SlideShare a Scribd company logo
3
Most read
6
Most read
7
Most read
iFour ConsultancyISMS Framework: Clause 4 - Context of the organization
Organizational Context - ISMS requirements
The organizational context for implementing and achieving the intended
outcome of its ISMS includes:
Organizational Background
Context of the Operations
Purpose
 ISO 27001:2013 has classified the organizational context into:
Clause 4.1: Understanding the organization and its context.
Clause 4.2: Understanding the needs and expectations of interested parties.
Clause 4.3: Determining the scope of ISMS.
Clause 4.4: Information Security Management System.
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.1 Understanding the organization & its context
 Organization should determine the internal and external issues pertaining to the
implementation of ISMS.
 Internal issues can be described in terms of:
 Internal & External issues can be identified by:
SWOT analysis
 Image reference: https://www.fullestop.com/blog/analyze-website-swot-analysis/
 Organizational structure  Processes
 Policies  Internal practices
 People (i.e. Resources)  Products
 Objectives  Capabilities
Offshore software development company Indiahttp://www.ifourtechnolab.com
External issues can be described in terms of:
External issues can be determined by:
PESTLE analysis
Clause 4.1 (Continued)
 Market competitors  Differentiators of products
 Trends  Environmental aspects
 Clients  Legal & Regulatory commitments
 Relationship (with
supplier/vendor/client)
 External stakeholders
Political
Economic
Social
Technological
Legal
Environmental
Offshore software development company Indiahttp://www.ifourtechnolab.com
The context also refers to Clause 5.3 of ISO 31000:2009 standard for
establishing internal and external context of the organization.
Clause 5.3 of ISO 31000:2009 explains the establishment of your unique risk
management context. The subsections are:
Clause 5.3.1: Establish your risk management parameters.
Clause 5.3.2: Establish your organization's external context.
Clause 5.3.3: Establish your organization’s internal context.
Clause 5.3.4: Establish the context of your risk management process.
Clause 5.3.5: Establish your organization’s risk criteria.
Clause 4.1 (Continued)
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.2 Needs and expectations of interested parties
The organization shall determine:
Interested parties relevant to ISMS.
Requirements of these Interested parties relevant to ISMS.
Interested parties are the stakeholders that influence ISMS operations or they
are the ones who are affected by ISMS activities.
Interested parties can be any from the following:
The requirements of these interested parties includes legal and regulatory
requirements and obligations as mentioned in the contract.
 Clients  Suppliers/Vendors
 Govt. agencies/Regulators  Partners
 Employees  Shareholders/Owners
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.2 (Continued)
Examples of requirements by some of the entities mentioned ahead:
Shareholders of your company want their investment to be secure and they want to
earn a good return on their investment.
 Image reference: http://www.consilue.com/
Clients want your company to comply with the security clauses in the contracts your
company signs with them.
 Image reference: http://imgforu.com/login/123?q=39
Govt. agencies want your company to comply with Information Security laws and
regulations.
 Image reference: http://blog.snobmonkey.com/2015/04/14/why-universities-need-to-get-social/
Offshore software development company Indiahttp://www.ifourtechnolab.com
The organization shall determine the boundaries and applicability of the
areas of information security system to establish its scope
The scope is determined keeping in mind these factors:
The internal and the external issues referred to in Clause 4.1
The requirements of interested parties referred to in Clause 4.2
The interfaces and dependencies between activities performed by the organization, and
those that are performed by other organizations
 The boundary is the term that considers the organization processes in relevance to
information security.
 Image reference: http://www.huntinggpsmaps.com/hunt-map-update-overview
Clause 4.3 Determining the scope of ISMS
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.3 (Continued)
An organization should identify the functions that are provided by the
organization itself and also the functions that are provided by external parties
which affect the CIA of information within the scope of ISMS.
Example:
A social networking company relies on its internet service provider. If a failure occurs in
providing internet to the social networking site of the company by the internet provider,
then availability of the information is compromised. Hence the internet service should
be considered while determining the scope of ISMS.
 ISO states that the scope of ISMS should be available as documented information
Offshore software development company Indiahttp://www.ifourtechnolab.com
•Maintain the
ISMS i.e. Monitor
and Review ISMS
•Continually
Improve the ISMS
•Implement and
operate the ISMS
•Establish the ISMS
Plan Do
CheckAct
Clause 4.4 Information Security Management System
Offshore software development company Indiahttp://www.ifourtechnolab.com
References
https://wings2i.wordpress.com/2014/10/09/what-is-context-of-the-
organization-for-iso-270012013/
http://www.aisgcorp.com/how-to-comply-with-clause-4-1-and-4-2-of-isoiec-
270012013/
http://www.slideshare.net/ULDQSInc/iso-27001-transition-to-2013-
03202014
http://advisera.com/27001academy/knowledgebase/explanation-iso-
270012013-clause-4-1-understanding-organization/
http://advisera.com/27001academy/knowledgebase/how-to-identify-
interested-parties-according-to-iso-27001-and-iso-22301/
Offshore software development company Indiahttp://www.ifourtechnolab.com

