1. IT Security Policy: The following two lines are not (technically) implemented, is it obligatory to implement these in case Mobile Device & Teleworking is applicable?
Becoming a lead auditor
What are the criteria for being a Lead Auditor?
Access control and working in secure areas
I'm having trouble to decide what information should be included in A.9.1 Access control policy and which in A.11.1 Policy for working in secure areas. A.9.1 refers to rules for access to various systems, equipment, facilities and information, based on business and security requirements for access. A.11.1 refers to the definition of basic rules of behavior in the secure areas. So, the second one is obviously referred to physical areas while the first one is more general. I find it kind of confusing.
Elaborating a security policy
I know that information security objectives are not the same exact thing as information security policies. However, I find that the essential elements that I wish to capture in a simple policy statement can be crafted from the objectives in Annex A.
Mandatory documents
As I have been appointed a task of creating an overall IT Security policies and procedures documentation, I have chosen ISO 27001 guidelines to help me define the scope of documentation required for my company to be ISO certified this year + submit the documentation for one of the security requirements imposed by the UK tender framework.
Categorization of assets
Regarding asset identification, when dividing into primary assets(business process and information assets) and supporting assets (hardware, software, people, documentation etc) - how should you assess regarding information assets what is categorized as a primary asset vs a supporting asset?
ISO 27001 implementation and certification
I work as a freelance, a company asks me to implement the network and manage it in such a way that the most important asset is the information, they tell me that it applies ISO, my question is if applying the standard is the same as certifying? If I apply the standard but do not certify I'm not sure what happens? I need to understand the subject.
Risk assessment
I am working on my risk register now and I have identified 100 threats. How many usually are identified?