Topic-specific policies
ISO/IEC 27561


Search this site
 

ISMS templates

< Previous standard      ^ Up a level ^      Next standard >

 

Published end of March ISO/IEC 27561:2024 — Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME)

 

Abstract

“This guidance document describes a model and method to operationalize the privacy principles specified in ISO/IEC 29100 into sets of controls and functional capabilities. The method is described as a process that builds upon ISO/IEC/IEEE 24774. The document is designed for use in conjunction with relevant privacy and security standards and guidance which impact privacy operationalization.  It supports networked, interdependent applications and systems. This document is intended for engineers and other practitioners developing systems controlling or processing personally identifiable information.”
[Source: ISO/IEC 27561:2024]

 

Introduction

The standard presents a systematic approach for engineering IT systems to satisfy privacy and personal data protection requirements, drawing on the 11 privacy principles expressed in ISO/IEC 29100 privacy framework and ISO/IEC TR 27550 and ISO/IEC TR 27555 privacy engineering for system lifecycle processes.

 

Scope of the standard

The standard is intended to help ‘privacy engineers’ (or system architects or technical managers) interpret and satisfy the privacy requirements expressed in policies etc. plus those that emerge in the course of further analysis and development. It lays out a structured analytical method and model based on OASIS, emphasising functional architecture and practical implementation of privacy engineering. The process involves elaborating on privacy risks and designing controls, capabilities required plus the functions and mechanisms to deliver them.

 

Content of the standard

Following the foreword, introduction, scope, references, abbreviations and 47 definitions, the main clauses are:

  1. Context of privacy operationalization - background to the model and approach.
  2. Initial information inventory process - an iterative personal information inventory process including determination of the domains, processes, systems and data flows.
  3. Privacy controls, privacy control requirements, capabilities, risk assessment and iteration process - determination and documentation of the required controls, functions, mechanisms etc.
  4. Privacy capabilities - essentially the governance arrangements for addressing privacy.

   Annexes - mapping to ISO/IEC 29100, example and use case.

     

Status

Published end of March The standard was published at the end of March 2024.

 

Personal notes

Despite the contrived title with the neologism ‘operationalization’, the standard’s systematic, structured approach will be useful for privacy engineers.

 

 

< Previous standard      ^ Up a level ^      Next standard >

Copyright © 2024 IsecT LtdContact us re Intellectual Property Rights