Zygma adds another approved CSP to its list of clients - Experian's PID granted Kantara Approval renewal, March 2016
 
   Home      Site map      About Us      Legal       Contact

 

Services

ISO/IEC 27001

ISO 27001/05 Training

Kantara Support

Standards & Regulations

Papers

Certificates

Partners

Curricula Vitae

http://news.bbc.co.uk

Standards


Information Security Management
IT Service Management
Federal Information Security Management Act
FIPS 201
Sarbanes-Oxley Act
Gramm-Leach-Bliley Act
Federal Financial Institutions Examination Council
Health Insurance Portability and Accountability Act
California SB 1386 & AB 1950
Payment Card Industry (PCI) Data Security Standard

standardization junior style!      

Zygma is active in the standards development arena.  Our CEO made early contribution to the development of BS 7799, antecedent of today's ISO/IEC 27001 and ISO/IEC 27002 (i.e. the information security management standards), and is today a leading contributor to the continued development of the '27xxx family' of standards.  He has also been a significant contributor to standardization development in Europe, where he worked on standards related to the European electronic signature directive.

Zygma can assist its clients compliance with regulations, legislation, imposed policies and their conformity to a range of standards.  Although our experience and approach allows us to analyze any regulation or standard, those which are the more common-place are listed below.

If you have needs in other areas don't hesitate to call - we have a demonstrated and published approach towards mapping your standards into an ISMS context, or we can do the same in an ITSM context.

We can also apply our Advanced Internal Control System (AIMS) to your need to demonstrate compliance and conformity with other regulation, policy and standards.

Contact us and let us respond to your requirements with a management framework which suits your business needs.

The more common regulation and standards for which we can provide support are these:

 

Information Security Management
We are specialists in the building, operation and auditing of ISMSs which follow ISO/IEC 27001 (and therefore 27002) and can also provide training (both classroom and on-the-job) and a skeleton ISMS.  Zygma's approach lets its clients get on the fast track towards certification.  Some will place great emphasis on ISO/IEC 27002 when talking about ISMS, but this is to miss the point: 27002 provides only guidance (albeit valuable, well-prepared guidance which reflects best practice) - 27001 provides the definitive requirements for implementing, operating and continually improving an ISMS, including a statement of applicability which says how each of the reference controls in its Annex A (for which 27002 provides implementation guidance) apply to the ISMS in question.  See other pages within our web site, such as QYSA and AIMS.

Back to Top»»

IT Service Management
Increasingly, requirements for oversight and information security are causing senior management to look at their provision of business functions in terms of services, whether their user community be internal to the organization or external to it.  ISO/IEC 20000 provides a set of requirements (in part 1) and guidance (part 2) which govern how a certifiable IT service management system should be implemented.  Again based on our AIMS skeleton, we can provide the back-bone of an ITSM strategy and help clients build into that all the compliance and standards conformity requirements they have.  Many of those specific needs may include one or more of the other standards we here mention.  Zygma's approach lets its clients get on the fast track towards certification.

Back to Top»»

Federal Information Security Management Act
The FISMA places requirements for information security management upon the heads of all Federal agencies and is supported by a range of standards and agency guidelines.  Zygma can assist agencies in constructing their information security management systems for specific systems.  We are undertaking pioneering work with the Federal PKI Authority to construct an ISO/IEC 27001-conformant ISMS which embraces all the applicable FISMA requirements and supports the C&A process.  This includes compliance mapping with such major FISMA supports as NIST SP 800-53 (Revision 1).

In 2008, under GSA funding, Zygma produced a detailed mapping of IS27001:2005 (requirements and controls), prepared as a potential Annex for SP 800-63 Rev2, which can be found here.   It provided a comprehensive mapping of not just the IS27001 Annex A controls against SP 800-53 but also aligned the requirements of IS27001 (i.e. clauses §4 to §8 inclusive) to controls in '-53 which were more akin to 'measures'.   For some reason NIST chose not to accept this work and to this day continues to map only to the Annex A controls, ignoring the alignment to IS27001's ISMS requirements.

