure 4. Edit incident details

Convenience of an online ISO 27001 incident management tool

Of course, you can do all of this using a combination of emails, internal documents stored on, e.g., Dropbox, records of events, vulnerabilities, and incidents stored in some help desk tool, defining tasks in a task management tool like Asana, collaborating through, e.g., Slack . . .

But you see where I’m going: why deal with such important issues through numerous tools? Incidents are enough trouble on their own, so handling them through one tool makes it at least a little bit easier.

Advisera Rhand Leal

Rhand Leal

Rhand Leal has more than 15 years of experience in information security, and for six years he continuously maintained а certified Information Security Management System based on ISO 27001. Rhand holds an MBA in Business Management from Fundação Getúlio Vargas. Among his certifications are: ISO 27001 Lead Auditor, ISO 9001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and others. He is a member of the ISACA Brasília Chapter.
Read more articles by Rhand Leal