Guest
Our company is doing a product-specific scope for ISO27001. It's not clear to me how complex this will get to carve out the scope of the product when dealing with internal Shared services.
For example, Corporate IT manage the laptops, office networking, and e-mail accounts of the engineers/administrators of the product. But has no access to the network/servers of the product itself. Compromise of their office networking, laptops, or corporate account may influence the security of the information/system in scope (stealing credentials, exploitation of trust, etc). I know this depends on the auditor, but is it reasonable to state corporate IT process/procedures out of scope but still a dependancy?
Dialing this back though, nobody involved has a formal ISMS, nor a proper framework for policy/procedures/controls.
I was hoping to ask you which parts of an organization would sit on the ISO 27001 Implementation Committee for a company?
HR/ Legal / IT representatives / Security personnel for example
I have a question about the Management evaluation protocol.
My question is about documents that need to be checked during the meeting.
"Documents or descriptions of monitoring results and analysis of evaluation measures“. Can you please explain that fact to me? I don’t understand that.
It has been a long time. I have been reading one of the articles from Rhand Leal and it is causing me concern. Advisera is a good source but when your recommendations run counter to my advice to my customers I need try and fix that.
I know everyone has a different take on what security incidents and events are. Rhand Leal’s article is very difficult to reconcile with my recommendations.
My definitions:
Security Events are events: Things that are logged by tools like Event Monitor on Windows:
Successful logins are events just like unsuccessful logins are, access to files are events, locking and unlocking a screen is an event. In the analog-world leaving a laptop unattended would also be an event
When Rhand says that, an event has to be related to the possible failure of controls or “compromise of policies” is like saying that an incident is just a lot of events, or that all events are really junior incidents. I think that is really incorrect. Events are the data upon which you can determine if controls are effective or not but events by themselves have no positive or negative connotations. A door being opened with a LEGIC Card is an event, If the person with the card is not authorized then it is an incident.
A security incident I agree can be an event or group of events that indicate a compromise of business operations (Confidentiality, Availability, Integrity). Example would be a door being opened with a valid key by an unauthorized person.
For me, non-compliance is something, which is not in accordance with a standard or policy. Sometimes a non-compliance can actually identify an obsolete standard. Just an example would be the conflict between Password policies and the newest recommendations from NIST, (e.g. changing passwords every 90 days is no longer recommended procedure).
For me, the preferable category is “weakness”. Usually, if not always, a valid non-compliance will identify a weakness. A weakness being the state of affairs that promotes an incident. Examples of weaknesses would be missing patches. Another example would be insufficient Awareness trainings. Basically, a weakness could be the lack of any relevant security control.
So with that could you (or Rhand) try and convince me that I am wrong or get Rhand to change or delete his post.
Thanks in advance.
I am interested in the iso27001 LI course with the workshop on the 22nd of November. However, I can only take this course if you are an accredited CB as I need the certificate to be issued from an LI course provided by an accredited CB.
Are you an accredited CB. Or do I get any certificate for this course provided by an accredited CB?
Does your course match my needs to get the right certificate?