Back to Top»»

FIPS 201
Zygma has produced assessment criteria for the Federal government (see our FIPS 201 page for details) and is highly conversant with the needs upon Federal departments, agencies and industry partners in the development and operation of a PIV system.  We can help clients establish their conformity and can provide independent audit of their systems.  We can also build an ISMS which will support and demonstrate the organization's FIPS 201 compliance.

Back to Top»»

Sarbanes-Oxley Act
The requirements of this Act, that public companies assess and publicly disclose the effectiveness of their internal controls as they relate to financial reporting and have those controls independently audited, have a direct relationship to information security management.  Virtually no business of any magnitude today operates without a high degree of dependence on IT systems, and hence the need for effective information security management in the SOX context is paramount.  We can help clients establish their SOX compliance through their ISMS, efficiently and effectively.

Back to Top»»

Gramm-Leach-Bliley Act
The GLBA imposes requirements on financial institutions to specify and implement an information security plan and to protect personal identifiable information (under its Safeguards Rule) and also to establish a published consumer privacy policy, giving the consumer the choice of opting in or out of certain provisions regarding information sharing.  The Act makes no suggestion as to how the information security plan should be realized:  Zygma's view is that by adopting a recognized standard which embodies best practices an institution gives itself the best defense against any challenge to its GLBA compliance. We can help you build and operate an ISMS which satisfies that need.

Back to Top»»

Federal Financial Institutions Examination Council
The FFIEC published its Information Security Booklet to supplement compliance with GLBA Section 501(b) guidelines. This booklet in turn refers to other standards which are recognized as being key contributors to a comprehensive management framework. Zygma's approach is to use either ISO/IEC 27001 or ISO/IEC 20000-1 as the management framework for defining how financial institutions can capture their information security management strategy and practice and apply the FFIEC guidelines in such a context.  The choice of ISMS or ITSM for the management system is the client's, although we would observe that the two are not mutually exclusive: an ITSM can embrace ISMS solutions and deliver broader assurance to the users of the services in question.

The following figure illustrates this approach:

Back to Top»»

Health Insurance Portability and Accountability Act
Covered entities (i.e. those organizations subject to the HIPAA security standard) have an obligation to "have in place appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information".  The 2003 revision to the HIPAA, the Security Standards, gives substantial guidance as to how this should be achieved, but does not address how compliance is to be demonstrated.  Zygma has established a comprehensive mapping of HIPAA requirements into the ISMS management framework, giving clients a way to manage and demonstrate their compliance. Read our white paper on this topic, then.

Back to Top»»

California SB 1386 & AB 1950
SB 1386 became effective on 2003-07-01 and is primarily focused on the consequences of the release of personal identifiable information under the circumstances set out in the legislation. AB 1950 became effective 2005-01-01.  It widened the scope of SB 1386 to cover medical information and extended the applicability of the original legislation to be effective outside the State of California, to address any organization doing business in California and holding information about Californian residents.  It therefore effectively has nation-wide effect.  Thirty-five or more States have now enacted legislation along the lines of SB 1386.  Zygma can assist organizations in limiting their prospects of having to observe the requirements of SB 1386 by putting in place management processes and information security controls to minimize the likelihood of any such breach occurring.

Back to Top»»

Payment Card Industry (PCI) Data Security Standard
Essentially a technically-focused standard, the PCI requirements include many criteria which impinge upon management issues.  Zygma can help relate this standard to the broader management systems, build conformant solutions and audit client systems for conformity.

 

Zygma is ready to respond to your specific needs for compliance/conformity for any of these specific standards, and others which may be particular to you  -  contact us to discuss the best way to solve those needs.

Back to Top»»


© 1993 - 2015   the Zygma partnership LLC     Office: +1 714 965 99 42      Mobile: +1 714 797 99 42      Email: Enquiries @ Zygma.biz    
All Zygma services are provided in accordance with its Ethics Policy.
Note - if you are submitting an enquiry or expect to receive email from us, please ensure that your spam filtering will accept mail from the domain 'Zygma.biz'