There were a number of inconsistencies in the 2005 code of practice which do seem to have been addressed in this draft:
Some of the section elements have been removed:
Addressing security when dealing with customers (6.2.2)
Controls against mobile code (10.4.2)
Information handling procedures (10.7.3)
Security of system documentation (10.7.4)
Business information systems (10.8.5)
Publicly available information (10.9.3)
User information for external connections (11.4.2)
Equipment identification in networks (11.4.3)
Remote diagnostic and configuration port protection (11.4.4)
Network connection control (11.4.6)
Network routing control (11.4.7)
Input data validation (12.2.1)
Control of internal processing (12.2.2)
Message integrity (12.2.3)
Output data validation (12.2.4)
Session timeout (11.5.5)
Limitation of connection time (11.5.6)
Sensitive system isolation (11.6.2)
Information leakage (12.5.4)
Business continuity and risk assessment (14.1.2)
Developing and implementing business continuity plans (14.1.3)
Business continuity planning framework (14.1.4)
Prevention of misuse of information processing facilities (15.1.5)
Protection of information systems audit tools ( 15.3.2)
These controls have not entirely abandoned but have been incorporated elsewhere in the standard or have been renamed for clarity but are not duplicated as before.
There will be 14 sections in the new standard instead of the 11 sections in the 2005 standard but the number of controls required to be addressed has come down from 133 to a mere 113.
- Normative references
- Terms and definitions
- Structure of this standard
- Security Policies
- Organisation of information security (now includes controls for mobile devices, apps and teleworking).
- Human resource security
- Asset management
- Access control (Password is supplemented by Secret Authentication to recognise that other methods may be used to validate users identity)
- Cryptography (now given a separate section to recognise its importance)
- Physical and environmental security
- Operations security (operations and communication now separate sections)
- Communications security
- System acquisition, development and maintenance
- Supplier relationships (new separate section).
- Information security incident management
- Information security aspects of business continuity management
The revised standard seems to be more ordered rather that the splatter approach used in the 2005 standard. As mentioned in the 27001 blog last time, it is a pity that there is not more emphasis on the cloud, but there is still time for this to be incorporated.
Remember, this is only a draft and it may (almost certainly will) change before final publication in 4th qtr 2013.