<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>HDS - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/hds-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/hds-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 14 May 2025 12:19:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>HDS - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/hds-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/#respond</comments>
		
		<dc:creator><![CDATA[Perrine Viard]]></dc:creator>
		<pubDate>Wed, 14 May 2025 12:19:40 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[HDS]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25983</guid>

					<description><![CDATA[<p>The Health Data Host (HDS) certification is a French regulatory framework that governs the hosting of personal health data. Established by Decree No. 2018-137 of February 26, 2018, it is mandatory for any entity hosting health data to comply with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/">Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">The Health Data Host (HDS) certification is a French regulatory framework that governs the hosting of personal health data. Established by Decree No. 2018-137 of February 26, 2018, it is mandatory for any entity hosting health data </span><span data-contrast="none">to comply with the certification</span><span data-contrast="auto">. It aims to ensure a high level of protection for this particularly sensitive data by imposing strict requirements regarding security, availability, and confidentiality.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In the context where the digital transformation of the healthcare sector is accelerating, the protection of health data is an increasingly critical issue. In 2021, our article &#8220;Health Data Host Certification: Two Years Already!&#8221; by Laurent Guille and Alexandra Cuillerdier, provided a promising initial assessment of the HDS framework. Faced with growing concerns related to data sovereignty and cybersecurity, a redesign was necessary. This evolution towards HDS v2, which came into effect in 2024, marks a turning point in the approach to health data hosting in France, strengthening the protection and sovereignty of health data in an ever-evolving digital context.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">HDS v1: a first structuring but perfectible framework</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Since its introduction in 2018, the HDS framework has helped structure and professionalize the health data hosting sector. However, this first version of the framework had certain limitations. In particular, the initial framework presented gray areas regarding data sovereignty, especially concerning the location and control of health data. Additionally, the rapid evolution of cyber threats and technologies required a substantial update of security requirements to maintain a level of protection adapted to current risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Overhaul of the Technical and Security Framework</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">On the technical side, the new requirements of the ISO 27001:2023 standard are adopted within the new version of HDS. This update integrates security risk management adapted to new digital contexts, as well as new controls related to cybersecurity. The other normative references are rationalized. References to ISO 20000-1, ISO27017, and ISO27018 standards disappear in the HDS v2 framework, while 31 specific requirements are directly integrated into the framework, which also relies on the ISO/IEC-17021-1:2015 standard to govern conformity assessment. This new version also clarifies the articulation with the requirements of the SecNumCloud framework to facilitate obtaining HDS certification for hosts already qualified with SecNumCloud.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">A Major Strengthening of Digital Sovereignty</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">One of the most significant developments in HDS v2 concerns the strengthening of digital sovereignty. The new framework now requires that the physical hosting of health data be carried out exclusively within the territory of the European Economic Area (EEA). This requirement reinforces guarantees in terms of data protection and contributes to the emergence of an ecosystem of European players in the field of digital health.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This is complemented by enhanced transparency, which also becomes a central issue of the framework, with two major obligations:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Hosts must now publish on their website a map of any data transfers to countries outside the EEA, thus allowing data subjects and healthcare actors to have clear visibility on the journey of their data;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">In the case of remote access to data from a third country or submission to non-European legislation that does not ensure an adequate level of protection within the meaning of Article 45 of the GDPR, the host must inform its clients in the contract. In particular, it must specify the associated risks and detail the technical and legal measures implemented to limit them.