Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?
As one of the first compliance software companies to offer the ISO 27701 framework after having offered ISO 27001 for a few years, we thought we’d dig into what really sets these two standards apart and what the certification process looks like for each.
ISO 27001:2022 is a global standard for creating and supporting information security management systems (ISMS). Certification in ISO 27001 shows that a company has the tools and processes to protect data and comply with laws. ISO 27001:2022 updates the older version, ISO 27001:2013.
In addition to helping companies, non-profits, and public sector institutions safeguard information and conform to regulations, ISO 27001 also sets companies up for risk awareness. When an organization understands the nature and severity of cybersecurity risks, it can proactively defend against them.
ISO 27001 and 27701 are part of the ISO 27000 family of standards, which provides a framework for best practices in information security management. The ISO 27000 series is the joint work of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It applies to organizations of all sizes and sectors.
Key takeaways:
The standard’s purpose is to support companies as they build their ISMS. An information management system protects and enhances an organization’s data CIA (confidentiality, integrity, and availability).
By creating a dedicated ISMS, an organization moves beyond inconsistent efforts to structured, repeatable, documented security processes. Instead of reacting to incidents, an ISO-27001-compliant organization anticipates, identifies, and resists threats. A solid ISMS promotes security consciousness throughout an organization. Importantly, it shows partners, customers, and users that it has the processes and acumen to protect data.
The scope extends to anything the ISMS protects for an organization, from data to devices to systems and services.
ISO 27001 scope includes:
To comply with ISO 27001, you must meet requirements regarding the organization's security needs, leadership support, regular assessments, training, operations, and more.
The seven essential compliance requirements of ISO 27001 are:
In addition to those seven requirements, ISO 27001:2022 outlines 93 controls in Annex A. A control is a policy or procedure used to mitigate a security risk. However, as is typical for any ISO standard, 27001 does not specify exactly how an organization should comply, offering organizations the flexibility to choose from the specified controls or create additional controls as needed.
ISO 27701 extends ISO 27001 with a focus on privacy. ISO 27701 specifies that companies use a privacy information system (PIMS) to support their ISMS. It also helps companies demonstrate compliance with the General Data Protection Regulation (GDPR).
ISO 27701 developed as concerns about data privacy grew and new privacy laws emerged, such as:
ISO 27701 specifications provide a convenient, streamlined approach to complying with various international standards. That’s critical for borderless organizations, such as ecommerce companies. Importantly, the standard also helps differentiate organizations in the marketplace by showing their attention to data privacy.
The purpose of ISO 27701 is to provide organizations with guidance on collecting, processing, and storing personally identifiable information (PII).
Personally identifiable information can include the following:
“ISO 27701 puts a formal program in place that supports building both internal governance practices and monitoring and governance down through the supply chain,” explains Michelle Strickler, Lead Product and Compliance Experience Strategist at Strike Graph.
“For example, to mitigate the risk of a breach of PII, an organization may require that all entities in the supply chain implement the highest level of encryption at rest on the market. If any downstream organization in the supply chain cannot implement this high standard, the organization may choose not to use them, accept the risk, or require other mitigating controls to protect sensitive PII.”
The standard defines the two main data-handler roles as data controllers and data processors:
As an example of how this works, consider an office supply store that contracts with a third-party fulfillment firm to deliver web orders. Customer information is collected on the store’s website and sent to the shipping firm to complete the order. In this scenario, the store is the PII controller, and the fulfillment company is the PII processor.
ISO 27701's scope describes the information, structures, and activities the PIMS controls in an organization. It also specifies who manages and maintains the PIMS. In addition, the scope notes the pertinent laws, regulations, and business commitments that govern an organization’s data protection approaches.
ISO 27701 builds on the security provisions of ISO 27001 and includes additional requirements for ensuring data privacy and security.
The ISO 27701 compliance requirements include the following:
ISO 27701 builds on and updates the controls listed in 27001 Annex A with 184 controls, 49 of which are PII-specific. ISO 27701 Annex A details PII controls for data controllers and Annex B covers PII controls for data processors.
The ISO 27701 controls comprise five domains:
The similarities between ISO 27001 and ISO 27701 start with the fact that they’re in the same ISO family of standards. Both standards aim to protect data assets through risk-based management and require third-party certification and continuous improvement of data protection systems.
You cannot get certified in ISO 27701 without first being certified in ISO 27001. ISO 27001 forms the security foundation for the privacy requirements in 27701. However, you can apply for certification for both at the same time.
“The advantage to dual certification is streamlining the programmatic elements of the information system-privacy management system (IS-PMS) covered by all the clauses. This makes auditing the clauses very efficient,” says Strickler.
“The challenge comes when the certification body is not well-versed in both information security and privacy practices. This forces them to split up the audit between available staff with the appropriate skill set and, in more than a few cases, this extends the audit by one to three weeks.”
ISO 27001 and ISO 27701 differ in their focus. ISO 27001 addresses information security and describes an ISMS. ISO 27701 addresses user privacy and PIMS creation. ISO 27001 also details more security areas than ISO 27701.
“ISO 27001 provides a foundation for overall information security practices, and ISO 27701 builds on this foundation to address specific privacy concerns, which are especially important for organizations handling personal data,” explains Stephen Ferrel, CISA CRISC, Chief Strategy Officer at Strike Graph.
“For example, a financial services company might implement ISO 27001 to secure all their information assets, and then extend to ISO 27701 to specifically address how they handle customer personal data in compliance with privacy regulations like GDPR.”
There are significant benefits to combining ISO 27001 and ISO 27701 certification. One benefit is it creates an integrated security and privacy framework. A combined certification process also streamlines internal and third-party auditing.
Strickler says that if an organization has the staff to plan and prepare for the ISO audit, a combined audit can shorten the time the teams are under audit. “If you have back-to-back Annex testing, you reduce duplicate reviews of clause conformity by separate auditors.”
When you certify simultaneously, you can also realize additional advantages:
The bottom line: If you have the staff and resources to do IS0 27001 and 27001 together, strongly consider it.
Implementing and managing ISO 27001 and ISO 27701 together can present challenges and rewards. Ensure you have strong managerial support for your efforts. Then, thoroughly understand your company's security context before you certify.
If you’re considering a combined ISO 27001 and 27701 certification process, follow these additional tips from Ferrell and Strickler:
Download our ISO 27001 and ISO 27701 Certification Checklist
Strike Graph automates your ISO 27001 and ISO 27701 compliance processes. Strike Graph tools and expertise save you time and resources. They help you bolster your information security and privacy stance.
“Including privacy in an existing framework requires a cultural shift in an organization,” says Ferrel. “An outside compliance consultant with deep subject matter expertise like Strike Graph can help smooth the transition.”
Strickler adds, “The Strike Graph platform provides cloud-based features to map controls and track evidence for your organization, and help you monitor and maintain your ISMS and PIMS. It comes preloaded with policy and procedure and checklist templates to build your documentation library and streamline auditing. Plus, Strike Graph has the information security experts to guide you through the ISO 27701 accreditation process.”
Want to learn how the controls and evidence for ISO 27001 and ISO 27701 map specifically for your organization? Set up a time to chat with a Strike Graph compliance expert. Bundling ISO 27001 and ISO 27701 using Strike Graph can save you hundreds of dollars and hours of wasted time.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
© 2024 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service
Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?