Guest
One quick question - is there any risk of our identifying too few risks that we think require treatment? Our risk assessment identifies around 200 scenarios (though we may decide that a large share of these are outside of our scope). For most of these, we have controls in place already and are willing to accept the residual risk. There are just a small handful where we think it would make sense to introduce additional controls. Is this something that an auditor would look askance at?
For a company like us (***), how do we define the scope, I mean what are our inclusions and exclusions in the scope of ISMS
1. How to define Scope
2. Can we say that a company is certified if it is just a part that meets the standards?
3. A company that builds an IT solution. Can we make a difference between its business infrastructure and the product infrastructure?
Do we need to certify to ISO 27001 and TISAX since we already are certified to ISO 27001 for the past two years? We provide global engineering support to automotive industry.
I have a question around the SOA controls. Our company was certified last year on ISO 27001 and we have the surveillance audit coming up.
1. What happens in the case where we realize that some SOA controls that were marked as N/A during last years audit could actually be applicable...
2. What impact will it have on our surveillance audit?
3. Would we need to recertify before going for the surveillance audit?
In the Project Plan template, it has a place to enter a date for the Final Presentation of Project Results.
Who is this presentation to and should it be done before or after the self-audit?
We are currently working on a gap analysis, but I can’t seem to find much information about that, regarding the ISO 22301.
I am sure it is like ISO 27001 but do you also happen to have more resources or templates about gap analysis for 22301?
Maybe I just missed it form the template packages.
With reference to the document ‘A.8.2_IT_Security_Policy_Premium_EN’ under ‘3.13 Internet Use’
Is it mandatory to define access to the Internet, only through organization and not direct access?
If yes, how do we restrict/ define actions for email services, cloud platforms which in general are accessible from the direct network?
If no, what set of restrictions are defined to comply with the requirements of ISO 27001?
Please let me know if more clarification required.
1. Since we already have the Templates for the Topic “Non-Conformity 10.1 and 10.2” in our Toolkit, Could you please give some examples of kinds of Non-Conformity.
2. Can the Main Deviations marked by the Lead Auditor in Pre-Audit be taken as Non-Conformities?