Guest
Hello, I bought ISO27001 full package documents.
I'm wondering if all of the items in Annex A are mandatory?
In reference to your conversation, could you please advise who should approve the Internal Audit?
We have a CSO and an AVP, Info Sec.
I have been utilizing the ISO 22301 documentation extensively that I purchased via your company a while back. I used it to prepare our planning and it has proven very useful.
One aspect I am struggling with though and wanted to ask your feedback. I cannot see a logical return to work process/checklist amongst the documentation. I am clearly thinking ahead to how our business will return to business as normal but in a logical/structured manner.
Is this something you can help with? Even better if pandemic related?
I have some clarification with regards to A 14 Domain.
1. Why ISO 27001 documentation toolkit from Advisera does not have a template for “Secure Development Environment Guidelines”?
2. We are a medium organization where we do limited development particularly customization of COTS software (Web Content Management {CMS} and Student Information Management {SIMS}). In this case how to analyze which A 14 controls will be applicable to our organization?
Hello, I am looking for laws and regulations on 'industry sector' and business continuity in EU
I am interested in BC of critical infrastructures in a industrial big organisation.
Is this the right document template from the Toolkit for the mandatory document required by ISO 27001 for Business continuity procedures (A.17.1.2.):
A.17.4_Business_Continuity_Plan_Premium_EN_WL.docx
Hi guys. I just bought the Disaster Recovery Plan and want to use it with combined ISO27k/22301/GDPR documentation that I'm working on. I noticed there are four documents. Which one would you recommend for this?
Regarding the theft of a laptop form a car, while the policy can prohibit leaving a laptop in a car, thus preventing probability of theft, how does a backup or encryption lower the probability of theft? It merely lowers the impact when the theft occurs, but not the probability of theft. The thief does not know the data is backed up or encrypted, and usually doesn´t care because he most often is after the hardware for resale, not the data.
Where can I find details on what has been programmed into the excel templates, and where is maintenance documented? Specifically, in risk treatment, how change method, coloring and warning messages? Thanks.