Project Brief
Document Sign Off
Name |
Role |
Scope |
Alastair Fenemore |
Project Sponsor |
|
Robin Rice |
Service Owner |
|
Tony Weir | ||
David Fergusson |
Background
DSH is a secure platform situated within the UoE premises where arrangements and procedures are in place to ensure sensitive data can be held, received and analysed securely. All types of sensitive data (e.g., health, administrative, education, commercial etc.) can be stored and processed on the platform during the lifecycle of the project. The platform is developed for UoE researchers to work with sensitive research data they generate or acquire from other data providers.
The DSH provides a secure storage space and a secure analytic environment that is appropriate for all research projects working with different kinds of sensitive data. It has its own firewall and is isolated from the University network. It is located in a secure environment with controlled access. All traffic between the DSH and the user’s computer is encrypted and no internet access is available.
The Data Safe Haven was delivered by Project RSS016 (Data Safe Haven) which completed in Nov.18 once the initial pilots were confirmed successful.
Scope
ISO27001 is a standard which adopts a process based approach for establishing, implementing, operating, monitoring, maintaining, and improving your ISMS (Information Risk Management System). The ISO 27001 standard and ISMS provides a framework for information security management best practice that helps organisations to: Protect client and employee information.
Given the nature of the Data Safe Haven and the organisations that will supply the Data that researchers require. It is deemed if not completely necessary to gain the ISO27001 Certification then highly beneficial.
Currently there is a bottleneck getting Data authorised by Data Owners, the various NHS Organisations being prime example. It is accepted by both us and them that this bottleneck would be vastly reduced, if not completely removed. Providing a major benefit to all involved, primarily the Research Projects.
Objectives and Deliverables
The objectives of the ISO27001 Project are to satisfy the 114 controls defined by the ISO Process where necessary and agreed. We have already carried out the Initial Risk analysis which has been shared to the Project Board. This is being used to identify what we need to do to achieve to ensure we are ISO compliant when we have our next Risk Analysis carried out by a Third Party Auditor. We expect this to be within 12 months, although this is purely hypothetical at the moment and will remain that way until we have a published, agreed plan with agreed objectives, deliverables and resources.
These Focus Areas and Associated Tasks will be encompassed in the initial plan and ongoing plan to completion.
Focus Area |
Key Tasks |
Notes. |
Governance |
Commence meeting process. |
First step in the ‘top-down’ approach to security. Obligation is to provide evidence of strategic ownership of security and to demonstrate that appropriate reporting takes place to enable strategic security decision-making. Initial discussions suggest there is reasonable opportunity to deliver some quick wins by simply defining a structure and operating regime. If there are concerns around the availability of senior staff then the SWG should be formed at the project level to discharge responsibilities and simply ensure that there is a line of reporting, most likely to CISO level. |
Roles and Responsibilities |
Confirm and document all security related roles and responsibilities. |
This is simply about documenting roles / responsibilities. Key ones are defined in the ISMS scoping document, but there continues to be some discussion about funding availability for different roles. It is important to take a strategic view and initially identify the security role requirements then to fill accordingly. A workshop with key stakeholders is recommended. |
Policy and Procedures |
|
To the outside observer (or auditor) there appears to be a little confusion about the interaction of wider UoE policies and standards and those that need to be drafted specifically for DSH. All interested parties need to be brought together to determine what existing university documentation can be extended to DSH and to identify where new policy / procedures need to be drafted. It is important to make best use of what already exists and resist the urge to draft lots of new material if possible. |
Risk Assessment and Management |
|
This work has already started and this focus area is simply about the continuation of that process by ensuring that all recommendations are adopted. On-going work will be to ensure the risk assessment is regularly updated and up to date prior to the external certification assessment. |
Statement of Applicability |
|
The outcome of the risk assessment process will provide a firm foundation for the production of an SoA, particularly as there is already ISO27001 control cross referencing within the risk assessment spreadsheet. The SoA will be regularly updated throughout the project as key controls such as IDS/IPS are implemented. |
Asset Management |
|
It is important to ensure that asset registers are complete and that information assets and the protection of these properly reflects the information classification scheme in place. So for example, if the classification policy states that all assets will be labeled, an auditor will check to ensure this is taking place. |
Incident Management |
|
It has been suggested that NHS stakeholders may have expressed some concerns re the current IM process. This feedback will be taken account of during the review / update process.
|
Performance Metrics |
|
We have defined one core security objective and 8 supporting objectives. A process will be defined to provide evidence of how security arrangements directly support these objectives. We will use SMART (Specific, Measurable, Attainable, Realistic and Time Bond) criteria to illustrate how this works, providing clear evidence of application for the external auditor. |
ISMS Review / Internal Audit |
|
This is a mandatory compliance aspect, which requires the definition of a process to be applied and confirmation of the evidential aretefacts that need to come out of this. It is important to confirm who will undertake the audit as this can be done internally or as an extension of the audit contract in place with BDO. Audits can be ‘one-off’ and annual in the traditional sense, but ideally procedures should be embedded in normal operations, perhaps with a different focus area being reviewed on a monthly basis. |
Technical Controls |
|
This is both follow-on from the risk assessment work and an extension of work that is already on going, such as that in relation to the deployment of IDS/IPS. In terms of what ISO27001 requires, it is not simply about the implementation of controls but a definition of what they are required to achieve that is directly traceable to inherent risk. Controls must be demonstrated to be effective and therefore evidence is necessary, particularly in areas such as protective monitoring. |