Guest
I would like to know the position/function that a graduate in information security can play and if ISO 27001 has a requirement in this regard.
I was wondering if you had previous comments on scoping ISO 27001 for SaaS products.
Say a company is in the business of providing SaaA cloud-based solutions, with developers in house utilizing cloud infrastructure, what would be SO 27001 certification look like? The processes/ Datacenter used for the development of the SaaS application is ISO 27001 certified? the product might have multiple releases.. so stay away from calling out product as scope? and focus on people, process, site and dev, test, prod environments as scope?
And if the products are from multiple locations?
A quick question as I am writing my company templates.
I have been going through the documentation but it seems to be incomplete. I started looking at Human Resource Security and it appears that A.7.3 is missing? It is listed in the Statement of Applicability but missing from the document area A.7 (A7.1 and A.7.2 are there, but not A.7.3) I haven't checked other areas as yet but are there likely to be other gaps?
In your doc framework, there are two places where asset inventory is being used:
I am wondering, where the classifications infos for the assets are taken into account? In some other examples for the inventory I found in the web, the CIA classification values are also stored, as well as numerous additional infos like
and in some examples, the records are different depending on the type of asset.
Since we are SW developers in our DNA ;-) we are planning to build a little DB tool for the inventory and RA.
The inventory structure you suggest with your framework, is it meant as the absolute minimum you require to survive an audit?
So having more attributes will eventually make the assessment survey taking longer, but should not be a problem, right?
Would appreciate some answers very much!
In your book you state ".. processes are not part of the asset inventory ..".
And I cannot find processes in the predefined categories of the table in 05.1 of your doc framework.
What is the reason for this? Are processes handled somehow separately? Or is it because we just should take into account the assets the processes consist of?
We are using Google Cloud Services for all infrastructure and use other SaaS providers for e.g. identification services and financial status information on customers to the banks.
Right now I'm working with the ISMS scope document and struggles a bit with the boundary of the scope.
I assume Google IaaS should be outside scope as well as the SaaS services we use.
This is not as clear as the example used in your doc. (private laptops and phones).
Any guidance on best practices on ISMS Scope in our case would be greatly appreciated before taking the next step for us.
(we would include the full company in the scope since we are very small)
Our organization uses Digital Certificates for Internet facing services, apart from that we do not use any cryptography. In this case, would A.10 be applicable to our organization?
In the Clause A6, we need to maintain contacts with the Superior Authorities and the special Interest Groups.
Could you please explain this Point. If I understood right, we need to maintain contact with the Superior Authority of the State where we can report any Data Breach.
How can we prepare the documentation of it?
Hello ! is there any comparison between the COBIT, ITIL and ISO27001?