ISO 27002:2022 Control 5.33 – Best Practices for Record Protection
Records are a nebulous concept that some organisations struggle to classify and manage, for compliance purposes.
Records, within the scope of ICT, are another term for the data and information an organisation retains and/or uses to carry out its day to day business activities, including (but not limited to):
- Individual events
- Transactions
- Work processes
- Activities
- Functions
ISO defines records in the scope of their standards as “any set of information, regardless of its structure or form”, including “a document, a collection of data or other types of information which are created, captured and managed in the course of business”, including a record’s metadata.
Purpose of Control 5.33
Any organisation has an obligation to ensure that the data it holds – including but not limited to any persons, financial information or areas of operation – is kept safe and secure, and internal procedures remain compliant with all prevailing requirements.
Control 5.33 deals with the protection of business records against 5 major events:
- Loss
- Destruction
- Falsification
- Unauthorised access
- Unauthorised release or publication
Attributes Table
Control 5.33 is a preventive control that maintains risk by creating guidelines and procedures – including retention schedules – that fulfil an organisation’s legal, statutory, regulatory and contractual requirements relating to the protection and availability of any records that it holds.
Control Type | Information Security Properties | Cybersecurity Concepts | Operational Capabilities | Security Domains |
---|---|---|---|---|
#Preventive | #Confidentiality | #Identify | #Legal and Compliance | #Defence |
#Integrity | #Protect | #Asset Management | ||
#Availability | #Information Protection |
Get an 81% headstart
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
General Guidance on Control 5.33
Control 5.33 acknowledges that an organisation’s needs are fluid when it comes to the amount and type of records that are required to do business from one day to the next.
As such, Control 5.33 categorises record management into 4 main attributes:
- Authenticity
- Reliability
- Integrity
- Useability
Within the scope of these attributes, Control 5.33 asks organisations to:
- Draft and publish guidelines that deal with four main functions, alongside topic-specific policies that caters to the underlying nature of the records in question:
a) Record storage
b) Record handling chain of custody
c) Record disposal
d) Preventing manipulation - Maintain a functional records retention schedule that clearly outlines the length of time that records of differing types should be retained, relating to their individual business function.
- Create storage and handling procedures that take into account:
a) any prevailing laws that deal with commercial record keeping
b) “community and societal” expectations of how an organisation should handle its records - Implement procedures that destroy records in a safe and appropriate manner the moment they’re not needed (after leaving the retention period).
- Classify records for protection (including appropriate retention periods and storage media used) based on their security risk, and various types, including (but not limited to):
a) Accounting records
b) Business transactions
c) Personnel records
d) Legal records - Ensure that any storage procedures cater for an acceptable timeframe for retrieval, should the organisation be asked to produce them by a third party, or for internal use.
- Where electronic media is used to store records, consider and mitigate the possibility of access to or retrieval of records being inhibited by technological amendments, including the retention of cryptographic information (see Control 8.24).
- Adhere to manufacturer guidelines when storing or handling records on or via electronic media, including adequate consideration for the natural deterioration of said media.
Compliance doesn't have to be complicated.
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
Changes and Differences from ISO 27002:2013
27002:2022-5.33 replaces 27002:2013-18.1.3 (Protection of records), with various additions in the form of individual guidance points and general processes that need to be adhered to.
In the 2022 control, ISO acknowledge the importance of defining what constitutes a business record. 27002:2022-5.33 contains numerous examples of what ISO considers a record to be (see above), that are absent from 27002:2013-18.1.3.
Control 5.33 also focuses an organisation’s attention on two main guidance points that aren’t contained in its 2013 counterpart (guidelines 1 and 2 above), which in turn form the basis of an organisation’s record policy – in particular, a retention schedule that dictates how long records should be kept for, and any media-specific requirements.
Metadata has also made an appearance in records management for the first time. 27002:2013-18.1.3 contains no mention of it, whereas 27002:2022-5.33 considers it to be an “essential component”.
New ISO 27002 Controls
New Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
5.7 | New | Threat intelligence |
5.23 | New | Information security for use of cloud services |
5.30 | New | ICT readiness for business continuity |
7.4 | New | Physical security monitoring |
8.9 | New | Configuration management |
8.10 | New | Information deletion |
8.11 | New | Data masking |
8.12 | New | Data leakage prevention |
8.16 | New | Monitoring activities |
8.23 | New | Web filtering |
8.28 | New | Secure coding |
Organisational Controls
People Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
6.1 | 07.1.1 | Screening |
6.2 | 07.1.2 | Terms and conditions of employment |
6.3 | 07.2.2 | Information security awareness, education and training |
6.4 | 07.2.3 | Disciplinary process |
6.5 | 07.3.1 | Responsibilities after termination or change of employment |
6.6 | 13.2.4 | Confidentiality or non-disclosure agreements |
6.7 | 06.2.2 | Remote working |
6.8 | 16.1.2, 16.1.3 | Information security event reporting |
Physical Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
7.1 | 11.1.1 | Physical security perimeters |
7.2 | 11.1.2, 11.1.6 | Physical entry |
7.3 | 11.1.3 | Securing offices, rooms and facilities |
7.4 | New | Physical security monitoring |
7.5 | 11.1.4 | Protecting against physical and environmental threats |
7.6 | 11.1.5 | Working in secure areas |
7.7 | 11.2.9 | Clear desk and clear screen |
7.8 | 11.2.1 | Equipment siting and protection |
7.9 | 11.2.6 | Security of assets off-premises |
7.10 | 08.3.1, 08.3.2, 08.3.3, 11.2.5 | Storage media |
7.11 | 11.2.2 | Supporting utilities |
7.12 | 11.2.3 | Cabling security |
7.13 | 11.2.4 | Equipment maintenance |
7.14 | 11.2.7 | Secure disposal or re-use of equipment |
Technological Controls
How ISMS.online Helps
Using ISMS.online you can:
- Quickly implement an Information Security Management System (ISMS).
- Easily manage the documentation of your ISMS.
- Streamline compliance with all relevant standards.
- Manage all aspects of information security, from risk management to security awareness training.
- Effectively communicate throughout your organisation using our built-in communication functionality.
Get in touch today to book a demo.