IASME Cyber Assurance for Small Organisations (10 to 49 People)

 

Introduction

You’re an organisation with 10 to 49 people and are looking for comprehensive cyber security protection, where do you go? Have you achieved Cyber Essentials and looking for more? Are you considering ISO 27001 but think it’s too much for a micro organisation? This is where IASME Cyber Assurance can be a great fit – an information security standard that’s designed with smaller organisations in mind. In this article, we dive into the new (version 7) release of IASME Cyber Assurance and see how it can be applied to an organisation of 10 to 49 people.

 

What Is IASME Cyber Assurance?

 

Feature IASME Cyber Assurance Level One IASME Cyber Assurance Level Two
Assessment  Verified self-assessment Audit
Testing Assessor reviews self-assessment Assessor carries out audit and IASME moderator reviews
Controls 14 themes Same 14 themes
Certification 12 month certificate 3 year certificate, with annual (Level One) renewals

This table shows the key differences between IASME Cyber Assurance Level One and Two

 

Which themes and requirements apply to an organisation with 10 to 49 people?

Themes Further insight on aim of the theme  Number of Mandatory requirements for 10 to 49 person organisation
Planning Consider information security for day-to-day activity and projects 1
Organisation Have a clear structure and foundation for effective security 3
Assets Understand what you have and how to protect it 6
Legal and Regulatory  Consider contractual obligations, data protection requirements and more 3
Risk Identify threats, treat and manage them appropriately 6
Physical and environmental Prevent theft, loss or damage and ensure protection from temperatures or humidity 7
People Consider education, awareness, training and least privilege 3
Policy  For ‘right-sized’ security controls 5
Managing Access Implement appropriate access to resources and data 2
Technical Intrusion Leverage tools to detect and prevent unauthorised access 2
Change Management Control and manage key changes 1
Secure Operations Take action based on warning and alerts 2
Backups and Restores Have regular and segregated data backups – test to ensure recovery 4
Resilience Business continuity, incident management and disaster recovery 3

The table shows the 14 themes, along with a brief outline of the aim of each theme, and shows the number mandatory requirements for each theme, based on an organisation with 10 – 49 people 

 

What are the mandatory requirements for an organisation of 10 to 49 people?

Number of employees Mandatory Requirements Non-Mandatory Requirements (considered based on risk)
1 – 2 people 20 45
3 to 9 people  32 33
10 – 49 people  48 17
50 or more people 65 0

This table shows how the total number of requirements can be applied, based on organisational size

Details can be found in the standard, which is located on the IASME website here – a brief summary relating to the 32 requirements for a 10 to 49 person organisation is provided below (based on interpretation and paraphrasing):

  1. Make provisions for information security as part of business planning 
  2. Ensure commitment, funding, and accountability for information security from the top
  3. Appoint a suitably skilled leader to coordinate and act on information security activities
  4. Define SLA’s or other contracts for partners and the supply chain
  5. Keep an up-to-date register of all information assets (including personal / BYOD)
  6. For each asset, include category, location, value, and owner
  7. Clearly identify sensitive assets 
  8. Encrypt sensitive data, removable media, portable devices, and data stored on the cloud (including in transit to/from the cloud)
  9. Review data held at least annually to ensure relevance and accuracy  
  10. Ensure assets are disposed of securely and removed from the asset register
  11. Maintain a list of requirements by legal, statutory, regulatory, and contractual obligations 
  12. Have processes and support to fulfil legal obligations 
  13. Ensure business records are protected from loss, destruction, or falsification 
  14. Have an up-to-date and well-maintained risk assessment
  15. Extend risk assessment to cover customers, partners, contractors, and suppliers 
  16. Keep up to date with emerging cyber threats
  17. Agree on organisational acceptance of risk 
  18. Assign an owner to each risk and its treatment
  19. Create action plans from the risk assessment
  20. Ensure risk assessment covers physical harm to assets
  21. Include physical security that may be dictated by law and third parties 
  22. Consider physical access control to protect your office environment
  23. Restrict access to wired and wireless networks to authorised users only
  24. Keep confidential information away from those not authorised to see and store it securely 
  25. Ensure physical and environmental protection for assets taken away from the premises 
  26. Ensure your environment is suitable for your equipment needs
  27. Have rules for the acceptable use of company assets
  28. Ensure appropriate access to data 
  29. Have a suitable joiners, leavers, movers, and termination procedure 
  30. Have a comprehensive, yet right-sized security policy
  31. Ensure policies include purpose, scope, requirements, review, monitoring and breaches
  32. Distribute policies to all people responsible for implementing them
  33. Ensure policy understanding 
  34. Ensure policy review and updates
  35. Provide people access to resources and data necessary for their roles, but no more
  36. Ensure accounts and devices do not remain signed in indefinitely 
  37. Detect unauthorised activity, deploying technical tools to support
  38. Review and act upon output from your tools, scans, and testing at least weekly
  39. Have documented change procedures
  40. Track and monitor systems, identifying unacceptable issues and improving security posture
  41. Pay attention to warnings and reporting, and take appropriate action 
  42. Backup at least weekly and before a significant change 
  43. Have at least one backup that’s off-site / some distance from the working copy
  44. Ensure logical segregation and appropriate security of backups
  45. Test restores (of data backups) at least monthly  
  46. Have a Business Impact Assessment, Business Continuity, and Disaster Recovery Plan
  47. Exercise your plan at least annually and keep it up to date to account for change
  48. Learn lessons from events

 

How RB Consultancy Ltd Help?

As an Assessor and Certification Body for IASME Cyber Assurance, we carry out assessments and issue certificates for both levels of the scheme. Holding a Certified Information Systems Security Professional (CISSP) certification, we can also help organisations implement the security measures and provide support through the process. We have templates and documentation to leverage that can also assist with each theme, and can therefore provide completed packages to support.

 

Conclusion – how Cyber Assurance can help organisations between 10 and 49 people

IASME Cyber Assurance can be a great next step beyond Cyber Essentials. It provides additional confidence and assurance that a variety of security measures are in place to protect organisations. These security measures can be applied based on organisational size and risk. For an organisation of 10 to 49, there are 48 mandatory requirements for the scheme. With our credentials and experience, we help organisations through both levels of the scheme and issue the associated certificates. If you would like more information or any support with IASME Cyber Assurance, please contact us.

 

 

Written by Remo Belisari, Managing Director of RB Consultancy Ltd, an experienced cyber security professional and cyber advisor. Remo holds certifications relating to CISSP, ISSAP, ISO 27001, Cyber Essentials, IASME Cyber Assurance, and has many years experience in IT and cyber security. Remo has a history of supporting organisations from over the world – including a Fortune 500 in USA and over 100 organisations across the UK. The views expressed in this blog are those of the author and do not necessarily reflect the views of RB Consultancy Ltd, its clients, partners, or affiliated organisations. The content is intended for general information only.

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *