Skip to main content
Sep 13, 2018 Craig Thornton

ISO 27001 Information Security Management Standard - Clauses 10.1, 10.2

Part 23 - Clauses 10.1 and 10.2 Nonconformity, corrective action and  continual improvement

Clause 10 of ISO 27001 is the “Act” part of Deming’s Plan-Do-Check-Act cycle. Once you have “checked” the performance of your system (as per Clause 9) you then use Clause 10 to act on the findings.

Meeting this clause will provide real value for your business. When you record non-conformances, implement some great corrective actions and continuously improve how you do things, you are significantly upping your game. Clause 10 is a potential game changer for your business.

Data Controller on Black Control Console with Blue Backlight. Increase, improvement, control or management concept.

10.1 Nonconformity and corrective action

Let’s start with 10.1 Nonconformity and corrective action.

The ISO 27003 guidance document describes the types of non-conformance that you should be recording in your ISMS. There are a shed-load of them:

  1. Failure to fulfil or correctly implement or conform to a requirement, rule or control stated by your ISMS.
  2. Partial or total failure to comply with legal, contractual or agreed customer requirements.
  3. Persons not behaving as expected by procedures and policies.
  4. Suppliers not providing agreed products or services.
  5. Projects not delivering expected outcomes.
  6. Controls not operating according to design.
  7. Deficiencies of activities performed in the scope of the management system.
  8. Ineffective controls that are not re-mediated appropriately.
  9. Analysis of information security incidents, showing the non-fulfilment of a requirement of the ISMS.
  10. Complaints from customers.
  11. Alerts from users or suppliers.
  12. Monitoring and measurement results not meeting acceptance criteria.
  13. Objectives not achieved.

Now that is a lot. And at the start it can seem overwhelming. But once you knock the non-conformances off with great corrective actions, it gets easier and easier.

The secret? Record everything!

For example, here at Mango we record every information security incident reported by the New Zealand Government’s cyber security department CERTNZ. These are things like:

  • malware alerts
  • scams
  • email vulnerabilities
  • device misuse
  • denial-of-service alerts and more.

You should engage with your own country’s cyber security agency and start recording all of the threats to your business.

Next up, you need to put some corrective action in place to correct or protect yourself from these threats or non-conformances.

The guidance standard has some handy steps to address nonconformities. There is always some immediate short-term correction you can take to handle the situation, and these are:

  1. Identify the extent and impact of the nonconformity.
  2. Decide on the corrections in order to limit the impact of the nonconformity. This can include switching to previous, failsafe or other appropriate states. Care should be taken that corrections do not make the situation worse.
  3. Communicate with your staff to ensure that corrections are carried out.
  4. Implement the corrections.
  5. Monitor the situation to ensure that corrections have had the intended effect and have not produced unintended side-effects.
  6. Act further to correct the nonconformity if it is still not remediated.
  7. Communicating with other relevant interested parties.

Now that you have the non-conformance in hand, you can put in some long-term corrective action. Once again ISO 27003 provides valuable advice about corrective actions:

  1. Decide if there is a need to carry out a corrective action. 
  2. Review of the nonconformity to see if similar nonconformities have been recorded.
  3. Conduct a root cause analysis of the nonconformity. I have done a great webinar on this - watch it here.
  4. Analyse of potential consequences on the ISMS.
  5. Determine the actions needed to correct the root cause.
  6. Implement the corrective actions, giving priority, if possible, to areas where there are higher likelihood of recurrence and more significant consequences of the nonconformity.
  7. Assess the corrective actions to determine whether they have actually handled the cause of the nonconformity, and whether it has prevented related nonconformities from occurring.

The standard requires you to keep document information (or records) as evidence that the non-conformities and subsequent actions have been taken, as well as the results of any corrective action that are also taken.

For example, here at Mango we use the Improvement module that has a workflow that records the implementation of corrective action using the stages described above. It makes meeting this clause oh so easy.

10.2 Nonconformity and corrective action

Finally clause 10.2 has a requirement to continuously improve the ISMS.

Here at Mango we are continually talking about the ISMS. It is a topic of discussion in all our processes and all our meetings. It has become second nature.

We are constantly looking at making improvements. It’s a mindset. It’s not just a requirement of our ISMS. It’s what we do around here.

In addition, we have a great forum that we use to get the message to all staff. Our monthly all-staff Management Review meetings discuss all of the ISMS improvements that are happening. This is great for showing leadership, communication, participation and culture. You should try and do the same.

Takeaways

  1. Create a positive culture of reporting improvements.
  2. Willing capture of non-conformances.
  3. Put immediate corrections in place.
  4. Find the root causes.
  5. Deal with the most important root cause with great corrective actions.
  6. Continuously improve your ISMS.

 

View previous blogs in this series "ISO 27001 Information Security Management Standard":

Part 1 - Reasons why you need to meet this standard

Part 2 - Principle 1 - Analysing the Protection of Your Information and then Applying Controls

Part 3 - Principle 2 - Awareness of the Need for Information Security

Part 4 - Principle 3 - Assignment of Responsibility for Information Security

Part 5 - Principle 4 - Incorporating Management Commitment and the Interests of Stakeholders

Part 6 - Principle 5 - Enhancing Societal Values

Part 7 - Principle 6 - Risk assessments determining appropriate controls to reach acceptable levels of risk

Part 8 - Principle 7 - Security incorporated as an essential element of information networks and systems

Part 9 - Principle 8 - Active prevention and detection of information security incidents

Part 10 - Principle 9 - Ensuring a comprehensive approach to information security management

Part 11 - Principle 10 - Continual reassessment of information security and making of modifications as appropriate

Part 12 - ISO 27001 Information Security Management Standard: Clauses 0, 0.1, 0.2, 1, 2 and 3

Part 13 - ISO 27001 Information Security Management Standard: Clauses 4.1, 4.2, 4.3 and 4.4

Part 14 - ISO 27001 Information Security Management Standard: Clause 5.1

Part 15 - ISO 27001 Information Security Management Standard: Clause 5.2

Part 16 - ISO 27001 Information Security Management Standard: Clause 5.3

Part 17 - ISO 27001 Information Security Management Standard: Clause 6.1

Part 18 - ISO 27001 Information Security Management Standard: Clause 6.2

Part 19 - ISO 27001 Information Security Management Standard: Clause 7.1 - 7.4

Part 20 - ISO 27001 Information Security Management Standard: Clause 7.5

Part 21 - ISO 27001 Information Security Management Standard: Clause 8.1, 8.2, 8.3

Part 22 - ISO 27001 Information Security Management Standard: Clause 9.1, 9.2, 9.3

Published by Craig Thornton September 13, 2018