Top Banner
1/14/2018 1 Stergios OIKONOMOU Alexandros VOLIOTIS Information Systems Security in Shipping, according to ISO 27001 1 Stergios OIKONOMOU Alexandros VOLIOTIS 2 About the presenters Stergios Oikonomou Stergios is a Lieutenant of Hellenic Air Force. His specialist is Communication & Electronic Technichian. Stergios has in depth knowledge of Information Security and has worked for EU OHQ in Larissa. Alexandros Voliotis Alexandros is a 2nd Lieutenant of Hellenic Army. His specialist is Network Administrator. Alexandros has in depth knowledge of Information System management and has worked for EU OHQ in Larissa.
18

Information Systems Security in Shipping, according to ISO ...

Jun 11, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Systems Security in Shipping, according to ISO ...

1/14/2018

1

Stergios OIKONOMOUAlexandros VOLIOTIS

Information Systems Security in Shipping, according to ISO 27001

1

Stergios OIKONOMOUAlexandros VOLIOTIS 2

About the presenters

Stergios Oikonomou

Stergios is a Lieutenant of Hellenic Air Force.His specialist is Communication & Electronic Technichian.

Stergios has in depth knowledge of Information Security and has worked for EU OHQ in Larissa.

Alexandros Voliotis

Alexandros is a 2nd Lieutenant of Hellenic Army. His specialist is Network Administrator.

Alexandros has in depth knowledge of Information System management and has worked for EU OHQ in Larissa.

Page 2: Information Systems Security in Shipping, according to ISO ...

1/14/2018

2

Stergios OIKONOMOUAlexandros VOLIOTIS 3

ToC

• Shipping• Information Systems• Information Systems Security• ISO 27001:2013• Information Systems Security in Shipping, according to

ISO 27001:2013• Conclusions• Questions

Stergios OIKONOMOUAlexandros VOLIOTIS 4

Shipping

Page 3: Information Systems Security in Shipping, according to ISO ...

1/14/2018

3

Stergios OIKONOMOUAlexandros VOLIOTIS 5

Shipping

Stergios OIKONOMOUAlexandros VOLIOTIS 6

Shipping

Page 4: Information Systems Security in Shipping, according to ISO ...

1/14/2018

4

Stergios OIKONOMOUAlexandros VOLIOTIS 7

Shipping

Container ships

carry most of theworld's manufacturedgoods and products,usually throughscheduled linerservices.

Bulk carriers ships

transport raw materialssuch as iron ore andcoal.

Tankers ships

transport crude oil,chemicals andpetroleum products.

Cruise ships

perform short journeysfor a mix of passengers,cars and commercialvehicles.

Stergios OIKONOMOUAlexandros VOLIOTIS 8

Shipping

Shipping Industry

90%

Other10%

WORLD TRADE

• Over 90% of world trade is carried by the international shippingindustry.

• Without shipping the import and export of goods would not bepossible.

Page 5: Information Systems Security in Shipping, according to ISO ...

1/14/2018

5

Stergios OIKONOMOUAlexandros VOLIOTIS 9

Information Systems (IS)

Definition of IS

“Information systems areinterrelated components working togetherto collect, process, store, and disseminateinformation to support decision making,coordination, control, analysis, andvisualization in an organization”.

Stergios OIKONOMOUAlexandros VOLIOTIS 10

Information Systems (IS)

Component of IS

• Hardware• Software• Data• Telecommunication - Network• Procedures• People

Page 6: Information Systems Security in Shipping, according to ISO ...

1/14/2018

6

Stergios OIKONOMOUAlexandros VOLIOTIS 11

Information Systems (IS)

Types of IS

KMS (Knowledge Management Systems)OAS (Office Automation Systems)TPS (Transaction Processing Systems)ESS (Executive Support Systems)DSS (Decision Support Systems)MIS (Management Information Systems)

Stergios OIKONOMOUAlexandros VOLIOTIS 12

Information Systems (IS)

Use of IS

Page 7: Information Systems Security in Shipping, according to ISO ...

1/14/2018

7

Stergios OIKONOMOUAlexandros VOLIOTIS 13

Information Systems (IS)

IS in Shipping

Stergios OIKONOMOUAlexandros VOLIOTIS 14

Information Systems (IS)

Page 8: Information Systems Security in Shipping, according to ISO ...

1/14/2018

8

Stergios OIKONOMOUAlexandros VOLIOTIS 15

Information Systems (IS)

Ship A’s Network Ship B’s Network

Stergios OIKONOMOUAlexandros VOLIOTIS 16

Information Systems Security

Page 9: Information Systems Security in Shipping, according to ISO ...

