Guest
In the 270001 Consultant Toolkit, in document 02.1 appendix 1, there are some fields that ask for deadlines/periods of time.
And I have no idea what to fill in there.
Can you please explain that, and give me an idea of how to handle this?
I am compiling our Primary School Asset Register and just want to know what is the minimum value of an item do we need to record? I have been told £20 others £50.
We are looking to implement ISO 27001 at work to be ready if we needed to be certified in the future; I have a couple of questions about ISO 27001 toolkit.
I signed a consultant agreement with a company to assist with the ISO 27001 ISMS, which has been awarded ISO certification annually for the past eight years. The external audits were performed by BSI.
The Company is considering using an accredited body other than BSI to conduct the ISO 27001 certification audit in 2020. The Statement of Work does not indicate that the audit team uses a certified Lead Auditor to complete the ISO 27001 certification audit. The auditors are Information Security Auditors certified by ISACA but they do not hold a professional certification in the ISO 27001 standard.Apart from Risk Assessment, do we have to do the Business Impact Analysis also to be compliant with ISO 27001?
If yes, does our Document Toolkit contain the Documentation of doing the BIA?
I am trying to estimate the cost for ISO 27001 certification with my company and I am trying to figure out for Internal auditor certification is there a requirement that auditors get recertified periodically?
Which of your Toolkits is the best option:
ISO 27001 DocumentationToolkit or ISO 27001 & ISO 27017 & ISO 27018 Cloud Documentation Toolkit?
Can we guarantee that the 13 points mentioned below are covered in either of our Toolkits?
1. Encryption key management
2. Network segregation
3. Audit logging
4. Patch and vulnerability management program
5. Information security awareness, education, and training
6. Physical and environmental security
7. Operational procedures and responsibility
8. System acquisition, development, and maintenance – including secure coding practices
9. System access control
10. Personnel security
11. Backup
12. Encryption at Rest
13. Security Monitoring Practices