{"id":11911,"date":"2017-09-11T20:56:10","date_gmt":"2017-09-11T20:56:10","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/?p=11911"},"modified":"2024-12-21T13:23:23","modified_gmt":"2024-12-21T13:23:23","slug":"iso-27001-vs-cyber-essentials-similarities-and-differences","status":"publish","type":"post","link":"https:\/\/staging.advisera.com\/27001academy\/blog\/2017\/09\/11\/iso-27001-vs-cyber-essentials-similarities-and-differences\/","title":{"rendered":"ISO 27001 vs. Cyber Essentials: Similarities and differences"},"content":{"rendered":"<p>In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection, but differences in resources and knowledge often result in data breaches because of the failure to implement basic security measures. To help handle such situations, the government in the United Kingdom came up with the Cyber Essentials program.<\/p>\n<p>This article presents an overview of the relationship between <a href=\"https:\/\/staging.advisera.com\/27001academy\/what-is-iso-27001\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 27001<\/a>, an ISO standard focused on information security management, and Cyber Essentials, a British government program that protects information from common Internet-based threats, considering information protection, and how they can be used together to increase the benefits to an organization\u2019s business.<\/p>\n<h3 style=\"padding-top: 5px;\"><span style=\"font-size: 20pt;\">General facts<\/span><\/h3>\n<p>Here is some information you may find useful for an initial understanding of ISO 27001 and Cyber Essentials:<\/p>\n<table class=\"table\" style=\"text-align: left; width: 100%;\" border=\"0\" cellspacing=\"2\" cellpadding=\"2\">\n<thead>\n<tr>\n<td style=\"width: 50%;\">ISO 27001<\/td>\n<td style=\"width: 50%;\">Cyber Essentials<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding-left: 5px;\">International standard<\/td>\n<td style=\"padding-left: 5px;\">Government program in the U.K.<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Defines requirements for the establishment, implementation, maintenance, and continual improvement of an Information Security Management System (ISMS)<\/td>\n<td style=\"padding-left: 5px;\">Defines a set of controls that cover the basics of cyber security related to common Internet-originated attacks against an organization\u2019s IT systems, and a mechanism to demonstrate that these precautions have been taken<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Applicable to any type and size of organization<\/td>\n<td style=\"padding-left: 5px;\">Applicable to any type and size of organization<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Implementation and certification are optional.<\/td>\n<td style=\"padding-left: 5px;\">Implementation and certification are mandatory for UK government suppliers contracted for handling sensitive and personal information. For other purposes, they are optional.<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Current version: ISO 27001:2013<\/td>\n<td style=\"padding-left: 5px;\">Current version: Cyber Essentials 2015<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As you can see, both ISO 27001 and Cyber Essentials aim for information protection, but while ISO 27001 considers information regardless of where it is found (e.g., paper, information systems, digital media, etc.), Cyber Essentials focuses on protection of data and programs on networks, computers, servers, and other elements of an IT infrastructure.<\/p>\n<h2>ISO 27001 structure<\/h2>\n<p>ISO 27001 consists of 10 clauses and 114 generic <a href=\"https:\/\/staging.advisera.com\/27001academy\/documentation\/statement-of-applicability\/\" target=\"_blank\" rel=\"noopener noreferrer\">security controls<\/a> grouped into 14 sections (called \u201cAnnex A\u201d). For more information, see: <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2013\/01\/28\/a-first-look-at-the-new-iso-27001-2013-draft-version\/\">A first look at the new ISO 27001<\/a> and <a href=\"https:\/\/staging.advisera.com\/27001academy\/iso-27001-controls\/\" target=\"_blank\" rel=\"noopener noreferrer\">An overview of ISO 27001:2013 Annex A<\/a>.<\/p>\n<p>One of the limitations of ISO 27001 is that it does not provide detail on what to do to fulfill requirements or implement controls; it only tells you what you need to achieve. For implementation details, you can use ISO 27002 as guidance. For more information, see: <a href=\"https:\/\/staging.advisera.com\/27001academy\/knowledgebase\/iso-27001-vs-iso-27002\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 27001 vs. ISO 27002<\/a>.