Time
7 hours 56 minutes
Difficulty
Intermediate
CEU/CPE
8

Video Transcription

00:01
Listen 5.2
00:03
competence
00:06
In this video, we will cover what is meant by the competence close,
00:11
and we'll also look at the required documentation associated with this clause.
00:15
This is associated to close 7.2 in the ISO 27,001 step.
00:25
Competence is the clause that deals with ensuring that the personnel involved in your SMS and your information security team
00:32
and also, to some degree the organization as a whole,
00:36
have the necessary qualifications and skills to perform their jobs
00:40
for the rest of the organization. This will be to assess whether or not the organization has awareness with regards to information security and what the organization is doing to improve its security posture.
00:53
The standard makes reference to four specific requirements with regards to competence.
01:00
These are
01:02
determine the required competence off personal involved in functions related to information security.
01:07
Ensure that the above personal have the appropriate skills, certification and training
01:15
where necessary. Ensure that the appropriate personal acquire the required competencies with these do not already exist
01:23
and maintain appropriate documented information
01:26
for the first point. Your organization needs to establish what the required skill set is.
01:33
Do you need a certified I So 27,001 lead implementer to hit up the ice. M s team.
01:41
Do you require a C I S S P certified person?
01:45
Do you have an in house sock or security operation center?
01:49
Do they have the right skills?
01:52
Do you have an in house certified ethical hacker or offensive security certified professional?
01:59
Or will this be an arts of skills? It
02:02
all of these decisions need to be made and formally approved.
02:07
Once you know what your organization needs for supporting the ice, um is on its information security function as a whole.
02:15
You can go about ensuring that the personnel in each of these rolls has the required certification and skill set.
02:22
If not,
02:23
well, then you move to step three, which is ensuring that personal that do not have the required skill sets or certifications are trained and get the required certifications and skill sets.
02:36
This clause is not just focused on information security personal.
02:39
It is the rest of the organization as well.
02:43
Now it's not feasible for everyone in an organization to have an information security certification,
02:50
but it is important that each person in the organization has a basic understanding of information, security terms and concepts,
02:57
and the information security policies and controls applicable to your organization.
03:04
This is where information security awareness comes into play.
03:07
This ensures that everyone has a baseline understanding off required concepts.
03:12
What these concepts are. You will need thio decide based on the risk profile of your organization.
03:19
I risked department should undergo more in depth training.
03:22
For example,
03:23
if you have an in house development team, it would be beneficial to train this team insecure development and coding practices and educate your programmers on how attacks can happen through specific coding practices
03:36
and model practices.
03:38
This is one way to help ensure that security is implemented proactively
03:43
and not just through a patrol east later on.
03:49
So what do you need to document for this
03:52
close?
03:53
Demonstrating compliance to close 7.2 competence can be done through the maintenance of the following documents.
04:00
Of course, this list is not exhaustive,
04:02
but is an illustration off some of the common documents that are used
04:08
for a nice, amiss implementation project.
04:11
It is good to demonstrate some form of understanding off the ice. So 27,001 standard, specifically
04:16
training such as this could serve as an illustration, that resource is have an in depth understanding off the standard, how to implement the closes and what to expect from an audience.
04:30
Let's go through the examples
04:32
certifications of stuff,
04:34
for example, and I so 27,001 lead implementer
04:40
certifications of your staff in your information security team.
04:45
For example, if you have a C i S S p
04:47
for a CH or whatever the certification is
04:51
attendance registers and content off your information security awareness sessions.
04:59
Attendance registers and content off specialized training sessions.
05:02
For example, the secure systems development training
05:06
as well as any contracts with external parties for specialized services,
05:11
for example, independent penetration testing
05:19
To summarize
05:20
in this lesson, we went over hard to meet the requirements of the standard with regards to competence for the ice mess and information security.
05:30
We also examine some examples of documentation that would assist during a certification orders as one is to ensure compliance against the I. So, 27,001 standard in general

Up Next

ISO 27001:2013 - Information Security Management Systems

The ISO 27001:2013 - Information Security Management Systems course provides students with insights into the detail and practical understandings meant by the various clauses in the ISO 27001 Standard.

Instructed By

Instructor Profile Image
Judy Winn
CISO at NFA Solutions
Instructor