User Tools

Site Tools


products:ict:security:bs_7799

BS 7799, also known as British Standard 7799, was a set of information security standards published by the British Standards Institution (BSI) in the late 1990s and early 2000s. It was later adopted and developed into the ISO/IEC 27000 series of international standards for information security management systems (ISMS). BS 7799 played a significant role in shaping modern information security practices and standards. Here's a detailed explanation of BS 7799:

1. Background:

BS 7799 was first published in 1995 as a code of practice for information security management. It was designed to help organizations establish and implement effective information security policies and practices. The standard gained recognition and acceptance not only in the United Kingdom but also globally.

2. Structure and Evolution:

BS 7799 underwent several revisions and updates, leading to the development of multiple parts and versions:

 a. **BS 7799-1**: The original standard provided guidelines and recommendations for establishing and managing information security management systems (ISMS). It focused on control objectives and security practices.
 b. **BS 7799-2**: This part of the standard provided a specification for the certification of an ISMS. It outlined the requirements for an organization to achieve certification against the standard.

3. Adoption as ISO/IEC 27001:

BS 7799 served as the basis for the development of the ISO/IEC 27000 series of international standards. In 2005, the first edition of ISO/IEC 27001 was published, replacing the BS 7799-2 certification standard. ISO/IEC 27001 continued to build on the principles and structure of BS 7799 but with broader international acceptance.

4. ISO/IEC 27000 Series:

The ISO/IEC 27000 series includes various standards and guidelines related to information security management, risk management, and controls. Some of the key standards in this series include:

 a. **ISO/IEC 27001**: Provides requirements for establishing, implementing, maintaining, and continually improving an ISMS.
 b. **ISO/IEC 27002**: Offers a comprehensive set of security controls and best practices that organizations can use to address information security risks.
 c. **ISO/IEC 27005**: Focuses on risk management for information security, helping organizations identify, assess, and manage information security risks.
 d. **ISO/IEC 27018**: Addresses the protection of personally identifiable information (PII) in public cloud environments.

5. Benefits and Significance:

BS 7799 played a crucial role in advancing the field of information security. Its adoption and subsequent evolution into the ISO/IEC 27000 series of standards have had several benefits:

  1. Global Recognition: ISO/IEC 27001 and related standards are recognized and adopted globally, making it easier for organizations to establish and demonstrate effective information security practices.
  1. Risk Management: The standards emphasize the importance of risk management in information security, helping organizations proactively identify and mitigate risks.
  1. Structured Approach: BS 7799 and its successors provide a structured approach to information security management, making it easier for organizations to develop and maintain effective security programs.
  1. Compliance and Certification: ISO/IEC 27001 certification is widely sought by organizations to demonstrate their commitment to information security to customers, partners, and regulatory authorities.

In summary, BS 7799 was a pivotal information security standard that laid the foundation for the internationally recognized ISO/IEC 27000 series of standards. It contributed significantly to the development and adoption of best practices in information security management and continues to be a fundamental reference for organizations seeking to establish robust information security programs.

products/ict/security/bs_7799.txt · Last modified: 2023/09/21 10:43 by wikiadmin