Information security, cybersecurity and privacy protection — Governance of information security

This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended audience for this document is: — governing body and top management; — those who are responsible for evaluating, directing and monitoring an information security management system (ISMS) based on ISO/IEC 27001; — those responsible for information security management that takes place outside the scope of an ISMS based on ISO/IEC 27001, but within the scope of governance. This document is applicable to all types and sizes of organizations. All references to an ISMS in this document apply to an ISMS based on ISO/IEC 27001. This document focuses on the three types of ISMS organizations given in Annex B. However, this document can also be used by other types of organizations.

Sécurité de l'information, cybersécurité et protection de la vie privée — Gouvernance de la sécurité de l'information

General Information

Status
Published
Publication Date
14-Dec-2020
Current Stage
6060 - International Standard published
Start Date
15-Dec-2020
Due Date
26-Mar-2022
Completion Date
15-Dec-2020
Ref Project

Relations

Standard
ISO/IEC 27014:2020 - Information security, cybersecurity and privacy protection — Governance of information security Released:4/28/2022
English language
15 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 27014:2020 - Information security, cybersecurity and privacy protection -- Governance of information security
English language
16 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 27014
Second edition
2020-12
Corrected version
2022-04
Information security, cybersecurity
and privacy protection — Governance
of information security
Sécurité de l'information, cybersécurité et protection de la vie
privée — Gouvernance de la sécurité de l'information
Reference number
© ISO/IEC 2020
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2020 – All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed
for the different types of document should be noted (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs)
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent
declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by ITU-T as ITU-T X.1054 (04/2021) and drafted in accordance with its
editorial rules, in collaboration with Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
This second edition cancels and replaces the first edition (ISO/IEC 27014:2013), which has been
technically revised. The main changes compared to the previous edition are as follows:
— the document has been aligned with ISO/IEC 27001:2013;
— the requirements in ISO/IEC 27001 which are governance activities have been explained;
— the objectives and processes of information security governance have been described.
This corrected version of ISO/IEC 27014:2020 incorporates the following corrections:
— the document has been editorially revised in accordance with the rules-for-presentation-ITU-T-ISO-
IEC common text.
© ISO/IEC 2020 – All rights reserved iii

Any feedback or questions on this document should be directed to the user’s national standards body. A
www.iec.ch/national-
complete listing of these bodies can be found at www.iso.org/members.html and
committees.
iv © ISO/IEC 2020 – All rights reserved

INTERNATIONAL STANDARD ISO/IEC 27014
RECOMMENDATION ITU-T X.1054
Information security, cybersecurity and privacy
protection – Governance of information security
Summary
Recommendation ITU-T X.1054 | International Standard ISO/IEC 27014 provides guidance on the governance of
information security.
Information security is a key issue for organizations, amplified by rapid advances in attack methodologies and
technologies, and corresponding increased regulatory pressures.
The failure of an organization's information security controls can have many adverse impacts on an organization and its
interested parties including but not limited to the undermining of trust.
Governance of information security is the use of resources to ensure effective implementation of information security, and
provides assurance that:
• directives concerning information security will be followed; and
• the governing body will receive reliable and relevant reporting about information security related activities.
This assists the governing body to make decisions concerning the strategic objectives for the organization by providing
information about information security that may affect these objectives. It also ensures that information security strategy
aligns with the overall objectives of the entity.
Managers and others working in organizations need to understand:
• the governance requirements that affect their work; and
• how to meet governance requirements that require them to take action.
History
*
Edition Recommendation Approval Study Group Unique ID
1.0 ITU-T X.1054 2012-09-07 17 11.1002/1000/11594
2.0 ITU-T X.1054 2021-04-30 17 11.1002/1000/14248
Keywords
Information security, information security governance, information security management, ISMS.
*
To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/11830-en.
© ISO/IEC 2020 – All rights reserved Rec. ITU-T X.1054 (04/2021) v

FOREWORD
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications, information and communication technologies (ICTs). The ITU Telecommunication
Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical,
operating and tariff questions and issuing Recommendations on them with a view to standardizing
telecommunications on a worldwide basis.
The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes
the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.
The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.
In some areas of information technology which fall within ITU-T's purview, the necessary standards are
prepared on a collaborative basis with ISO and IEC.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other
obligatory language such as "must" and the negative equivalents are used to express requirements. The use of
such words does not suggest that compliance with the Recommendation is required of any party.
INTELLECTUAL PROPERTY RIGHTS
ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve
the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or
applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of
the Recommendation development process.
As of the date of approval of this Recommendation, ITU had not received notice of intellectual property,
protected by patents/software copyrights, which may be required to implement this Recommendation.
However, implementers are cautioned that this may not represent the latest information and are therefore
strongly urged to consult the appropriate ITU-T databases available via the ITU-T website at
http://www.itu.int/ITU-T/ipr/.
© ITU 2022
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.
vi Rec. ITU-T X.1054 (04/2021)
© ISO/IEC 2020 – All rights reserved

CONTENTS
Page
1 Scope . 1
2 Normative references . 1
3 Definitions . 1
4 Abbreviations . 2
5 Use and structure of this Recommendation | International Standard . 2
6 Governance and management standards . 2
6.1 Overview . 2
6.2 Governance activities within the scope of an ISMS . 2
6.3 Other related standards . 3
6.4 Thread of governance within the organization . 3
7 Entity governance and information security governance . 4
7.1 Overview . 4
7.2 Objectives . 4
7.3 Processes . 5
8 The governing body's requirements on the ISMS . 7
8.1 Organization and ISMS . 7
8.2 Scenarios (see Annex B) . 8
Annex A – Governance relationship . 10
Annex B – Types of ISMS organization . 11
Annex C – Examples of communication . 12
Bibliography . 13
Rec. ITU-T X.1054 (04/2021) vii
© ISO/IEC 2020 – All rights reserved