<br \/>\n<div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><br \/>\n<div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><\/p>\n<h2>Cyber Essentials structure, and similarities and differences with ISO 27001<\/h2>\n<p>On the other hand, the Cyber Essentials program consists of only five controls:<\/p>\n<p><strong><em>Boundary firewalls and Internet gateways:<\/em><\/strong> These are devices with the function to prevent unauthorized access between networks. This control can be related to ISO 27001 Annex A control section A.13.1 (Network security management). For more information, see <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2015\/05\/25\/how-to-use-firewalls-in-iso-27001-and-iso-27002-implementation\/\">How to use firewalls in ISO 27001 and ISO 27002 implementation<\/a>.<\/p>\n<p><strong><em>Secure configuration:<\/em><\/strong> This involves practices to ensure that systems are configured in the most secure way considering the organization\u2019s requirements. This control can be covered by ISO 27001 Annex A control section A.12.1 (Operational procedures and responsibilities).<\/p>\n<p><strong><em>Access control:<\/em><\/strong> This is a method of ensuring that only those who should have access to systems, actually do have access, and at the appropriate levels. This control can be related to ISO 27001 Annex A control section A.9.2 (User <a href=\"https:\/\/staging.advisera.com\/27001academy\/documentation\/access-control-policy\/\" target=\"_blank\" rel=\"noopener noreferrer\">access management<\/a>). For more information, see <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2015\/07\/27\/how-to-handle-access-control-according-to-iso-27001\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to handle access control according to ISO 27001<\/a>.<\/p>\n<p><strong><em>Malware protection:<\/em><\/strong> This ensures that protection against viruses and malware is installed and up to date. This control can be related to ISO 27001 Annex A control section A.12.2 (Protection from malware).<\/p>\n<p><strong><em>Patch management:<\/em><\/strong> This involves ensuring that the latest supported versions of applications are used, and that all the necessary patches supplied by the vendor have been applied. This <a href=\"https:\/\/staging.advisera.com\/27001academy\/documentation\/security-procedures-for-it-department\/\" target=\"_blank\" rel=\"noopener noreferrer\">control<\/a> can be related to ISO 27001 Annex A control section A.12.6 (Technical vulnerability management). For more information, see <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2015\/10\/12\/how-to-manage-technical-vulnerabilities-according-to-iso-27001-control-a-12-6-1\/\">How to manage technical vulnerabilities according to ISO 27001 control A.12.6.1<\/a>.<\/p>\n<p>These controls are subject to two certification levels:<\/p>\n<p><strong>Cyber Essentials:<\/strong> a certification awarded based on a self-assessment questionnaire regarding compliance with the Cyber Essentials control themes, approved by a senior executive (e.g., CEO), which is verified by an independent certification body. This option offers a basic level of assurance and can be achieved at a low cost.<\/p>\n<p><strong>Cyber Essentials Plus:<\/strong> a certification awarded based on external testing of the organization\u2019s cyber security approach, performed by an independent certification body. This option costs more than the Cyber Essentials certification, but offers a higher level of assurance.<\/p>\n<p>In terms of a PDCA cycle, ISO 27001 and Cyber Essentials can be compared as follows:<\/p>\n<table class=\"table\" style=\"text-align: left; width: 100%;\" border=\"0\" cellspacing=\"2\" cellpadding=\"2\">\n<thead>\n<tr>\n<td style=\"width: 20%;\">PDCA Cycle<\/td>\n<td style=\"width: 40%;\">ISO 27001:2013 clauses<\/td>\n<td style=\"width: 40%;\">Cyber Essentials<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding-left: 5px;\">Plan<\/td>\n<td style=\"padding-left: 5px;\">Clause 4 &#8211; Context of the organization<br \/>\nClause 5 &#8211; Leadership<br \/>\nClause 6 &#8211; Planning<br \/>\nClause 7 &#8211; Support<\/td>\n<td style=\"padding-left: 5px;\">Cyber Essentials Requirements for basic technical protection from cyber