May you please help me with a sample of a Risk Management process flow chart. We are gunning for ISO certification so I need a template to use and later on I will design a manual as well. I just need a skeleton copy.
BCP and ISMS
As per ISO 27001:2005- BCP to be implemented in the whole scope of ISMS.
BIA scope
I am facing an issue where the operation department within the organization has only provided me with the main services provided and they cannot decide what the support services are. For example, the HR department handles salaries and Its considered a support activity which needs to be part of the BIA. However, the HR department also has activities which are unrelated to the main activities. So how can I decide on what activities are considered related and unrelated, is there an example you can provide me that will detail what to add and what to avoid.
IT assets
I am facing few issues regarding drafting asset inventory, which are as follows-
Difference between internal and lead auditor courses
Lead Auditor and Internal Auditor courses actually refer to 2 different things?
BC strategy and plans
While working on BCMS for my organization I realized that there is a similarity between BC strategy and BC plan regarding the command center requirements (see 4.1.3 in BC strategy and 3.9 and BC plan). This makes me wonder where I will find such duplication and whether its necessary to fill in both documents.
Audit demanded by client
Website Software Needs a Security Audit or Certification - Which One?
Risk acceptance criteria and acceptance level
Is acceptable level of risk the same as risk acceptance criteria in ISO 27001:2013?
Filling asset inventory
As explained in the provided video (about Risk Assessment table), each Asset may have several threats. And each threat (of the same asset) may have several different vulnerabilities. And each vulnerability may have different Consequence (from low to high). It's well demonstrated in the video, for the "Laptop" asset). It has 2 different threats (flood, theft) and 3 different vulnerabilities (2 for flood and 1 for theft) with different levels of Consequence (1, 1, 2).
Using Conformio for ISO 27002
I’m working on an ISO27002 project for my company. Is Conformio suitable for just that portion of ISO27001?