Guest
Hi - I am getting ready to conduct an ISO 27001:2013 internal audit of an organization. The plan was to conduct onsite visits in other countries. Question: Can I conduct a remote audit if possible?
A question about Risk Assessment: we're a small company (5 full time, 2 part-time staff). It would be simpler for us to say that the Information Security Officer is the asset owner for all assets. Is there a problem in doing that?
Sorry to disturb you I'd like to ask you if the 22301 book on amazon is related to 2019 version or 2012 thanks
How do I construct an ISMS document and supporting documents?
My management is not in agreement to do Business Impact Analysis Worksheet and Risk and opportunities Register to proceed.
How can I convince them to do so?
I need your continuous support in managing ISMS to achieve certification.
Now I have 2 questions if you could help me with these:
If I choose to use: 02.1 Appendix 1 (List of Legal, Regulatory Contractual requirements) right at the start of the Project (because also Annex A 18.1.1. control is likely to be applicable), could you explain me:
Hi, which templates cover the following ISO 27001 clauses?
A.8.3.1
A.12.5.1
A.12.6.1
Today we bought the toolkit BIA according to the ISO 22301:2012 version of the standard. But, checking the document I cannot identify the (RTO and RPO) values.
These values are very important for us because our customer is requesting as a part of the BIA report.
How can identify, relating or include these values in the Excel questionnaire?
I do have one more question about best practices for ISO 27001 implementation regarding corrective actions.
Let's assume the scenario:
- We have implemented ISMS policy
- During the internal audit, we have found out non-conformance to the policy in a specific area/control.
We can take three decisions based on known risks:
The option to address it in short therm is always the best, but I want to find out the best practices for long-term solutions (option 2).
Is it better to keep the non-conformance list or exception list and revalidate it every time?
I have the following question:
Company A rents virtual as well as complete servers from a hosting provider. On these severs a development company develops customized software for company A. The scope of the ISMS of company A covers the whole organization and therefore also the data and applications on the servers. Company A has no own software development.
Question: Regarding 14.2.5, 14.2.6, 14.2.8, 14.2.9, can company A exclude these controls in the SoA and only apply 14.2.7, as the responsibility/risk is contractually transferred to the development company and company A does not have any own software development? The risk assessment has shown some risks with regard to the development process on the servers, but this has been treated by contractually transferring the liability to the solution provider and applying chapter 15 controls. Contractually the development company is responsible for maintaining the security of the servers. What would be the best approach here?