IASME

From HandWiki
The IASME Governance standard was developed by the IASME Consortium

IASME Governance is an Information Assurance standard that is designed to be simple and affordable to help improve the cyber security of Small and medium-sized enterprises (SMEs).

The IASME Governance technical controls are aligned with the Cyber Essentials scheme and certification to the IASME standard includes certification to Cyber Essentials. The IASME Governance standard was developed in 2010 and has proven to be very effective at improving the security of supply chains for large organisations.[citation needed]. The standard maps closely to the international ISO/IEC 27001 information assurance standard.

Background

IASME Governance was originally developed as an academic-SME partnership that attracted a lot of interest from government and small businesses[1]

Research towards the IASME model was undertaken in the UK during 2009–10,[2] after an acknowledgement that the current international information assurance standard (ISO/IEC 27001) was complex for resource-strapped SMEs, providing a weakness in the supply chain. IASME was developed during 2010-11 and was launched later that year.[3] It has been revised regularly to keep pace with changes to the risk environment of SMEs. The development process with SMEs was explained in a published international SME conference paper.[4]

The IASME Governance standard follows the same implementation pattern used by the international standards community including PDCA (Plan-Do-Check-Act) principles [5] and the Information Security Management System (ISMS) which provides a management framework. Both are refined and expressed in business terms recognisable by organisations of all sizes.

The IASME Governance standard was developed and piloted with the help of small businesses mostly in the West Midlands of the UK with encouraging results.[6][7] The standard has been shown to be useful to SMEs both in the UK and internationally.[8]

Large organisations can use the IASME Governance standard in their supply chains to understand and reduce supplier risk. An article explaining the supply chain benefits has been written by its developer, David Booth.[9] Both large and small organisations can use the IASME certification as an alternative to the ISO/IEC 27001 standard.

Structure of the standard

The standard is managed by The IASME Consortium Ltd who operate a network of over 150 Certification Bodies[10] who are licensed to certify candidate organisations. The question set is free for anyone to download without registration and is licensed under a Creative Commons BY-NC-ND license.[11]

The standard is available at two levels of assurance:

  • IASME Governance Self-assessment
    • Candidates complete an online questionnaire with around 160 simple questions about their organisation. This is marked by a Certification Body who awards the certification if all of the answers given are compliant with the standard.
    • The assessment includes certification to the Cyber Essentials standard.
  • IASME Governance Audited (or "IASME Gold")
    • The candidate organisation is visited by an IASME Certification Body who verifies compliance with the standard and, if appropriate, issues certification.

In 2017, the standard was updated to include additional questions to enable organisations comply with the General Data Protection Regulations (GDPR).

Topics covered by the standard

The IASME Governance standard covers the following information security topics:

  • Managing Security
  • Information Assets
  • Cloud Services
  • Risk Management
  • Data Protection (including GDPR)
  • People
  • Security Policy
  • Physical and Environmental
  • Firewalls and Internet Gateways
  • Secure Configuration
  • Patches and Updates
  • Operations and Management
  • User Accounts
  • Administrative Access
  • Malware Protection
  • Vulnerability Scanning
  • Monitoring
  • Backup and Restore
  • Incident Management
  • Business Continuity

Comparison with other standards

ISO/IEC 27001/2

IASME Governance is a risk-led standard with a similar set of controls to Annex A of the ISO/IEC 27001 standard.[12]

NCSC 10 Steps to Cyber Security

IASME Governance maps very closely to the UK Government's NCSC 10 Steps to Cyber Security.[13] A mapping between the two standards is available[14]

Cyber Assessment Framework

The Cyber Assessment Framework (CAF) has been developed by the UK Government to allow organisations to demonstrate their compliance to the NIS Directive.[15] The IASME Governance Standard maps closely to the CAF.[16]

NHS Digital Data Security and Protection Toolkit

The NHS Digital Data Security and Protection Toolkit is an online self-assessment tool that allows organisations to measure their performance against the National Data Guardian's 10 data security standards.  IASME Governance maps closely to the toolkit for the majority of topics[17]

