ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle

ISMS eli tietoturvan hallintamalli on joukko prosesseja ja politiikkoja, joiden tarkoituksena on ohjata ja hallinnoida organisaation arkaluontoista dataa. Se vähentää riskejä ja turvaa jatkuvuudenhallintaa ja sillä hallinnoidaan käytössä olevia prosesseja, dataa ja teknologioita. Hallintamallin tule...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Virta, Tiina
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:fin
Julkaistu: 2020
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/73112
_version_ 1826225754873004032
author Virta, Tiina
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Virta, Tiina Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Virta, Tiina Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Virta, Tiina
datasource_str_mv jyx
description ISMS eli tietoturvan hallintamalli on joukko prosesseja ja politiikkoja, joiden tarkoituksena on ohjata ja hallinnoida organisaation arkaluontoista dataa. Se vähentää riskejä ja turvaa jatkuvuudenhallintaa ja sillä hallinnoidaan käytössä olevia prosesseja, dataa ja teknologioita. Hallintamallin tulee olla yhteensopiva voimassa olevien lakien ja asetusten kanssa. Terveyden ja hyvinvoinnin laitos (THL) suunnittelee ISO 27001 -sertifikaatin hankkimista tulevaisuudessa. Tutkimuksen tehtävänä oli kartoittaa, millainen hallintamalli THL:n tulisi ottaa käyttöön, jotta ISO 27001 -standardin vaatimukset täyttyvät sekä miten organisaation tietoturvavastuut tulisi jakaa. Tutkimuksessa tarkasteltiin ensin tietoturvan hallintamalleja ja standardeja yleisellä tasolla. Sitten käytiin tarkasti läpi ISO 27001 -standardi ja THL:n nykytila. Työssä oli haasteena juuri samaan aikaan meneillään oleva THL:n organisaatio- ja johtamisuudistus, mutta tutkimus perustettiin johonkin tiettynä ajankohtana olevaan hetkeen ja tehtiin sen verran väljästi, että sitä on helppo muokata muutosten jälkeen. Lopputuloksena syntyi standardin vaatimusten mukainen Excel-taulukko, joka auttaa sertifikaatin hankkimisen alkaessa työkaluna. Työkalu sisältää kaikki standardin tietoturva- ja riskinhallintavaatimukset, ehdotukset organisaation vastuutahoiksi sekä ehdotetut asiakirjat, joilla voidaan todistaa vaatimuksenmukaisuus. An information security management system (ISMS), is a set of processes and policies designed to guide and manage an organization’s sensitive data. It reduces risks, secures continuity management and manages existing processes, data and technologies. The governance model must be compatible with applicable laws and regulations. Finnish Institute for Health and Welfare (THL) is planning to obtain ISO 27001 certification in the future. The task of this study was to map out what kind of management model THL should implement in order to meet the requirements of the ISO 27001 standard and how the organisation's information security responsibilities should be divided. At first, the study looked at different information security management models and existing security standards. The ISO 27001 standard and THL's present state were then carefully reviewed. The challenge was the ongoing organizational and management reform of THL, but the study was set up to a point in time and was done so loosely that it could be easily modified after the changes. The result of the study was an Excel spreadsheet that meets the requirements of the standard, helping to get certification started, as a tool. The tool includes all the security and risk management requirements of the standard, proposals for the organisation's responsible parties, and proposed documents that can be used to prove compliance.
first_indexed 2020-12-11T21:01:32Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Laur\u00e9n, Andrei", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Virta, Tiina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-11T07:25:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-11T07:25:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73112", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "ISMS eli tietoturvan hallintamalli on joukko prosesseja ja politiikkoja, joiden tarkoituksena on ohjata ja hallinnoida organisaation arkaluontoista dataa. Se v\u00e4hent\u00e4\u00e4 riskej\u00e4 ja turvaa jatkuvuudenhallintaa ja sill\u00e4 hallinnoidaan k\u00e4yt\u00f6ss\u00e4 olevia prosesseja, dataa ja teknologioita. Hallintamallin tulee olla yhteensopiva voimassa olevien lakien ja asetusten kanssa. Terveyden ja hyvinvoinnin laitos (THL) suunnittelee ISO 27001 -sertifikaatin hankkimista tulevaisuudessa. Tutkimuksen teht\u00e4v\u00e4n\u00e4 oli kartoittaa, millainen hallintamalli THL:n tulisi ottaa k\u00e4ytt\u00f6\u00f6n, jotta ISO 27001 -standardin vaatimukset t\u00e4yttyv\u00e4t sek\u00e4 miten organisaation tietoturvavastuut tulisi jakaa.\n\nTutkimuksessa tarkasteltiin ensin tietoturvan hallintamalleja ja standardeja yleisell\u00e4 tasolla. Sitten k\u00e4ytiin tarkasti l\u00e4pi ISO 27001 -standardi ja THL:n nykytila. Ty\u00f6ss\u00e4 oli haasteena juuri samaan aikaan meneill\u00e4\u00e4n oleva THL:n organisaatio- ja johtamisuudistus, mutta tutkimus perustettiin johonkin tiettyn\u00e4 ajankohtana olevaan hetkeen ja tehtiin sen verran v\u00e4lj\u00e4sti, ett\u00e4 sit\u00e4 on helppo muokata muutosten j\u00e4lkeen.\n\nLopputuloksena syntyi standardin vaatimusten mukainen Excel-taulukko, joka auttaa sertifikaatin hankkimisen alkaessa ty\u00f6kaluna. Ty\u00f6kalu sis\u00e4lt\u00e4\u00e4 kaikki standardin tietoturva- ja riskinhallintavaatimukset, ehdotukset organisaation vastuutahoiksi sek\u00e4 ehdotetut asiakirjat, joilla voidaan todistaa vaatimuksenmukaisuus.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "An information security management system (ISMS), is a set of processes and policies designed to guide and manage an organization\u2019s sensitive data. It reduces risks, secures continuity management and manages existing processes, data and technologies. The governance model must be compatible with applicable laws and regulations. Finnish Institute for Health and Welfare (THL) is planning to obtain ISO 27001 certification in the future. The task of this study was to map out what kind of management model THL should implement in order to meet the requirements of the ISO 27001 standard and how the organisation's information security responsibilities should be divided.\n\nAt first, the study looked at different information security management models and existing security standards. The ISO 27001 standard and THL's present state were then carefully reviewed. The challenge was the ongoing organizational and management reform of THL, but the study was set up to a point in time and was done so loosely that it could be easily modified after the changes.\n\nThe result of the study was an Excel spreadsheet that meets the requirements of the standard, helping to get certification started, as a tool. The tool includes all the security and risk management requirements of the standard, proposals for the organisation's responsible parties, and proposed documents that can be used to prove compliance.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-11T07:25:03Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-11T07:25:03Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "116", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ISO27001", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvajohtaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hallintamalli", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ISMS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012117058", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "public", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_73112
language fin
last_indexed 2025-02-18T10:54:51Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/00659495-c863-472e-9ccb-ccd2ebb9a4b4\/download","text":"URN:NBN:fi:jyu-202012117058.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Virta, Tiina ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle ISO27001 tietoturvajohtaminen hallintamalli ISMS Tietojenkäsittelytiede Computer Science 601 standardit riskienhallinta tietoturva kyberturvallisuus
title ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
title_full ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
title_fullStr ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
title_full_unstemmed ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
title_short ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
title_sort iso 27001 standardiin perustuva tietoturvajohtamisen hallintamalli thl lle
title_txtP ISO 27001 -standardiin perustuva tietoturvajohtamisen hallintamalli THL:lle
topic ISO27001 tietoturvajohtaminen hallintamalli ISMS Tietojenkäsittelytiede Computer Science 601 standardit riskienhallinta tietoturva kyberturvallisuus
topic_facet 601 Computer Science ISMS ISO27001 Tietojenkäsittelytiede hallintamalli kyberturvallisuus riskienhallinta standardit tietoturva tietoturvajohtaminen
url https://jyx.jyu.fi/handle/123456789/73112 http://www.urn.fi/URN:NBN:fi:jyu-202012117058
work_keys_str_mv AT virtatiina iso27001standardiinperustuvatietoturvajohtamisenhallintamallithllle