1/14/2018

9

Stergios OIKONOMOUAlexandros VOLIOTIS 17

Information Systems Security

Components of Information Security

Stergios OIKONOMOUAlexandros VOLIOTIS 18

ISO 27001:2013

ISO 27000Vocabulary

Vo

cab

ula

ryR

equ

irem

ents

Gen

eral

G

uid

esIn

du

stry

Gu

ides

ISO 27000 family

Page 10: Information Systems Security in Shipping, according to ISO ...

1/14/2018

10

Stergios OIKONOMOUAlexandros VOLIOTIS 19

ISO 27001:2013

History of ISO 27001:2013

Stergios OIKONOMOUAlexandros VOLIOTIS 20

ISO 27001:2013

0 Introduction

1 Scope

2 Normative references

3 Terms and definitions

4 Context of the organization

4.1 Understanding the organization and its context

4.2 Understanding the needs and expectations of

interested parties

4.3 Determining the scope of the information security

management system

4.4 Information security management system

5 Leadership

5.1 Leadership and commitment

5.2 Policy

5.3 Organizational roles, responsibilities and authorities

6 Planning

6.1 Actions to address risks and opportunities

6.1.1 General

6.1.2 Information security risk assessment

6.1.3 Information security risk treatment

6.2 Information security objectives and planning to achieve them

7 Support

7.1 Resources

7.2 Competence

7.3 Awareness

7.4 Communication

7.5 Documented information

7.5.1 General

7.5.2 Creating and updating

7.5.3 Control of documented information

8 Operation

8.1 Operational planning and control

8.2 Information security risk assessment

8.3 Information security risk treatment

9 Performance evaluation

9.1 Monitoring, measurement, analysis and evaluation

9.2 Internal audit

9.3 Management review

10 Improvement

10.1 Nonconformity and corrective action10.2 Continual improvement

ISO 27001 Structure

Page 11: Information Systems Security in Shipping, according to ISO ...

1/14/2018

11

Stergios OIKONOMOUAlexandros VOLIOTIS 21

ISO 27001:2013

Models

Stergios OIKONOMOUAlexandros VOLIOTIS 22

ISO 27001:2013

PDCA Model

• Plan (establish the ISMS)• Establish ISMS policy, objectives, processes and procedures relevant to managing risk and improving

information security to deliver results in accordance with an organization’s overall policies and objectives.

• Do (implement and operate the ISMS)• Implement and operate the ISMS policy, controls, processes and procedures.

• Check (monitor and review the ISMS)• Assess and, where applicable, measure process performance against ISMS policy, objectives and

practical experience and report the results to management for review.

• Act (maintain and improve the ISMS)• Take corrective and preventive actions, based on the results of the internal ISMS audit and

management review or other relevant information, to achieve continual improvement of the ISMS.

Page 12: Information Systems Security in Shipping, according to ISO ...

1/14/2018

12

Stergios OIKONOMOUAlexandros VOLIOTIS 23

ISO 27001.2013

1. Plan

1.2 Information security aspects of business

continuity management (A17)

1.3 Compliance (A18)

1.1 Information Security Incident Management

(A16)

2. Do

2.1 Information security policies (A5)

2.2 Organization of information security (A6)

2.3 Human resource security (A7)

2.4 Asset management (A8)

3. Check

3.1 Access control (A9)

3.2 Cryptography (A10)

3.3 Physical and environmental security

(A11)

4. Act

4.1 Operations security (A12)

4.2 Communications security (A13)

4.3 System acquisition, development and

maintenance (A14)

4.4 Supplier relationships (A15)

Stergios OIKONOMOUAlexandros VOLIOTIS 24

ISO 27001:2013

Plan

Do

Check

Act

4 Phases 14 Domains 114 Control Points

ISMS

Page 13: Information Systems Security in Shipping, according to ISO ...

1/14/2018

13

Stergios OIKONOMOUAlexandros VOLIOTIS 25

ISO 27001:2013

The organization shall continually improve the effectiveness of the ISMS through the use of:

• The information security policy; • Information security objectives; • Audit results; • Analysis of monitored events; • Corrective and preventive actions; • Management review.