More Related Content

PPTX
Auditing SOX ITGC Compliance
PPTX
Implementing ISO27001 2013
PDF
Information security management system (isms) overview
PDF
ISO 27001:2022 What has changed.pdf
PPT
Overview of ISO 27001 ISMS
PDF
ISO 27001_2022 Standard_Presentation.pdf
PPTX
27001.pptx
PPT
IT Audit methodologies
Auditing SOX ITGC Compliance
Implementing ISO27001 2013
Information security management system (isms) overview
ISO 27001:2022 What has changed.pdf
Overview of ISO 27001 ISMS
ISO 27001_2022 Standard_Presentation.pdf
27001.pptx
IT Audit methodologies

What's hot (20)

PDF
PPT
IT System & Security Audit
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PPS
ISO 27001 2013 isms final overview
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
PPTX
Basic introduction to iso27001
PPT
Isms awareness training
PPTX
Presentation on iso 27001-2013, Internal Auditing and BCM
PPTX
ISO 27001 Awareness/TRansition.pptx
PDF
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
PDF
Why ISO27001 For My Organisation
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
PDF
(Old version) My Gap analysis results between ISO27001: 2022 and 2013 version.
PPTX
27001 awareness Training
PDF
Basics in IT Audit and Application Control Testing
PPTX
itgc.pptx
PDF
ISO27001: Implementation & Certification Process Overview
PDF
Isms awareness presentation
PPTX
Iso 27001 awareness
PDF
ISMS_of ISO 27001-2022-awareness training
IT System & Security Audit
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 2013 isms final overview
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Basic introduction to iso27001
Isms awareness training
Presentation on iso 27001-2013, Internal Auditing and BCM
ISO 27001 Awareness/TRansition.pptx
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
Why ISO27001 For My Organisation
ISO_ 27001:2022 Controls & Clauses.pptx
(Old version) My Gap analysis results between ISO27001: 2022 and 2013 version.
27001 awareness Training
Basics in IT Audit and Application Control Testing
itgc.pptx
ISO27001: Implementation & Certification Process Overview
Isms awareness presentation
Iso 27001 awareness
ISMS_of ISO 27001-2022-awareness training
Ad

Similar to ISO 27001 2013 Clause 4 - context of an organization - by Software development company in india (20)

PDF
A Software Requirements Specification
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PDF
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
PPTX
ISO 27001 management clause 7 support - by software development company in india
DOCX
Businesses involved in mergers and acquisitions must exercise due di.docx
DOCX
The Rookie Chief Information Security OfficerThis assignme
PPTX
IS Audit Checklist- by Software development company in india
DOCX
Software Requirements Specification for GBI information system dev.docx
PDF
Is.iso.pas.17002.2004[1]
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
DOCX
This assignment consists of five (5) parts     Part 1 Organi.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
DOCX
The Rookie Chief Information Security OfficerThis assignment c.docx
PDF
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
PDF
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
DOCX
Term Paper The Rookie Chief Information Security OfficerD
PDF
Microsoft compliance framework_for_online_services
PDF
Microsoft compliance framework_for_online_services
PDF
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
DOCX
LESSON 4 SOFTWARE REQUIREMENT (3).docx.
A Software Requirements Specification
ISO 27001 - information security user awareness training presentation -part 2
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
ISO 27001 management clause 7 support - by software development company in india
Businesses involved in mergers and acquisitions must exercise due di.docx
The Rookie Chief Information Security OfficerThis assignme
IS Audit Checklist- by Software development company in india
Software Requirements Specification for GBI information system dev.docx
Is.iso.pas.17002.2004[1]
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
Term Paper The Rookie Chief Information Security OfficerD
Microsoft compliance framework_for_online_services
Microsoft compliance framework_for_online_services
Enterprise Systems For Management 2nd Edition Motiwalla Solutions Manual
LESSON 4 SOFTWARE REQUIREMENT (3).docx.
Ad

Recently uploaded (20)

PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Digital Strategies for Manufacturing Companies
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPT
Introduction Database Management System for Course Database
PPTX
Transform Your Business with a Software ERP System
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Nekopoi APK 2025 free lastest update
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
System and Network Administration Chapter 2
Upgrade and Innovation Strategies for SAP ERP Customers
Which alternative to Crystal Reports is best for small or large businesses.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Digital Strategies for Manufacturing Companies
Wondershare Filmora 15 Crack With Activation Key [2025
Introduction Database Management System for Course Database
Transform Your Business with a Software ERP System
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
2025 Textile ERP Trends: SAP, Odoo & Oracle
Online Work Permit System for Fast Permit Processing
Odoo POS Development Services by CandidRoot Solutions
How to Choose the Right IT Partner for Your Business in Malaysia
PTS Company Brochure 2025 (1).pdf.......
How to Migrate SBCGlobal Email to Yahoo Easily
Operating system designcfffgfgggggggvggggggggg
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Nekopoi APK 2025 free lastest update
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
System and Network Administration Chapter 2