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Strengthening of Contractual Requirements</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Subcontracting supervision receives particular attention in HDS v2. The associated measures are reinforced, and hosts must now:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Precisely detail the certified hosting activities in their contracts;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Maintain complete transparency regarding their subcontracting chain;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Ensure that their subcontractors comply with the same requirements for data security and location;</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Implement mechanisms to control and audit their subcontractors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">These new contractual obligations aim to ensure better control of the value chain and greater transparency for data controllers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Practical Consequences for the Ecosystem</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">For health data hosts, these evolutions of the framework imply an adaptation of their infrastructures to guarantee the location of data within the EEA. They also require an upgrade of their security measures to meet the requirements of the 2023 version of the ISO 27001 standard and the review of contracts, both with their clients and with their subcontractors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">Perspectives and Implementation</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">This new modernized version of the HDS framework addresses the growing challenges of security, sovereignty, and transparency. Its implementation is spread over approximately two years, with immediate application for new certifications from November 16, 2024, and a transition period until May 16, 2026, for hosts already certified under HDS v1.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In the longer term, several questions arise regarding the evolution of the framework. At a time when the NIS 2 directive already includes healthcare providers and the pharmaceutical industry among its essential sectors of activity, while classifying the manufacturing of medical devices and in vitro diagnostics in its important sectors, the emergence of HDS 2 raises a question: could European cooperation lead to an even more integrated framework for health data protection and harmonize practices across the continent?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:169}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/">Evolution of the HDS Framework &#8211; Towards Enhanced Security and Sovereignty </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/05/evolution-of-the-hds-framework-towards-enhanced-security-and-sovereignty/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Evolution of the ISO 27001 and ISO 27002 Standards: Impacts on Organizations</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/the-evolution-of-the-iso-27001-and-iso-27002-standards-impacts-on-organizations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/the-evolution-of-the-iso-27001-and-iso-27002-standards-impacts-on-organizations/#respond</comments>
		
		<dc:creator><![CDATA[Laurent GUILLE]]></dc:creator>
		<pubDate>Fri, 24 Feb 2023 11:00:00 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[HDS]]></category>
		<category><![CDATA[how to]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[ISO 27002]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19772</guid>

					<description><![CDATA[<p>The ISO 27001 and ISO 27002 standards provide a set of requirements and best practices to organize and implement an Information Security Management System (ISMS) within any organization. The success of these standards has been widely observed both in France...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/the-evolution-of-the-iso-27001-and-iso-27002-standards-impacts-on-organizations/">The Evolution of the ISO 27001 and ISO 27002 Standards: Impacts on Organizations</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The ISO 27001 and ISO 27002 standards provide a set of requirements and best practices to organize and implement an<span style="color: #800080;"> <strong>Information Security Management System (ISMS)</strong> </span>within any organization.</p>
<p style="text-align: justify;">The success of these standards has been widely observed both in France and on an international scale for many years and shows no signs of decline. For instance, the 2022 ISO annual survey showed a 19% increase in ISO 27001 certifications worldwide from 2020 to 2021, and a 44% increase in France.</p>
<p style="text-align: justify;">After nearly <a href="https://www.riskinsight-wavestone.com/en/2013/11/iso-27002-tour-dhorizon-des-nouveautes/">10 years</a> of effective and loyal service from their <a href="https://www.riskinsight-wavestone.com/en/2013/11/iso-27002-tour-dhorizon-des-nouveautes/">previous major version</a>, dating from 2013, the third edition of the ISO 27001 and ISO 27002 standards was published in 2022. What changes have been made and how does this affect our analysis of the Information Security landscape?</p>
<p style="text-align: justify;">The first obvious change reflects the evolution of the &#8220;Information Security&#8221; field over the decade: &#8220;cybersecurity&#8221; and &#8220;privacy&#8221; are now part of the standards&#8217; titles:</p>
<ul style="text-align: justify;">
<li><a href="https://www.iso.org/standard/82875.html">ISO/IEC 27001:2022</a> Information security, cybersecurity, and privacy protection — Information security management systems — Requirements</li>
<li><a href="https://www.iso.org/standard/54533.html">ISO/IEC 27002:2022</a> Information security, cybersecurity, and privacy protection — Information security measures</li>
</ul>
<h2 style="text-align: justify;"><strong>The evolution of security measures (Annex A): the main change in ISO 27001  </strong></h2>
<p style="text-align: justify;">The new edition of the ISO 27001 standard presents very few alterations in its body: the few changes mainly clarify or make explicit some clauses of the standard without changing their content.</p>
<p style="text-align: justify;">Some changes will require limited alterations to the ISMS, such as:</p>
<ul style="text-align: justify;">
<li>The explicit obligation to <span style="color: #800080;"><strong>document the objectives of the ISMS and to monitor their achievements</strong></span> (clauses 6.2 d) and g))</li>
<li>The <span style="color: #800080;"><strong>need to plan ISMS changes</strong></span> (clause 6.3): this clause could be covered, for example, by extending the ISMS improvement management process to any ISMS change, or by relying directly on the organization&#8217;s change management process</li>
<li>The reinforcement of the obligation to <span style="color: #800080;"><strong>control externally provided processes</strong></span> that contribute to the application of the selected requirements or to the achievement of the ISMS objectives, by extending it to externally provided products and services (clause 8.1)</li>
<li>The <span style="color: #800080;"><strong>possibility of choosing which expectations of “interested parties” (customers, management, employees, etc.) the ISMS must meet</strong></span> (clause 4.2 c)): the standard now allows the exclusion of certain expectations. This clause thus allows the prioritization of certain expectations or choice between mutually exclusive expectations. This change will probably require increased transparency towards the interested parties to inform them of the decisions taken. It should be noted that the <span style="color: #800080;"><strong>management</strong> <strong>review will now have to take into account changes of the interested parties’ expectations</strong></span> (clause 9.3.2 e)), in addition to the feedback from interested parties previously required.</li>
</ul>
<p style="text-align: justify;">Nevertheless, the main evolution of the ISO 27001 standard is Annex A. This annex provides a catalog of security measures &#8211; the measures being detailed in the new version of ISO 27002 -, which provides additional information and implementation recommendations for each of them.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19773" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN.png" alt="" width="945" height="584" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture1-EN-768x475.png 768w" sizes="(max-width: 945px) 100vw, 945px" /></p>
<p style="text-align: justify;">Updates to this Annex A can thus be studied in the new version of ISO 27002.</p>
<h2 style="text-align: justify;"><strong>A modernized version of ISO 27002, which is easier to use </strong></h2>
<p style="text-align: justify;">The update of ISO 27002 is <span style="color: #800080;"><strong>simplified</strong></span>, <strong><span style="color: #800080;">modernized</span>,</strong> and <span style="color: #800080;"><strong>easier to use</strong></span>.  </p>
<p style="text-align: justify;">First, the standard benefits from a <span style="color: #800080;"><strong>simplified organization</strong></span>: previously divided into 14 chapters (some with somewhat convoluted titles&#8230;), security measures are now grouped into 4: organizational measures, people-related measures, physical measures, and technological measures.  </p>
<p style="text-align: justify;">This edition also gives rise to a (new) <span style="color: #800080;"><strong>reduction in the number of security measures</strong></span>, from 114 to 93 (133 measures were included in the initial version from 2005). The content of the measures globally remains close to the previous version, but they have been reorganized. The changes are summarized below:</p>
<p><img decoding="async" class="aligncenter size-full wp-image-19775" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture2-EN.png" alt="" width="944" height="176" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture2-EN.png 944w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture2-EN-437x81.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture2-EN-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture2-EN-768x143.png 768w" sizes="(max-width: 944px) 100vw, 944px" /></p>
<p style="text-align: justify;">Note that <span style="color: #800080;"><strong>Annex B details the correspondence between the requirements of the old and new versions of the standard</strong></span>: this will be a very useful tool for organizations in the transition phase (at least for updating the risk management plan and the statement of applicability).</p>
<p style="text-align: justify;"><span style="color: #800080;"><strong>11 new measures have been added to the standard</strong></span>, addressing some of the shortcomings of the previous version as well as alterations in recent years:</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-19777" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture3-EN.png" alt="" width="780" height="382" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture3-EN.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture3-EN-390x191.png 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture3-EN-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture3-EN-768x376.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></p>
<ul>
<li style="text-align: justify;">Three measures reinforce <span style="color: #800080;"><strong>data protection</strong></span>: the deletion of non-essential or expired information (<em>Information Deletion</em>), prevention of information leakage (<em>Data Leakage Prevention</em>) and the masking of sensitive information (<em>Data Masking</em>). It should be noted that the standard neither obliges nor limits the application of these measures to personal data: each organization is free to choose whether or not to apply these measures according to its risk assessment and to apply them to the categories of information that are appropriate to its context.</li>
<li style="text-align: justify;">The <span style="color: #800080;"><strong>operational resilience</strong></span> component has also been strengthened by four measures: the integration of intelligence on threats related to information security (<em>Threat Intelligence</em>), monitoring of abnormal behavior on information systems to detect security incidents (<em>Monitoring Activities</em>), monitoring of physical access and intrusion detection (<em>Physical Security Monitoring</em>) and the integration of digital operational resilience for  organizational business continuity (<em>ICT Readiness for Business Continuity</em>).</li>
<li style="text-align: justify;">A single measure dedicated to the <span style="color: #800080;"><strong>security of cloud services</strong></span> (<em>Information Security for use of Cloud Services</em>) has been introduced, inviting organizations to define a process for managing these services from subscription to termination, integrating their chosen security measures.</li>
<li style="text-align: justify;">The three complementary measures strengthen IS protection at different levels:
<ul>
<li style="text-align: justify;">A measure related to the <strong><span style="color: #800080;">hardening and protection of configurations</span> </strong>(<em>Configuration Management</em>)</li>
<li style="text-align: justify;">A measure related to the <span style="color: #800080;"><strong>security of developments</strong></span> (<em>Secure Coding</em>)</li>
<li style="text-align: justify;">A measure aimed at defining a <span style="color: #800080;"><strong>filtering policy for Internet access</strong></span> (<em>Web Filtering</em>)</li>
</ul>
</li>
</ul>
<p>Another major new feature (only present in ISO 27002) to facilitate the appropriation and use of the standard, is the implementation of a description of each measure, which presents five attributes that can contain one or more values among the following:</p>
<ul>
<li style="text-align: justify;"><span style="color: #800080;"><strong>Type of security measure</strong></span>: #Preventive, #Detective and #Corrective</li>
<li style="text-align: left;"><span style="color: #800080;"><strong>Information security properties</strong></span>: #Confidentiality, #Integrity, #Availability</li>
<li style="text-align: left;"><span style="color: #800080;"><strong>Cybersecurity concepts</strong></span>: #Identify, #Protect, #Detect, #Respond, #Recover</li>
<li style="text-align: left;"><span style="color: #800080;"><strong>Operational Capabilities</strong></span>: #Governance, #Asset_management, #Information_protection, #Human_resource_security, #Physical_security, #System_and_network_security, #Application_security, #Secure_configuration, #Identity_and_access_management, #Threat_and_vulnerability_management, #Continuity, #Supplier_relationships_security, #Legal_and_compliance, #Information_security_event_management, #Information_security_assurance</li>
<li style="text-align: left;"><span style="color: #800080;"><strong>Security domain</strong></span>: #Governance_and_Ecosystem, #Protection, #Defense, #Resilience</li>
</ul>
<p style="text-align: justify;">For example, the new <em style="font-size: revert; text-align: justify; color: initial;">Threat Intelligence</em><span style="font-size: revert; text-align: justify; color: initial;"> metric covers the three security criteria #Confidentiality, #Integrity and #Availability.</span></p>
<p style="text-align: justify;">These attributes facilitate analysis beyond a simple chapter-by-chapter approach, and thus provide real value: for example, the cybersecurity concepts correspond to the dimensions of the NIST (<em>National Institute of Standards and Technology</em>) Cybersecurity Framework (CSF), an internationally recognized standard widely used by organizations. The reconciliation of ISO 27002 and NIST CSF measures will thus be possible, meeting the constraints of many organizational functions (regulatory, audits, reporting, etc.).</p>
<p style="text-align: justify;">The operational capabilities are the closest to the 14 chapters of the previous version of the standard: these operational capabilities can thus facilitate the organization of the IS Security Policy and the associated repository by limiting the impacts on a repository aligned with the previous version.</p>
<p style="text-align: justify;">Overall, these attributes offer greater flexibility to organizations that can now build their security repository more freely according to their contexts and requirements.</p>
<h2 style="text-align: justify;"><strong>Transitioning to the 2022 version</strong></h2>
<p style="text-align: justify;">For organizations already certified to ISO 27001, the transition effort will be linked to changes in security measures, as the alterations to the ISO 27001 content require only a limited investment. However, the following actions will need to be undertaken:</p>
<ol>
<li>Update the ISMS Manual:
<ul style="text-align: justify;">
<li>Clarify <span style="color: #800080;"><strong>interested parties’ expectations</strong></span> and which ones are <strong><span style="color: #800080;">addressed</span> </strong>by the ISMS</li>
<li>Update the ISMS improvement management process to <span style="color: #800080;"><strong>include ISMS change management</strong></span></li>
<li>Insert a <span style="color: #800080;"><strong>process summary diagram</strong></span> to show the interactions between processes</li>
</ul>
</li>
<li><span style="color: #800080;"><strong>Document the security objectives</strong></span> and implement <span style="color: #800080;"><strong>indicators</strong> </span>to monitor their achievements</li>
<li>Ensure that <span style="color: #800080;"><strong>performance and efficiency criteria</strong></span> are defined for each process</li>
<li>Ensure that <span style="color: #800080;"><strong>externally provided products and services</strong> </span>are included in the ISMS (or integrated into it, as appropriate)</li>
<li>Include in the management review the <span style="color: #800080;"><strong>changes of interested parties’ expectations</strong></span>, by identifying those that are <span style="color: #800080;"><strong>covered by the ISMS</strong></span></li>
</ol>
<p style="text-align: justify;">In order to address the evolution of these measures, the next update of organizations’ <span style="color: #800080;"><strong>information security risk assessments</strong> and <strong>risk treatment plans</strong></span> should measure the compliance of the ISMS with the new measures and <span style="color: #800080;"><strong>organize and plan the implementation of any new measures selected</strong></span>. The statement of applicability will then have to be reorganized and updated to integrate the new measures.</p>
<p style="text-align: justify;">The <span style="color: #800080;"><strong>IS Security Policy</strong></span> (including the associated repositories: charters, directives, processes, procedures, standards&#8230;) will also <span style="color: #800080;"><strong>have to evolve</strong></span> to consider the evolution of ISO 27001 Annex A. The use of attributes and Annex B of ISO 27002 will facilitate this change for all organizations.</p>
<p style="text-align: justify;">In terms of timing, as ISO 27001:2022 was published in October 2022, <span style="color: #800080;"><strong>organizations can now require ISO 27001:2022 certification</strong></span>. However, it is still possible to apply for ISO 27001:2013 certification until October 2023. <strong><span style="color: #800080;">From November 2023 onwards, any new certification will be based on the 2022 version of the standard</span>.</strong></p>
<p style="text-align: justify;">For <strong><span style="color: #800080;">ISMS which are already certified ISO 27001, the transition period is 3 years maximum to switch to the 2022 version</span>.</strong></p>
<h2 style="text-align: justify;"><strong>The specific case of organizations certified as Health Data Hosts (HDS)</strong></h2>
<p style="text-align: justify;">Since April 1<sup>st</sup>, 2018, organizations based in France and hosting personal health data according to the conditions detailed in <a href="https://www.legifrance.gouv.fr/codes/article_lc/LEGIARTI000021941353/2023-01-15/">Article L1111-8 of the French Public Health Code</a> must have a <a href="https://www.riskinsight-wavestone.com/en/2018/08/health-data-hosts-iso-27001/">Health Data Host (HDS) certification</a>, requiring as a prerequisite an ISO 27001 certification.</p>
<p style="text-align: justify;">As the standard has not changed since it came into effect, the <a href="https://esante.gouv.fr/services/hebergeurs-de-donnees-de-sante/les-referentiels-de-la-procedure-de-certification">HDS certification requirements</a> are still based on the 2013 version of the ISO 27001 standard. The <a href="https://participez.esante.gouv.fr/project/referentiel-hebergement-des-donnees-de-sante-exigences/presentation/presentation">call for comments</a> made at the end of 2022 on the <a href="https://esante.gouv.fr/sites/default/files/media_entity/documents/20221028-exigences-hds-1.1.pdf">draft of the new HDS standard</a> nevertheless integrates the new version of ISO 27001 (although the table of reference documents still points to ISO 27001:2013). The future HDS certification standard, which is <a href="https://www.ticsante.com/story?ID=637">expected to come into effect in April 2023</a>, will therefore be based on the new version of the ISO 27001 standard.</p>
<p style="text-align: justify;">It should be noted that the evolution of the HDS standard will also clarify some of the hard points of HDS <a href="https://www.riskinsight-wavestone.com/en/2020/03/certification-hebergeur-de-donnees-de-sante-deux-ans-deja/">certification mentioned in our previous articles</a>, such as the scope of application of activity 5 &#8220;Administration and operation of the information system containing health data&#8221;.</p>
<h2 style="text-align: justify;"><strong>Conclusion</strong></h2>
<p style="text-align: justify;">These new versions of the ISO 27001 and ISO 27002 reference standards thus enable information security measures to be adapted to recent changes in the field, so that organizations can benefit from the most up-to-date arsenal for dealing with their information security risks.</p>
<p style="text-align: justify;">While a growing number of regulations are based on these standards, such as the obligation of ISO 27001 certification for Health Data Hosts in France or for Essential Services Operators in Belgium, this new version allows organizations to reinforce their level of maturity without forcing them to make loss-making investments during the transition phase. These investments will be mainly focused on the consideration of new security measures relevant to the treatment of the organization&#8217;s security risks.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/the-evolution-of-the-iso-27001-and-iso-27002-standards-impacts-on-organizations/">The Evolution of the ISO 27001 and ISO 27002 Standards: Impacts on Organizations</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/the-evolution-of-the-iso-27001-and-iso-27002-standards-impacts-on-organizations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
