Skip to main content
Feb 25, 2019 Craig Thornton

ISO 27001 Information Security Management Standard - Clause A.12

Part 31 - A12 Operations Security 

This clause in the Annex of ISO 27001 is another really “meaty” clause that gets to the heart of preventing loss or availability, confidentiality and integrity of your information.

The clause is there to ensure that the operations in your information processing facilities are well controlled and well managed.

Close up of business man hand working on laptop computer with social network diagram on wooden desk as concept-1 

A.12.1 Operational procedures and responsibilities 

Firstly this sub-clause has the objective here to ensure you have the correct and secure operations of your information processing facilities.

The standard requires you to cover off the following:

  • Document your operating procedures.
  • Ensure you use change management
  • Conduct capacity management
  • Separate your development, testing and operational environments

Here at Mango this was straight forward. We outsource our information processing facilities to an ISO 27001 certified hosting company. We worked closely with them to ensure all the security protocols were in place and are being managed well. The key here was to work out who is responsible for each step of the process.  As long as that is agreed upon and clearly understood then we couldn’t really go wrong.

 

A.12.2 Protection from malware 

The second sub-clause has the objective to ensure that your information processing facilities are protected against malware.

You need to ensure that you have controls for the detection, prevention and recovery against malware.

This area is crucial because phishing and credential harvesting are the most commonly reported information security threats to your business. We need to seek advice from experts here to make sure you get it right.

Here at Mango we put in a lot of effort with detecting and preventing malware.  We discuss how we handle malware and phishing with the staff on an almost daily basis. It is certainly a topic on the monthly management meeting that all staff attend.

We need to keep on top of the malware and phishing threats because one slip will cause a lot of damage.

 

A.12.3 Backup 

The third sub-clause is all about backups of your information systems. The objective of this sub-clause is to protect against loss of your data.

You need to ensure you have backup copies of your information, software and system images.  The backups need to be taken and tested regularly.

Don’t forget that need to decide whether you need backups of your information.  Some of your information is in the cloud. So make sure you check with your cloud providers on their backup policies.

At Mango our information processing facilities are all backed-up regularly.  This is regularly monitored and tested by our IT staff.

 

A.12.4 Logging and monitoring 

The objective of this sub-clause is to record events and generate evidence that you can use to detect, track and trace the loss of information.

You need to cover off the following:

  • Event logging
  • Protection of log information
  • Administrator and operator logs
  • Clock synchronisation

Here at Mango we have logs in place to track users on our systems and users on our product Mango.  These logs are protected and backups are in place.  Administrator logs are also captured.

 

A.12.5 Control of operational software 

The objective here on this small sub-clause is to ensure to control the installation of software on your operational systems.  This is to ensure your operation systems are not compromised.

Here at Mango all new software must be approved by the Information Security Officer prior to purchase. Then post purchase there is a formal process to ensure the software doesn’t compromise the systems.

 

A.12.6 Technical vulnerability management 

The objective of this sub-clause is to prevent the exploitation of any technical vulnerabilities. The clause covers two areas:

  • Management of technical vulnerabilities
  • Restrictions on software installation

Here at Mango this is a formal discussion point when we develop new features for Mango.  This is also discussed when we make changes to the infrastructure too.

 

A.12.7 Information systems audit considerations 

The objective here is to minimise the impact of audit activities on operational systems. This is reasonably straight-forward but can be overlooked.

 

 

Takeaways

  1. Document your operations security procedures in enough detail to ensure that information processing facilities are well managed.
  2. Ensure you have robust malware procedures in place to meet your needs.
  3. Create backup protocols that protect you from loss of data.
  4. Ensure you have logs as evidence that you can use to detect, track and trace the loss of information.
  5. Have some controls in place to manage when you install new software.
  6. Constantly discuss and analyse for technical vulnerabilities.


View previous blogs in this series "ISO 27001 Information Security Management Standard":

Part 1 - Reasons why you need to meet this standard

Part 2 - Principle 1 - Analysing the Protection of Your Information and then Applying Controls

Part 3 - Principle 2 - Awareness of the Need for Information Security

Part 4 - Principle 3 - Assignment of Responsibility for Information Security

Part 5 - Principle 4 - Incorporating Management Commitment and the Interests of Stakeholders

Part 6 - Principle 5 - Enhancing Societal Values

Part 7 - Principle 6 - Risk assessments determining appropriate controls to reach acceptable levels of risk

Part 8 - Principle 7 - Security incorporated as an essential element of information networks and systems

Part 9 - Principle 8 - Active prevention and detection of information security incidents

Part 10 - Principle 9 - Ensuring a comprehensive approach to information security management

Part 11 - Principle 10 - Continual reassessment of information security and making of modifications as appropriate

Part 12 - ISO 27001 Information Security Management Standard: Clauses 0, 0.1, 0.2, 1, 2 and 3

Part 13 - ISO 27001 Information Security Management Standard: Clauses 4.1, 4.2, 4.3 and 4.4

Part 14 - ISO 27001 Information Security Management Standard: Clause 5.1

Part 15 - ISO 27001 Information Security Management Standard: Clause 5.2

Part 16 - ISO 27001 Information Security Management Standard: Clause 5.3

Part 17 - ISO 27001 Information Security Management Standard: Clause 6.1

Part 18 - ISO 27001 Information Security Management Standard: Clause 6.2

Part 19 - ISO 27001 Information Security Management Standard: Clauses 7.1 - 7.4

Part 20 - ISO 27001 Information Security Management Standard: Clause 7.5

Part 21 - ISO 27001 Information Security Management Standard: Clauses 8.1, 8.2, 8.3

Part 22 - ISO 27001 Information Security Management Standard: Clauses 9.1, 9.2, 9.3

Part 23 - ISO 27001 Information Security Management Standard: Clauses 10.1, 10.2

Part 24 - ISO 27001 Information Security Management Standard: Clause A5

Part 25 - ISO 27001 Information Security Management Standard: Clause A6

Part 26 - ISO 27001 Information Security Management Standard: Clause A7

Part 27 - ISO 27001 Information Security Management Standard: Clause A8

Part 28 - ISO 27001 Information Security Management Standard: Clause A9

Part 29 - ISO 27001 Information Security Management Standard: Clause A10

Part 30 - ISO 27001 Information Security Management Standard: Clause A11

 

Published by Craig Thornton February 25, 2019