Guest
I have your documents for the internal audit report and the checklist, on the internal report is it acceptable to state that everything was implemented correctly and there was no finding for improvement?
The majority of our finance, HR and other major departments are managed by our parent company, but our sister company wants to become ISO 27001 certified. How do we manage the certification process? Please note that we will require access to the HR and finance departments, for instance. Additionally, we are headquartered in site A and have a branch in site B, but we wish to obtain certification only for site A. How are we going to treat our employees in site B and under which category should we put this?
We are planning a BC Plan tabletop exercise for a scenario called Data Centre Power Outage. I understand the BC plan is a product of Risk Assessment and Business Impact Analysis. I just joined this new organisation and all have been given BC Plan. Not sure how risks were assessed and BIA was done.
Question: Can we include Risk assessment and BIA in the test exercise and ask questions on that? or in other words should we do both analyses during this testing exercise?
Secondly, What are the most relevant questions we should be asking?
Many thanks
Ash
Example: John is Lead Implementor of ISMS, Jack is his colleague from the same team. John's boss (who is also Jack's boss) wants to get internal audit performed by Jack. Is it a conflict of interest for Jack? (Jack was not involved in implementation but he has same boss)
Is it possible to "merge" certifications for two iso certified companies that are in different "state" like one is in their 1 years, second is in 2nd years (surveillance audit) etc. after acquisition of another company or do you have to recertify it?
How much time is required for BCMS implementation in a medium sized organization?
1 - I will like to know if iso 27001 standard talks about a single point of entry into the IT department. I will like to know if ISO27001 talks about multiple entry into the IT department and best practice.
2 - if not, what standard should I look out for
Good afternoon,
When looking through the Supplier Security Policy, am I correct in stating that this is only for actual services used by our companies? Does this apply to customers of ours? Or in our case, does this only apply to the company that does our accounting? And other companies that we use the services of?
We have some troubles regarding Backup and Disaster recovery rules for our outsourced services / applications.
We have around 200 different applications where the operations and backups are outsourced. We have divided our applications into 3 different criticality categories - where we have set requirements and collected answers for RPOs and RTOs for the applications with highest criticality level.
All assets are still in scope (even if they are not business critical) and we have some controls for risks covered by for example backup procedures.
Does that mean we have to collect RTOs and RPOs for all our assets? Or do you have any suggestions on how we can adjust in our policies to make it more simple for us?