Continual Improvement of ISMS

Stergios OIKONOMOUAlexandros VOLIOTIS 26

ISO 27001:2013

• It improves enterprise security• It is an independent, unbiased measurement of the actual information security state• It reduces customer and supply chain audit• Increased legislative and regulatory compliance• Keeps Confidential information secure• Gives confidence to customers and stakeholders on how you manage risk• Secure exchange of information• Minimizes risk exposure• Builds a culture of security• Protects the Organization assets, shareholders and customers• Provide Competitive advantage• Enhanced Costumer Satisfaction

Benefits of ISO 27001:2013

Page 14: Information Systems Security in Shipping, according to ISO ...

1/14/2018

14

Stergios OIKONOMOUAlexandros VOLIOTIS 27

Information Systems Security in Shipping, according to ISO 27001:20137.2.2 Information security awareness, education, and training

The organisation must provide the following training to its staffand that of suppliers involved in the operational management of thedigitisation or archiving processes performed by the organisation:• awareness training• continuous trainingExampleawareness posters, briefings, slide decks for seminars and courses,guidelines, tests and quizzesKeep• awareness diary• rolling plan• employee training records (updated)

Stergios OIKONOMOUAlexandros VOLIOTIS 28

Information Systems Security in Shipping, according to ISO 27001:20138.2.1 Information classification

Classification levels and guidelines must be defined andimplemented by the organisation specifically for clients’ digital filesand documents managed by the organisation as part of thedigitisation or archiving processes.The organisation must:• Define classification levels and guidelines for the following

elements: client collected documents (analogue and digital). digital documents generated by scanning clients’ analoguedocuments. clients’ digital files.

• Ensure that these classification levels and guidelines are reviewedby the person responsible for the digitisation or archivingprocesses regularly (at least once a year)

Page 15: Information Systems Security in Shipping, according to ISO ...

1/14/2018

15

Stergios OIKONOMOUAlexandros VOLIOTIS 29

Information Systems Security in Shipping, according to ISO 27001:201311.1.2 Physical access controls

The organisation must take into account the following directives:• All visitors to the organisation:

Must be accompanied by a member of the organisationpermanently authorised to circulate in the areas accessed by thevisitors, even if they have already been authorised to access suchareas. Must be excluded from areas associated with the digitisationprocess

• Third parties with permanent authorisation to access secure areasof the organisation must not be able to access the technicalassets

• The technical digitisation or archiving system must be protectedagainst unauthorised access:In the event of evacuation of the areas hosting these assets.If they are located in multi-occupant sites

Stergios OIKONOMOUAlexandros VOLIOTIS 30

Information Systems Security in Shipping, according to ISO 27001:201315.1.2 Security within supplier agreements (1/3)

The organisation must include the following conditions in thecontractual document drawn up with the supplier supporting thedigitisation or archiving processes performed by the organisation:• Provisions concerning ownership of the products and services,• Provisions concerning the continuous provision of the products

and services provided by the supplier, including in the event ofdisaster.

• Observance of the organisation’s digitisation or archiving policy.

Page 16: Information Systems Security in Shipping, according to ISO ...

1/14/2018

16

Stergios OIKONOMOUAlexandros VOLIOTIS 31

Information Systems Security in Shipping, according to ISO 27001:201315.1.2 Security within supplier agreements (2/3)

• Measures guaranteeing:The swiftest possible notification of any security changes appliedto the assets of the supplier and their suppliers that could affectthe digitisation or archiving processes performed by theorganisation.That the information belonging to the organisation that isaccessed by the supplier and their suppliers is used exclusively forthe purposes for which it was made available to the supplier andtheir suppliers.That changes affecting the supplier’s suppliers involved in thedigitisation or archiving processes performed by the organisationare approved in advance by the organisation.

Stergios OIKONOMOUAlexandros VOLIOTIS 32

Information Systems Security in Shipping, according to ISO 27001:201315.1.2 Security within supplier agreements (3/3)

• The commitment of the supplier to cooperate with theorganisation in any investigations undertaken by the organisationto resolve incidents that could affect the services or productsprovided to the organisation by the supplier, that are assumed orshown not to be attributable to the supplier or their suppliers.

• The right to audit the supplier and their suppliers equally, inconsideration of their involvement in the digitisation or archivingprocesses performed by the organisation.

Page 17: Information Systems Security in Shipping, according to ISO ...

1/14/2018

17

Stergios OIKONOMOUAlexandros VOLIOTIS 33

Conclusion

Stergios OIKONOMOUAlexandros VOLIOTIS 34

Page 18: Information Systems Security in Shipping, according to ISO ...

1/14/2018

18

Stergios OIKONOMOUAlexandros VOLIOTIS 35

Questions