attacks<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Do<\/td>\n<td style=\"padding-left: 5px;\">Clause 8 &#8211; Operation<\/td>\n<td style=\"padding-left: 5px;\">Cyber Essentials Requirements for basic technical protection from cyber attacks<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Check<\/td>\n<td style=\"padding-left: 5px;\">Clause 9 &#8211; Performance evaluation<\/td>\n<td style=\"padding-left: 5px;\">Cyber Essentials Assurance Framework<\/td>\n<\/tr>\n<tr>\n<td style=\"padding-left: 5px;\">Act<\/td>\n<td style=\"padding-left: 5px;\">Clause 10 &#8211; Continual improvement<\/td>\n<td style=\"padding-left: 5px;\">&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>So, in short, while ISO 27001 lacks the \u201chow to\u201d details on how the controls should be implemented, Cyber Essentials provides more detailed information. You can think of Cyber Essentials as a specific set of ISO 27002 controls, which also provides details regarding how to implement the controls mentioned at the beginning of this section.<\/p>\n<h2>How can we use Cyber Essentials and ISO 27001 together?<\/h2>\n<p>There is no exact answer for this question, because it depends on the organization and its requirements. One approach is to start the ISO 27001 implementation first, because it covers general information security management (of which cyber security is only a part), and then covering Cyber Essentials\u2019 controls in the organization\u2019s cyber environment, but this will be a longer and more expensive path.<\/p>\n<p>Another alternative is to consider Cyber Essentials first and, after that, to make arrangements to include the program in the ISO 27001 implementation project. This way, you will ensure that the <a href=\"https:\/\/staging.advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=management-system&#038;doc=information-security-policy\" target=\"_blank\" rel=\"noopener\">ISMS<\/a>\u2019s continual improvement activities will also cover the Cyber Essentials requirements according to the organization\u2019s security needs.<\/p>\n<p>For more information about ISO 27001 implementation, see:\u00a0<a href=\"https:\/\/info.staging.advisera.com\/27001academy\/free-download\/diagram-of-iso-27001-implementation-process\" target=\"_blank\" rel=\"noopener noreferrer\">Diagram of ISO 27001:2013 Implementation<\/a>.<\/p>\n<p>The important thing here is that you see both ISO 27001 and Cyber Essentials as complementary materials that can help an organization to provide customer services with proper security.<\/p>\n<p><span class=\"notion-enable-hover\" data-token-index=\"0\"><em>To learn how to comply with ISO 27001, while also implementing privacy and cybersecurity controls,<\/em>\u00a0<\/span><a class=\"notion-link-token notion-focusable-token notion-enable-hover\" tabindex=\"0\" href=\"https:\/\/staging.advisera.com\/conformio\/\" target=\"_blank\" rel=\"noopener\" data-token-index=\"1\"><span class=\"link-annotation-unknown-block-id-1092142182\">sign up for a free trial<\/span><\/a><span class=\"notion-enable-hover\" data-token-index=\"2\">\u00a0<em>of Conformio, the leading ISO 27001 compliance software.<\/em><\/span><!-- notionvc: 6533b33f-dd92-4180-ab0a-28420ba41cf1 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection, but differences in resources and knowledge often result in data breaches because of the failure to implement basic security measures. To help handle such situations, the government in the United Kingdom came up with the &#8230;<\/p>\n","protected":false},"author":41,"featured_media":11912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[381,996,1650,1651],"class_list":["post-11911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-iso-27001","tag-standard","tag-cyber-essentials","tag-scheme"],"acf":[],"_links":{"self":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/11911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=11911"}],"version-history":[{"count":1,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/11911\/revisions"}],"predecessor-version":[{"id":103226,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/11911\/revisions\/103226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/media\/11912"}],"wp:attachment":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=11911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=11911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=11911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}