- Computers & Software
An Overview of ISO 13335
ISO 13335 is focused on Information and Communication Technologies, also called ICT. ISO standard 13335 was created to help businesses improve their information and communication security. There is currently only one part of the ISO 13335 standard, ISO 13335-1, though ISO 13335 used to have other sections.
The Purpose of the ICT Standard
ISO standard 13335 is designed to create an IT management framework, including information security policies, internal controls, company approved practices and configuration management of hardware and software components.
No one changes information and communication technologies without formal review and approval after thorough testing was completed. In addition, ISO 13335 was created in an effort to improve business continuity, the continuation of business operations in case of a massive technical failure, natural disaster or hack attack.
The ICT standard ISO 13335-1 originated as a technical report on information security before it became a separate ISO standard. ISO 13335-1 is focused on technical security controls over administrative procedures and internal, corporate rules. ISO standard 13335-1 is now the entire ISO 13335 standard, with the other sections either consolidated into ISO 13335-1 or made into their own standards.
Network security controls like firewalls can block traffic from selected IP addresses or prevent users from accessing specific websites. Built in data archiving modules attached to routers or network connections automatically save all email messages, creating an instant record of communications available if the main email server goes down or if messages are deleted by unauthorized parties.
ISO 13335-2 originally contained the ISO’s guidance on ICT security. The 1990s version of the standard was broken up into ISO 13335-1 and 13335-2. The ICT security recommendations in ISO 13335-2 were incorporated into ISO 13335-1 in the 2004 update of the standard.
ISO 13335-3 was originally the guidelines for managing IT security. ISO standard 13335-3 has been replaced by ISO 27005. In essence, what was ISO 13335-3 is now part of ISO 27005.
ISO 13335-4 outlined the ISO recommended practices of selecting technical security controls or IT safeguards. ISO 13335-5 has also been replaced with ISO 27005.
ISO 13335-5 was originally a set of guidelines on network security. ISO 13335-5 was replaced with ISO 18028-1 in 2006. ISO 18028-1 has since been revised by ISO 27033-1, released in 2009.
ISO 27005 replaced several sections of the original ISO 13335 standard. What does ISO 27005 cover?
ISO 27005 describes how organizations define their context, the areas for which they are responsible. Risks are identified and the estimation of the severity of the risk are set during risk analysis. During risk treatment, the organization decides whether to accept the risk, mitigate its effects or work to prevent the risk from occurring.
During risk monitoring, the group monitors the risks to the network. Some risks may disappear as more security hardware is installed while others may grow due to user complacency or evolving security threats. For example, the risk that a server’s compromise would shut down a business is reduced when a back up server off site is created with hot backups of the organization’s data. Then, if the main server is compromises and is removed from the network to prevent hackers from using it to access other areas, the business simply switches over the remote backup server and keeps going.
ISO 27031 helps businesses identify and mitigate risks that could disrupt ICT. It includes suggestions on how to incorporate solutions for business continuity while supporting information technology security objectives.
ISO 20000 is the standard for information technology service management. ISO 20000 gives the best practices recommended by the ISO. ISO 20000 outlines management responsibility and documentation requirements for an information technology system.
ISO 27001 outlines the requirements of a formal information security management system or ISMS. Who is responsible for information security testing of new software before it is installed on the network? How will monitor intrusion detection logs, failed access attempts and system usage reports? The ISMS describes the responsible parties for monitoring information security reports, auditing user access, reviewing information security policies and implementing changes.