Guest
(I need a help/tip, what is the best way to formalize a matrix of function segregation, in a small company.
Preciso de uma ajuda/dica, de qual a melhor maneira de conseguir formalizar uma matrizes de segregação de função, num empresa pequena.
One of my 27001 clients is asking about whether they need to consider ISO 28000 as they outsource the hosting of their software products.
Do you have any guidance on this?
Is there any specific value to the certifying body as there are many academy which are providing this certification. Does the certificate from a not-so-popular has any weight in the market?
¿En que se diferencia un SGCN de un Sistema de Gestión de Riesgos?
For network security, it is better to apply annex SL 27001 or annex A 27001
1 - Is it possible to have all in one? It is for my client who want to implement them since he has client who request to implement them all.
2 - How much will cost for implementation with documents
3 - is it possible to do it via Zoom or Webex for implementation?
I would like to start off with a scope that includes the information stored in our datacenters.
But, when I look at the ISO 27001 standard, it states quite clearly that;
When determining the scope, the organization shall consider;
a) the external and internal issues referred to 4.1 (Understanding the organization and its context)
b) the requirements referred to in 4.2 (Understanding the needs and expectations of interested parties)
c) interfaces and dependencies between activities performed by the organization and those that are performed by other organizations.
I refer in particular to point c). We use 3rd party suppliers, some of whom process our client data (which is stored in our datacenter), and I was wondering that if I only include the information that is stored in our datacenter in the scope, and if I don’t include 3rd parties in the scope, will the ISMS fail the audit. Or is it simply enough to say that we have controls and polices in place around the data that is stored in our data center and these controls pertain to 3rd parties and who process some of that data that resides in our datacenter.
When developing Risk Assessment, the CIA must consider. If we use asset-based, CIA refers to the asset, right? But if we use risk or process based, the CIA will refer to what?