Introduction
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T
is responsible for studying technical, operating, and tariff questions and issuing Recommendations on them with a view
to standardizing telecommunications on a world-wide basis. The World Telecommunication Standardization Assembly
(WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups that, in turn, produce
Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in
WTSA Resolution 1. In some areas of information technology that fall within ITU-T's purview, the necessary standards
are prepared on a collaborative basis with ISO and IEC.
ISO (the International Organization for Standardization) and IEC (the International Electro technical Commission) form
the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of Recommendation | International Standards through technical committees established by the respective
organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of
mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work. In the field of Information security, cybersecurity and privacy protection, ISO and IEC have
established a joint technical committee, ISO/IEC JTC 1.
This Recommendation | International Standard has been drafted in accordance with the rules given in the ISO/IEC
Directives, Part 2.
The main task of the joint technical committee is to prepare this Recommendation | International Standard. Draft
Recommendation | International Standards adopted by the joint technical committee are circulated to national bodies for
voting. Publication as an International Standard requires approval by at least 75% of the national bodies casting a vote.
Attention is drawn to the possibility that some
...


INTERNATIONAL ISO/IEC
STANDARD 27014
Second edition
2020-12
Information security, cybersecurity
and privacy protection — Governance
of information security
Sécurité de l'information, cybersécurité et protection de la vie
privée — Gouvernance de la sécurité de l'information
Reference number
©
ISO/IEC 2020
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Use and structure of this document . 2
6 Governance and management standards . 2
6.1 Overview . 2
6.2 Governance activities within the scope of an ISMS . 3
6.3 Other related standards . 4
6.4 Thread of governance within the organization. 4
7 Entity governance and information security governance . 4
7.1 Overview . 4
7.2 Objectives. 5
7.2.1 Objective 1: Establish integrated comprehensive entity-wide information
security . 5
7.2.2 Objective 2: Make decisions using a risk-based approach . 5
7.2.3 Objective 3: Set the direction of acquisition . 5
7.2.4 Objective 4: Ensure conformance with internal and external requirements . 5
7.2.5 Objective 5: Foster a security-positive culture . 6
7.2.6 Objective 6: Ensure the security performance meets current and future
requirements of the entity . 6
7.3 Processes . 6
7.3.1 General. 6
7.3.2 Evaluate . 7
7.3.3 Direct . 8
7.3.4 Monitor . . 8
7.3.5 Communicate . 9
8 The governing body’s requirements on the ISMS . 9
8.1 Organization and ISMS . 9
8.2 Scenarios (see Annex B).10
Annex A (informative) Governance relationship .12
Annex B (informative) Types of ISMS organization .13
Annex C (informative) Examples of communication .15
Bibliography .16
© ISO/IEC 2020 – All rights reserved iii

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www .iso .org/
iso/ foreword .html.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection, in collaboration with ITU-T.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/ members .html.
This second edition cancels and replaces the first edition (ISO/IEC 27014:2013), which has been
technically revised. The main changes compared to the previous edition are as follows:
— the document has been aligned with ISO/IEC 27001:2013;
— the requirements in ISO/IEC 27001 which are governance activities have been explained;
— the objectives and processes of information security governance have been described.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/ members .html.
iv © ISO/IEC 2020 – All rights reserved

Introduction
Information security is a key issue for organizations, amplified by rapid advances in attack
methodologies and technologies, and corresponding increased regulatory pressures.
The failure of an organization’s information security controls can have many adverse impacts on an
organization and its interested parties including, but not limited to, the undermining of trust.
Governance of information security is the use of resources to ensure effective implementation of
information security, and provides assurance that:
— directives concerning information security will be followed; and
— the governing body will receive reliable and relevant reporting about information security–related
activities.
This assists the governing body to make decisions concerning the strategic objectives for the
organization by providing information about information security that can affect these objectives. It
also ensures that information security strategy aligns with the overall objectives of the entity.
Managers and others working in organizations need to understand:
— the governance requirements that affect their work; and
— how to meet governance requirements that require them to take action.
© ISO/IEC 2020 – All rights reserved v

INTERNATIONAL STANDARD ISO/IEC 27014:2020(E)
Information security, cybersecurity and privacy
protection — Governance of information security
1 Scope
This document provides guidance on concepts, objectives and processes for the governance of
information security, by which organizations can evaluate, direct, monitor and communicate the
information security-related processes within the organization.
The intended audience for this document is:
— governing body and top management;
— those who are responsible for evaluating, directing and monitoring an information security
management system (ISMS) based on ISO/IEC 27001;
— those responsible for information security management that takes place outside the scope of an
ISMS based on ISO/IEC 27001, but within the scope of governance.
This document is applicable to all types and sizes of organizations.
All references to an ISMS in this document apply to an ISMS based on ISO/IEC 27001.
This document focuses on the three types of ISMS organizations given in Annex B. However, this
document can also be used by other types of organizations.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27000 and the
following apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
3.1
entity
organization and other bodies or parties
Note 1 to entry: An entity can be a group of companies, or a single company, or a non for profit company, or other.
The entity has governance authority over the organization. The entity can be identical to the organization, for
example in smaller companies.
© ISO/IEC 2020 – All rights reserved 1

3.2
organization
part of an entity (3.1) which runs and manages an ISMS
3.3
governing body
person or group of people who are accountable for the performance and conformance of the entity
[SOURCE: ISO/IEC 27000:2018, 3.24, modified — “organization” has been replaced by “entity”]
3.4
top management
person or group of people who directs and controls an organization at the highest level
Note 1 to entry: Top management has the power to delegate authority and provide resources
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.