This post may contain affiliate links, please read our affiliate disclosure to learn more.
British Standard 7799: How Influential Is British Standard 7799?

British Standard 7799: How Influential Is British Standard 7799?

Author
 By Charles Joseph | Cybersecurity Researcher
Clock
 Published on December 15th, 2023

British Standard 7799, often abbreviated as BS 7799, is a set of detailed guidelines and procedures that outline the best practices for managing information security. Introduced in the United Kingdom, it addresses a wide range of security issues including risk assessment and management, business continuity planning, physical security, and personnel security. The objective is to protect information assets against threats to confidentiality, integrity and availability. There are two parts to this standard: BS 7799-1 provides an overview of the recommendations, while BS 7799-2 outlines the specifications for implementing a successful Information Security Management System (ISMS).

British Standard 7799 Examples

1. Physical Security Implementation

Imagine a business that decides to embrace the guidelines outlined in British Standard 7799, specifically focusing on the physical security aspects. They understand that securing their physical infrastructure is as important as securing the digital landscape in today’s interconnected world.

NordVPN 67% off + 3-month VPN coupon

Stay One Step Ahead of Cyber Threats

Want to Be the Smartest Guy in the Room? Get the Latest Cybersecurity News and Insights.
We respect your privacy and you can unsubscribe anytime.

As part of the process, the company installs high-quality surveillance cameras in strategic locations around the workplace, effectively covering all key areas. This is in accordance with BS 7799’s recommendation stressing the importance of monitoring the physical environment to enhance security.

The company also revamps its access control system, focusing on making all points of entry into sensitive areas secure. Doors leading to server rooms or data storage areas are fitted with biometric readers or badge-based access systems. The strict protocols for access essentially limit the number of people who can enter these zones, reducing risks associated with unauthorized access.

This example demonstrates how British Standard 7799 can guide and assist a business in enhancing its physical security and, by extension, its overall information security posture.

2. Risk Assessment and Management

In this example, a certain organization employs the guidelines set by British Standard 7799 to enhance their information security structure. Recognizing the increasing threats in the cyber world, they focus on the risk assessment and management provisions outlined by this standard.

According to BS 7799, risk assessment involves identifying and analyzing potential security vulnerabilities that could compromise the organization’s information assets. The company diligently reviews its systems and discovers potential weaknesses that could be exploited by cybercriminals.

With the potential risks identified, the organization now turns to the management aspect. Using the standard’s recommendations, they address the identified vulnerabilities by implementing different protective measures. For instance, they install robust firewalls to block unauthorized access and create secure procedures for data encryption to protect the sensitive data they handle.

This example showcases the importance of risk assessment and management procedures in information security, guided by the effective standards prescribed by BS 7799.

3. Information Security Management System Set-up

Consider an IT enterprise that seeks to build an Information Security Management System (ISMS) based on the guidelines of British Standard 7799. This venture goes beyond simple protective measures, but instead creates a comprehensive structure for their organization’s security practices.

According to BS 7799, an ISMS encompasses various components including information security policies, processes, and controls. The IT company drafts detailed security policies, providing a blueprint about how information security will be handled within the organization. It further establishes processes for managing its information assets in a way that ensures seamless business continuity while minimizing security risks.

The next step includes applying various controls in line with the standard’s recommendations. It focuses on preventive, detective, and corrective controls for comprehensive risk management. In this phase, potential threats are identified, protective measures are implemented, and methods for addressing security incidents are laid out.

This example demonstrates how British Standard 7799 provides a systematic approach to managing and enhancing an organization’s cybersecurity posture by creating a robust Information Security Management System.

Conclusion

Through the three examples, we can see the extent of British Standard 7799’s influence on various facets of information security management. It acts as a compass that guides organizations, regardless of their size or nature of business, to establish, implement, manage and improve their security practices, thereby minimizing vulnerabilities and managing risks effectively.

Key Takeaways

  • British Standard 7799 provides a comprehensive guide on the best practices for information security management.
  • It addresses various aspects of security, including physical security, risk assessment and management, and business continuity planning.
  • British Standard 7799 comprises two parts: BS 7799-1, which offers the guidelines and recommendations, and BS 7799-2, which provides the specifications for the implementation of an ISMS.
  • An ISMS is a systematic approach to managing information security that comprises of policies, procedures and controls.
  • Adapting British Standard 7799 aids in achieving business resilience through effective management and control of information security risks.

Related Questions

1. What’s an ISMS and why is it significant?

An Information Security Management System (ISMS) is a set of policies and procedures that manage an organization’s sensitive data. It plays a significant role in maintaining the integrity, availability, and confidentiality of information by applying risk management processes and giving sufficient assurance to interested parties like stakeholders and customers.

2. How does British Standard 7799 assist in business continuity planning?

British Standard 7799 provides guidance for the development and implementation of business continuity plans. By identifying potential risks and having predefined responses, businesses can ensure they can continue functioning effectively in the event of security breaches or other disruptive incidents.

3. Why is risk assessment an essential part of British Standard 7799?

Risk assessment is essential as it allows organizations to identify their vulnerabilities and understand the potential impact of information security breaches. British Standard 7799 advocates for risk assessments as part of an ongoing procedure to ensure continued security management.

4. What’s the purpose of access control as per British Standard 7799?

As per BS 7799, access control is implemented to protect information from unauthorized access. By restricting the access to only authorized personnel, it significantly reduces the risk of malicious activities or mishandling of privileged data.

5. Is British Standard 7799 applicable to any organization?

Yes, British Standard 7799 can be applied to any organization, regardless of its size or nature of business. It provides a comprehensive set of guidelines that can benefit businesses across all industries in managing their information security effectively.

QUOTE:
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional
Scroll to Top