ISO 28000 Supply Chain Security Management System

What is ISO 28000?

ISO 28000 specifies the requirements for establishing, implementing, maintaining, and improving a security management system (SeMS), including the aspects relevant to the security of the supply chain. 

ISO 28000:2022 Security and resilience – Security management systems – Requirements replaces the ISO 28000:2007 Specification for security management systems for the supply chain. The title of the standard has been changed to emphasize the fact that ISO 28000 requirements are not only applicable to organizations in the supply chain, but to all organizations, regardless of the type, size, or industry. 

The new edition of ISO 28000 follows the harmonized structure of ISO, where the requirements for the SeMS are outlined in clauses 4 to 10. This enables organizations to integrate the SeMS with other management systems based on ISO standards.

The new edition of ISO 28000 includes additional recommendations as well. In clause 4, recommendations on eight principles for security management have been added to ensure better alignment with ISO 31000 (the standard for risk management). In addition, clause 8 sets out recommendations related to security strategies, procedures, processes and treatments, and security plans that ensure consistency with ISO 22301 (the standard for business continuity management). 

Why is ISO 28000 important for organizations?

Considering that security incidents can occur at any moment, it is essential for organizations to adopt a proactive approach toward security management. A security management system based on ISO 28000 enables organizations to identify their valuable assets, including property, personnel, products, data, and infrastructure, and implement appropriate security processes and controls to safeguard them. In addition, an effective SeMS enables organizations to improve recognition, increase reputation, enhance business profitability and efficiency, and reduce long-term costs.

ISO 28000 requires from the organization’s leadership to demonstrate commitment with respect to the security management by, among others, establishing a security policy, setting security objectives, and integrating security management into the organizations processes and operations. This enables organizations to align security efforts with their overall goals and objectives, embed security in their daily operations, and promote a security culture that leads to proactive risk management.

In addition, ISO 28000 includes requirements that address risk assessment, security controls and strategies, and security plans. By establishing processes for risk assessment, organizations can effectively identify, analyze, and evaluate security-related risks. Then, they can implement controls and strategies to prevent security-related risks or mitigate and treat those that cannot be prevented. Security plans, on the other hand, enable organizations to respond to security-related incidents in order to minimize possible impact on operations and business.

ISO 28000 also outlines requirements regarding the monitoring and measurement of the SeMS. Monitoring enables organizations to identify vulnerabilities and take appropriate actions to address them, thus minimizing risk and loss. In addition, it enables them to ensure compliance with changing regulations and standards related to security, as violations of such regulations may lead to legal consequences and reputational damage.

What are the benefits of an effective SeMS based on ISO 28000?

A security management system based on ISO 28000 enables organizations to achieve their security management objectives. In particular, it enables organizations to: 

  • Enhance business capabilities 
  • Ensure the security of the environment in which they operate
  • Comply with statutory, regulatory, and voluntary security obligations
  • Identify and address risks and opportunities related to security management 
  • Effectively deal with security violations 
  • Recover from disruptions in the supply chain 
  • Manage relationships with all relevant interested parties in the supply chain 
  • Manage security-related risks
  • Create and protect value
  • Align security processes and controls with the organization’s objectives
  • Gain a competitive advantage 
  • Demonstrate conformity to ISO 28000 through assessments by accredited third parties

If you are considering attaining Cyber Essentials  or Cyber Essentials Plus accreditation and want a pre-assessment evaluation to identify any areas where you might fail, then AEC can conduct a Readiness Assessment complete with a report advising on any areas where you need to make improvements, or changes, to pass the Cyber Essentials or Cyber Essentials Plus certification/audit.

Working in partnership with our Certification Body we can conduct the audit and award the certificate if you meet all the criteria. One of our Cyber Assessors will link to you remotely to conduct an audit against the criteria specified for Cyber Essentials Plus.

AEC can provide additional support and guidance to identify any changes required for your environment to mitigate any problems with the  security posture that could cause any non-compliance or impact a successful certification. We also can provide additional ongoing guidance throughout the Cyber Essentials Certification process.

Client Feedback and Review

This section highlights testimonials and evaluations from our clients, showcasing how we continuously strive to enhance our services. Your feedback helps us grow and ensures we meet your needs effectively

The Security You Need.
The Compliance to Succeed.

Company

Business Hours

About Us

About Us

Copyright Notice

Information

Work Hours

Terms and Conditions

Business Hours

Contact Info