Understanding ISO 27701 Clause 6.13: A Guide to Incident Management
Privacy information incident management deals with instances of security events that have been escalated to incidents – in terms of identifying them, resolving them, providing evidence and affecting change via a root cause analysis.
Privacy incidents have the potential to drastically affect an organisations reputation and financial standing. As such, it is vitally important to operate with a robust set of incident management procedures that are easily communicable and well understood by all concerned.
What’s Covered in ISO 27701 Clause 6.13
ISO 27701 clause 6.13 contains 7 sub-clauses that deal with the management of information security incidents and improvements, with each control containing guidance points from ISO 27002, albeit within a privacy protection context:
- ISO 27701 6.13.1.1 – Responsibilities and procedures (ISO 27002 Control 5.24)
- ISO 27701 6.13.1.2 – Reporting information security events (ISO Control 27002 6.8)
- ISO 27701 6.13.1.3 – Reporting information security weaknesses (ISO 27002 Control 6.8)
- ISO 27701 6.13.1.4 – Assessment of and decisions on information security events (ISO 27002 Control 5.25)
- ISO 27701 6.13.1.5 – Response to information security incidents (ISO 27002 Control 5.26)
- ISO 27701 6.13.1.6 – Learning from information security incidents (ISO 27002 Control 5.27)
- ISO 27701 6.13.1.7 – Collection of evidence (ISO 27002 Control 5.28)
Incident management is wide and varied topic, as such, several sub-clauses contain further guidance from associated controls within ISO 27002.
Just one sub-clause (ISO 27701 6.13.1.1) contains information that is relevant to areas of UK GDPR legislation – we’ve provided the article numbers underneath the guidance points, for your convenience.
Get an 81% headstart
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
ISO 27701 Clause 6.13.1.1 – Responsibilities and Procedures
References ISO 27002 Control 5.24
Roles and Responsibilities
In order to create a cohesive, highly functioning incident management policy that safeguards the availability and integrity of privacy information during critical incidents, organisations should:
- Adhere to a method for reporting privacy information security events.
- Establish a series of processes that manage privacy information security-related incidents across the business, including:
- Administration.
- Documentation.
- Detection.
- Triage.
- Prioritisation.
- Analysis.
- Communication.
- Draft an incident response procedure that enables the organisation to assess, respond to and learn from incidents.
- Ensure that incidents are managed by trained and competent personnel who benefit from ongoing workplace training and certification programmes.
Incident Management
Staff involved in privacy information security incidents should understand:
- The time it should take to resolve an incident.
- Any potential consequences.
- The severity of the incident.
When dealing with privacy information security events, staff should:
- Assess events in accordance with a strict criteria that validates them as an approved incidents.
- Categorise privacy information security events into 5 sub-topics:
- Monitoring (see ISO 27002 Controls 8.15 and 8.16).
- Detection (see ISO 27002 Control 8.16).
- Classification (see ISO 27002 Control 5.25).
- Analysis.
- Reporting (see ISO 27002 Control 6.8).
- When resolving privacy information security incidents, organisations should:
- Response and escalate issues (see ISO 27002 Control 5.26) in accordance with the type of incident.
- Activate crisis management and business continuity plans.
- Affect a managed recovery from an incident that mitigates operational and/or financial damage.
- Ensure thorough communication of incident-related events to all relevant personnel.
- Engage in collaborative working (see ISO 27002 Controls 5.5 and 5.6).
- Log all incident managed-based activities.
- Be responsible for the handling of incident-related evidence (see ISO 27002 Control 5.28).
- Undertake a thorough root cause analysis, to minimise the risk of the incident happening again, including suggested amendments to any processes.
Reporting activities should be centred around 4 key areas:
- Actions that need to be taken once an information security event occurs.
- Incident forms that record information throughout an incident.
- End-to-end feedback processes to all relevant personnel.
- Incident reports that detail what’s occurred once an incident has been resolved.
Applicable GDPR Articles
- Article 5 – (1)(f)
- Article 33 – (1), (3)(a), (3)(b), (3)(c), (3)(d), (4), (5)
- Article 34 – (1), (2), (3)(a), (3)(b), (3)(c), (4)
Relevant ISO 27002 Controls
- ISO 27002 5.25
- ISO 27002 5.26
- ISO 27002 5.5
- ISO 27002 5.6
- ISO 27002 6.8
- ISO 27002 8.15
- ISO 27002 8.16
ISO 27701 Clause 6.13.1.2 – Reporting Information Security Events
References ISO 27002 Control 6.8
Organisations need to ensure that privacy information events are reported in a timely and efficient manner.
Staff need to be provided with quick and easy ways to report privacy information events, and need to be fully aware of what constitutes a breach.
Privacy information events can include:
- Ineffective privacy information security controls.
- Breach of information confidentiality, integrity or availability.
- Human error or malicious interventions.
- Non-compliance with privacy information security policies (topic-specific and general).
- Breaches of physical security controls.
- Unauthorised system changes.
- Software malfunctions.
- Physical and logical access violations.
- Miscellaneous vulnerabilities.
- Malware infections (suspected or actual).
Compliance doesn't have to be complicated.
