Guest
We are working on the ISO 27001 implementation and one of the questions that popped out to us is about the corrective action logs.
May I know what are the requirements of the corrective action logs? What elements should them be included?
I received the documentation concerning A.6 to A.17 and I have 2 questions:
1) Where is the documentation concerning A.18 (Compliance)?
2) What about the Annexes A.1 until A.5?
In addition I would like to ask if you deliver training materials about the ordered documentation? I already entered ISO 22301 & iSO 27001.
Como podemos adequar nossos processos para implementar a ISO 27001?
How can we adapt our processes to implement ISO 27001?
I would like to know if it is necessary to define a scope to conduct a gap analysis. What is the best practice?
We got the certificate on October 2022. I want to do an internal audit before external audit on August. How can I start with the audit and how to perform it . Thanks
Hi, somedoy has information about the Multiple Vulnerabilities in Aruba Products?
1. Can I seek your advise on the how much is the RTO usually set for a company offering SaaS based solutions? Does the ISO 22301 define any times? I understand that it depends on various org-specific factors, but want to get a idea on industry best practices.
2. We also had the below queries relating to BYOD, in case we want to implement a BYOD policy:
Should the organisation ensure an anti-malware / anti-virus solution has been installed on all personal devices?
3. What are the minimum device management controls that the org should have control over?
I understand that these are not specifically defined in the ISO 27001 standard, and therefore need your advise on what controls are considered bare minimum, and as per industry best practices, to help us pass the certification.
Isn’t there a layer 2 as procedures and principles ?
1.1. Secure coding
[Job title] will issue procedures for secure coding of information system, both for the development of new systems and for the maintenance of the existing systems, as well as set the minimum secure coding practices that must be complied with.
The same secure coding principles will be applied to outsourced development, and defined through the contracts as defined in [Supplier Security Policy].