Usage of the standard and awards

The IASME standard has become a focus of attention, as the information security threat to UK businesses continues to increase, and vulnerabilities in their systems continue to cause expensive data breaches and system failures. The increasing number of newspaper and journal articles on this subject reflect an increased security awareness.[18][19]

It is recognised by the States of Jersey as suitable security standard for the government supply chain.[20]

IASME was specifically mentioned in a keynote speech at the Infosec Europe 2013 event held in London[21] and received an innovation award from Computer Weekly Europe shortly afterwards.[22] In April 2019, IASME was awarded Cyber Business of the Year at the prestigious UK National Cyber Awards[23]

See also

References

  1. BIS call for interest: IASME, 11 March 2013 by Consultancy Week Team. Retrieved on 19 April 2013
  2. [1][yes|permanent dead link|dead link}}] "Information Assurance and SMEs: Research Findings to inform the development of the IASME model" Retrieved on 27 October 2012
  3. BCS Security Blog, 15 April 2011, Retrieved on 14 September 2012
  4. IASME: Information Security Management Evolution for SMEs Retrieved on 15 March 2013
  5. [2] "Plan-Do-Check-Act Cycle — The PDCA cycle" Retrieved on 27 October 2012
  6. News — Fraggleworks Retrieved 27 October 2012
  7. [3] "Securing the Supply Chain", Retrieved 17 March 2013
  8. [4][yes|permanent dead link|dead link}}] "Reputation Assured with IASME" Retrieved 27 October 2012
  9. [5] "Protecting Information — Your Most Important asset" Retrieved on 27 October 2012
  10. "Certification Bodies – IASME" (in en-US). https://iasme.co.uk/certification-bodies/. 
  11. "Free Download of IASME Standard – IASME". https://www.iasme.co.uk/the-iasme-standard/free-download-of-iasme-standard/. 
  12. "Archived copy". https://www.iasme.co.uk/wp-content/uploads/2019/04/ISO27001-Mapping-to-IASME-v1.1-.xlsx. 
  13. "10 steps to cyber security". https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security. 
  14. "Mapping between IASME Governance and 10 Steps to Cyber Security". https://www.iasme.co.uk/wp-content/uploads/2018/09/10-Steps-Mapping-to-IASME-v1.0.xlsx. 
  15. "NCSC CAF guidance". https://www.ncsc.gov.uk/collection/caf. 
  16. "Mapping between IASME Governance and the CAF / NIS Directice". https://www.iasme.co.uk/wp-content/uploads/2018/09/CAF-Mapping-to-IASME-v1.0.xlsx. 
  17. "Mapping between IASME Governance and NHS Digital Toolkit". https://www.iasme.co.uk/wp-content/uploads/2019/01/NHS-Digital-Mapping-to-IASME-v1.0.xlsx. 
  18. [6] Vigilance Security Magazine, 14 February 2013
  19. Robinson, Duncan (24 February 2013). "Tech trends increase cybercrime threat". Financial Times. https://www.ft.com/content/806d7d72-7d16-11e2-adb6-00144feabdc0. 
  20. Jersey, States of. "Security standards" (in en). https://www.gov.je/Government/DigitalServices/BusinessArchitecture/Pages/SecurityStandards.aspx. 
  21. "Chloe Smith keynote speech at Infosec 2013". https://www.gov.uk/government/speeches/chloe-smith-keynote-speech-at-infosec-2013. 
  22. "Computer Weekly European User Awards for Security: Winners". http://www.computerweekly.com/news/2240183137/Computer-Weekly-European-User-Awards-for-Security-Winners. 
  23. "Cyber Business of the Year is based in the Two Counties" (in en-GB). 2019-04-18. https://hwchamber.co.uk/cyber-business-of-the-year-is-based-in-the-two-counties/. 

External links