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
ISO 27701 Clause 6.13.1.3 – Reporting Information Security Weaknesses
References ISO 27002 Control 6.8
See ISO 27701 Clause 6.13.1.2
ISO 27701 Clause 6.13.1.4 – Assessment of and Decisions on Information Security Events
References ISO 27002 Control 5.25
Organisations should adopt a qualitative approach to privacy information security incident management that includes 4 key points:
- Drafting a clear categorisation system that escalates privacy information security events to privacy information security incidents.
- Listing a point of contact who assesses privacy information security events using a strict set of classification rules.
- Ensuring that technical personnel are adequately skilled and equipped to resolve privacy information security incidents.
- Logging all conversations and resolution activity for future consideration, and to minimise the risk of similar occurrences.
ISO 27701 Clause 6.13.1.5 – Response to Information Security Incidents
References ISO 27002 Control 5.26
Organisations should ensure that privacy information security incidents are dealt with by a dedicated technical team with the skills and resources to affect a prompt resolution (see ISO 27002 Control 5.24).
Organisations should:
- Contain any privacy-related threats arising from the original issue.
- Collect a body of evidence throughout the resolution process.
- Include escalation, BUDR activities and continuity planning in any resolution efforts (see ISO 27002 Controls 5.29 and 5.30).
- Log all incident-related activity.
- Ensure that staff operate on a “need to know” basis when dealing with privacy information incidents.
- Be continually mindful of an their responsibilities to their customers and external organisations, when communicating privacy information incidents and data breaches.
- Close incidents to a rigid set of resolution criteria.
- Undertake forensic analysis (see ISO 27002 Control 5.28), as and when required.
- Seek to establish the underlying cause of an incident, once it’s been resolved (see ISO 27002 Control 5.27).
- Take remedial action on any associated processes, controls, policies and procedures, to bolster organisational privacy protection once an incident has been resolved.
Applicable GDPR Articles
- Article 33 – (1), (2), (3)(a), (3)(b), (3)(c), (3)(d), (4), (5)
- Article 34 – (1), (2)
Relevant ISO 27002 Controls
- ISO 27002 5.24
- ISO 27002 5.27
- ISO 27002 5.28
- ISO 27002 5.29
- ISO 27002 5.30
ISO 27701 Clause 6.13.1.6 – Learning From Information Security Incidents
References ISO 27002 Control 5.26
Organisations should should create incident management procedures that deal with three main elements of privacy information security incidents:
- Incident type.
- Estimated volume.
- Projected cost.
Privacy information security incidents should benefit from procedures that:
- Bolster the organisation’s existing incident management framework (see ISO 27002 Control 5.24).
- Enhance the organisation’s privacy information risk assessment processes.
- Improved user awareness – this can be achieved by providing real-world examples of scenarios and how to handle them.
Relevant ISO 27002 Controls
- ISO 27702 5.24
Manage all your compliance in one place
ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.
ISO 27701 Clause 6.13.1.7 – Collection of Evidence
References ISO 27002 Control 5.28
Organisations should collect evidence surrounding incident activity with the express purpose of fulfilling their legal, regulatory, contractual and disciplinary obligations.
Evidence collection efforts should ensure that multiple regulatory and law-making bodies are able to scrutinise incident activity using (but not limited to):
- Storage media.
- Assets and devices.
- Device status.
Organisations shouldn’t make any assumptions on what evidence they need to collect – especially where privacy information is concerned – and organisations should involve legal authorities at the earliest opportunity if in any doubt about what needs to occur.
When providing evidence to external bodies, organisations should demonstrate that:
- Incident records are complete and free from interference.
- Electronic evidence mirrors its physical counterpart.
- ICT systems had the ability to adequately record all relevant evidence.
- Technical staff involved in evidence collections are suitably qualified and competent enough to carry out their role.
- They have the legal ability to collect evidence.
Supporting Controls From ISO 27002 and GDPR
ISO 27701 Clause Identifier | ISO 27701 Clause Name | ISO 27002 Requirement | Associated GDPR Articles |
---|---|---|---|
6.13.1.1 | Responsibilities and Procedures |
5.24 – Information Security Incident Management Planning and Preparation for ISO 27002 |
Articles (5), (33), (34) |
6.13.1.2 | Reporting Information Security Events |
6.8 – Information Security Event Reporting for ISO 27002 |
None |
6.13.1.3 | Reporting Information Security Weaknesses |
6.8 – Information Security Event Reporting for ISO 27002 |
None |
6.13.1.4 | Assessment of and Decisions on Information Security Events |
5.25 – Assessment and Decision on Information Security Events for ISO 27002 |
None |
6.13.1.5 | Response to Information Security Incidents |
5.26 – Response to Information Security Incidents for ISO 27002 |
Articles (33), (34) |
6.13.1.6 | Learning From Information Security Incidents |
5.27 – Learning From Information Security Incidents for ISO 27002 |
None |
6.13.1.7 | Collection of Evidence |
5.28 – Collection of Evidence for ISO 27002 |
None |
How ISMS.online Helps
With ISMS.online, you can easily achieve ISO 27701 compliance by using a cloud-based information management solution.
In addition, our information security experts and resources are available to assist you with the ISO 27701 accreditation process.
Find out more by booking a demo.