ISO 27001 2013 Clause 4 - context of an organization - by Software development company in india

  • 1. iFour ConsultancyISMS Framework: Clause 4 - Context of the organization
  • 2. Organizational Context - ISMS requirements The organizational context for implementing and achieving the intended outcome of its ISMS includes: Organizational Background Context of the Operations Purpose  ISO 27001:2013 has classified the organizational context into: Clause 4.1: Understanding the organization and its context. Clause 4.2: Understanding the needs and expectations of interested parties. Clause 4.3: Determining the scope of ISMS. Clause 4.4: Information Security Management System. Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 3. Clause 4.1 Understanding the organization & its context  Organization should determine the internal and external issues pertaining to the implementation of ISMS.  Internal issues can be described in terms of:  Internal & External issues can be identified by: SWOT analysis  Image reference: https://www.fullestop.com/blog/analyze-website-swot-analysis/  Organizational structure  Processes  Policies  Internal practices  People (i.e. Resources)  Products  Objectives  Capabilities Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 4. External issues can be described in terms of: External issues can be determined by: PESTLE analysis Clause 4.1 (Continued)  Market competitors  Differentiators of products  Trends  Environmental aspects  Clients  Legal & Regulatory commitments  Relationship (with supplier/vendor/client)  External stakeholders Political Economic Social Technological Legal Environmental Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 5. The context also refers to Clause 5.3 of ISO 31000:2009 standard for establishing internal and external context of the organization. Clause 5.3 of ISO 31000:2009 explains the establishment of your unique risk management context. The subsections are: Clause 5.3.1: Establish your risk management parameters. Clause 5.3.2: Establish your organization's external context. Clause 5.3.3: Establish your organization’s internal context. Clause 5.3.4: Establish the context of your risk management process. Clause 5.3.5: Establish your organization’s risk criteria. Clause 4.1 (Continued) Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 6. Clause 4.2 Needs and expectations of interested parties The organization shall determine: Interested parties relevant to ISMS. Requirements of these Interested parties relevant to ISMS. Interested parties are the stakeholders that influence ISMS operations or they are the ones who are affected by ISMS activities. Interested parties can be any from the following: The requirements of these interested parties includes legal and regulatory requirements and obligations as mentioned in the contract.  Clients  Suppliers/Vendors  Govt. agencies/Regulators  Partners  Employees  Shareholders/Owners Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 7. Clause 4.2 (Continued) Examples of requirements by some of the entities mentioned ahead: Shareholders of your company want their investment to be secure and they want to earn a good return on their investment.  Image reference: http://www.consilue.com/ Clients want your company to comply with the security clauses in the contracts your company signs with them.  Image reference: http://imgforu.com/login/123?q=39 Govt. agencies want your company to comply with Information Security laws and regulations.  Image reference: http://blog.snobmonkey.com/2015/04/14/why-universities-need-to-get-social/ Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 8. The organization shall determine the boundaries and applicability of the areas of information security system to establish its scope The scope is determined keeping in mind these factors: The internal and the external issues referred to in Clause 4.1 The requirements of interested parties referred to in Clause 4.2 The interfaces and dependencies between activities performed by the organization, and those that are performed by other organizations  The boundary is the term that considers the organization processes in relevance to information security.  Image reference: http://www.huntinggpsmaps.com/hunt-map-update-overview Clause 4.3 Determining the scope of ISMS Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 9. Clause 4.3 (Continued) An organization should identify the functions that are provided by the organization itself and also the functions that are provided by external parties which affect the CIA of information within the scope of ISMS. Example: A social networking company relies on its internet service provider. If a failure occurs in providing internet to the social networking site of the company by the internet provider, then availability of the information is compromised. Hence the internet service should be considered while determining the scope of ISMS.  ISO states that the scope of ISMS should be available as documented information Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 10. •Maintain the ISMS i.e. Monitor and Review ISMS •Continually Improve the ISMS •Implement and operate the ISMS •Establish the ISMS Plan Do CheckAct Clause 4.4 Information Security Management System Offshore software development company Indiahttp://www.ifourtechnolab.com

Editor's Notes

  • #2: Offshore software development company India – http://www.ifourtechnolab.com
  • #3: Offshore software development company India – http://www.ifourtechnolab.com
  • #4: Offshore software development company India – http://www.ifourtechnolab.com
  • #5: Offshore software development company India – http://www.ifourtechnolab.com
  • #6: Offshore software development company India – http://www.ifourtechnolab.com
  • #7: Offshore software development company India – http://www.ifourtechnolab.com
  • #8: Offshore software development company India – http://www.ifourtechnolab.com
  • #9: Offshore software development company India – http://www.ifourtechnolab.com
  • #10: Offshore software development company India – http://www.ifourtechnolab.com
  • #11: Offshore software development company India – http://www.ifourtechnolab.com
  • #12: Offshore software development company India – http://www.ifourtechnolab.com