Templates and applicable controls
Assign topic to the user
First, it is important to note that Advisera's ISO 27001 Documentation Toolkit does not have a document for each and every control from ISO 27001 because of the following reasons:
1) ISO 27001 does not require each and every control to be documented
2) If the toolkit had a document for each control, there would be too many documents and this would be an overkill for smaller and mid-size companies.
Since our target are SMEs, we have decided to include an optimum amount of documents for companies of this size - the toolkit includes:
All the mandatory documents - e.g. Information Security Policy, Statement of Applicability, Risk Assessment Methodology, Access Control Policy, etc.
Documents that are not mandatory, but are commonly used - e.g. BYOD Policy, Classification Policy, Password Policy, Backup Policy, etc.
Considering that, the IT security policy you attached as an example applies all controls listed on its section 2 (reference documents), i.e., controls A.6.2.1, A.6.2.2, A.8.1.2, A.8.1.3, A.8.1.4, A.9.3.1, A.11.2.5, A.11.2.6, A.11.2.8, A.11.2.9, A.12.2.1, A.12.3.1, A.12.5.1, A.12.6.2, A.13.2.3, A.18.1.2.
The identification A.8.2 is used only to make easier to organize and locate the document. It does not make reference to applicable controls to this document.
@Rhand Leal Thank you for the response. That means since more than one ISO Control Documentation is mentioned in the one Document, the same Documentation is also valid for the other controls mentioned on the Document. Below is the example.
e.g A.10 Policy on use of Encryption: ISO/IEC 27001 standard, clauses A.10.1.1, A.10.1.2, A.18.1.5
Here the same Document will be valid for the Documentation of the Control A.18.1.5.
Please Advise.
Thanks,
First, it is important to note that Advisera's ISO 27001 Documentation Toolkit does not have a document for each and every control from ISO 27001 because of the following reasons:
1) ISO 27001 does not require each and every control to be documented
2) If the toolkit had a document for each control, there would be too many documents and this would be an overkill for smaller and mid-size companies.Since our target are SMEs, we have decided to include an optimum amount of documents for companies of this size - the toolkit includes:
All the mandatory documents - e.g. Information Security Policy, Statement of Applicability, Risk Assessment Methodology, Access Control Policy, etc.
Documents that are not mandatory, but are commonly used - e.g. BYOD Policy, Classification Policy, Password Policy, Backup Policy, etc.Considering that, the IT security policy you attached as an example applies all controls listed on its section 2 (reference documents), i.e., controls A.6.2.1, A.6.2.2, A.8.1.2, A.8.1.3, A.8.1.4, A.9.3.1, A.11.2.5, A.11.2.6, A.11.2.8, A.11.2.9, A.12.2.1, A.12.3.1, A.12.5.1, A.12.6.2, A.13.2.3, A.18.1.2.
The identification A.8.2 is used only to make easier to organize and locate the document. It does not make reference to applicable controls to this document.
Your understanding is correct. Please note that included in your toolkit, there is a "List of Documents" file that identifies which controls are covered by each document in your toolkit.
Comment as guest or Sign in
Nov 14, 2019