ISO 27001 & 22301 - Expert Advice Community

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Document control

    Please advise on the following:
    For our document control and storage:

    We have created area called:

    ISMS Documents, which has 2 sub folders:
    a. Confidental Folder
    B  Non Confidential Folder

    We have external contracts, and then we have our contracts, which is created internally.

    All our contracts are stored under "Non Confidential/Contracts". Would we need to be able to identify internal from external.
    How does one manage this, as internal needs to follow history change table, where as external, is dependent is controlled from the external party

  • Clarification of terms used in ISO

    Hi there, generally speaking, does ISO still use the term observation or is the term Opportunity for Improvement used now?

  • Gap analysis

    1. I have a question to ask. Do we do the gap analysis first or IT risk framework?

    2. Which is easier to do? Looking forward to your feedback.

  • Surveillance audit

    We'll have the first surveillance audit in the next 3 months. Finished our Internal Audit a month ago. I just join the team as a Risk&Compliance Manager. How to we prepare for tbe Surv.Audit? I'd like to have an activities plan, kind of a checklist for preparation.

  • NIST framework

    I am working on a project to provide an easy to use yet comprehensive approach for supporting boards to monitor their cyber risk responsibilities. We are thinking of using the NIST framework as a base because of it simplicity and fitting a set of best practices around it. You do such a great job of simplifying the complexity of ISO.  Is there a slimed down set of practices based on ISO standards we might consider? Thanks!!!

  • Processes in Risk assessment vs. business impact analysis article

    Regarding the Risk assessment vs. business impact analysis article, at https://advisera.com/27001academy/knowledgebase/risk-assessment-vs-business-impact-analysis/, what kind of processes do banks need to perform in 12 hours that would be unacceptable?

  • General Information Security Policy

    Anteriormente con la ISO 27001:2005 utilizaba la política general de seguridad de la información y ahí mismo definía el alcance y lo montaba en un manual de políticas, separando la política de seguridad, hoy veo que hay que hacer un alcance del SGSI, lo que me queda duda si debería ser tres documentos, Política General de Seguridad de la Información, Manual de Políticas ( Todo un set ) y el Alcance del SGSI por separado.

  • LGPD and ISO 27001 conformity

    Good afternoon, I read several articles on the site. I am graduating from the IT Security course.
    I would first like to congratulate you for the article on ISO 27001. And second, ask for a material tip for analyzing the development of the theme of my LGPD and ISO 27001 TCC implementation.
    Thank you very much in advance

  • LGPD e ISO 27001 conformidade

    Boa tarde, leio vários artigos do site. Sou Graduando no curso de Segurança em T.I.
    Gostaria primeiramente parabenizá-lo pelo artigo sobre a ISO 27001. E segundo, pedir uma dica de material para análise do desenvolvimento do tema do meu TCC LGPD e ISO 27001 implementação.
    desde já agradeço.

  • Corrective action in ISO

    In the templates, you provided us, in 12 procedure for corrective action, there is nothing in the document on preventive actions, is that no longer an ISO requirement? The only thing in there is corrective actions, this is also reflected in the 12.1 form