We've received the following question:
"I am considering to complete the exams related to 22301 and 27001
As far as I can see there is lead auditor and lead implementer certifications for both standards.
Im not sure what the foundation certification is all about but maybe you can tell me if it is needed and why?
I believe my best option is to start reading some course material or books prior to the course and the exam.
Could you tell me which books/material you would recommend to give me the best probability to qualify for the exam and if you are able to provide them?"
Answer:
Regarding certification the Foundation approach is the first step to get inside this subject giving a general overview about the aspects of the standards while the Lead Implementer is a deeper approach for those who want to implement this systems using a systemic approach to all the requirements. Lead Auditor is for those who want to become auditors of the system providing guidance on the standard as well as on how to perform audits.
Regarding the materials you should have a look on the following links
https://advisera.com/27001academy/webinar/become-iso-27001-bs-25999-2-consultant-free-webinar/https://advisera.com/27001academy/blog/2010/11/30/how-to-learn-about-iso-27001-and-bs-25999-2/
Also you can have a look on the ebook
https://advisera.com/books/becoming-resilient-the-definitive-guide-to-iso-22301-implementation/
Many thanks
ISO 27005 or ISO 31000
We've received the following question:
I did risk assessment/management programs but my approach was identify assets, then threats...so on. I read new version does not recommend this approach of identifying asset n so on but they recommend to find risk in associated with the env environment and so on...
Answer:
In fact there no specif requirement on that approach but there is still a requirement on assets inventory and in order to control those assets, it is good practice to address threats and vulnerabilities on those assets, so you can follow ISO 27005 approach.
The new risk approach alignment sugestion in 2013 version has a wider coverage and give the opportunity to the organization to address the context risks of the business, providing lines of thought for internal and external issues that are relevant for the business.
ISO 27005 is more focused in Information Security and ISO 31000 is a framework that can be used to address those internal and external issues as well as Information security.
In the new version you can used the approach that may suite better for your needs. As a detailed methodology for Information Security Risk Management, ISO 27005 is more practicable, than ISO 31000, on the other hand, ISO 31000 provides a better guidance on addressing the context analysis. So it is up to your organization on choosing any of the approaches or even both.
Hope it helps
Thanks
identification of applicable legislation
Hello,
One of the controls that needs to be implmented is 15.1.1 'Identification of applicable legislation'
How can we implment this and what kind of document (procedure) shall we have to define the applicable laws and regulations related to information security.
Many Thanks
MAO
Maximum Acceptable Outage) classificationsWe've received the following question:
Question:
"I would like more information on MAO classifications. Does 22301 require the use of "MAO by Activity" including, Marginal Impact, Acceptable Impact, High Impact and Catastrophic Impact?"
Answer:
Yes, ISO 22301 requires the use of MAO (Maximum Acceptable Outage) for each activity when conducting the Business Impact Analysis.
The classifications: Marginal Impact, Acceptable Impact, High Impact and Catastrophic Impact are suggestions, not mandatory, others classifications and different levels can be used. Classifications should be used in conjunction with the duration of the Outage.
A possible approach should be:
You define a table with time duration eg. (2 hours; 4 hours; 8 hours, 24 hours, 48 hours and 1 week) in columns and lines with some questions than could reflect the impact of the outage for each time duration. Then fill the answers in each intersection with impact classification bellow time duration.
Example of questions:
How will your clients react to a disruption?
Wh at will be the impact to other activities?
How difficult will it be to catch up on the backlog of work?
etc.
So with this approach you can address the MAO requirement in each activity.
You can also have a look in the following link: Benefit of perfoming BIA for a single department
https://community.epps.eu/forum/iso-27001-iso-22301-suppor*********************************************************
Hope it helps.
Thanks
Scope definition on customer assets
We've received the following question:
"We are running network and operation services (Network Service Desk) for clients. But i want to certify only my Network Service Desk for ISO 27001. Do all information assets including servers, application belongs to clients will come under scope or only those assets which are required to support Network desk service from my office premises. "
Answer:
The scope shall include assets and facilities you control and/or you need to provide your services. In your particular case, since the customer assets are not in or premisses neither you have complete control on them, you should not include them in the scope. But you include in scope the information you need to access those customer assets.
Hope it helps
Thanks
Risk Owner and Asset Owner
We've received the following question:
"I also would like to ask you about the asset owner and risk owner concepts in 27001:2013. Do you know any cases when the asset owner and risk owner is not the same person? Would you elaborate a bit on this? And can I assign this ownership on a top level ? for example to deputy CEOs only? What is the risk?"
Answer:
According with the version 2013, you need to identify risk owners for each of your risks, but you still need to identify ownership for your assets as requested in A.8.1.2.
Asset ownership is more close to operational control and risk ownership is more in relation with business risk.
Answering your question, yes you can have different owners for assets and risks. With the new Risk Owner concept the responsibility is pushed to a higher level, which means that the Deputy CEO is a good candidate. But you should explain the concept and get the approval from top management on the best owner for each risk.
Please ha ve a look on the following:
https://blog.iso27001standard.com/2013/10/14/how-to-make-a**********************************************************
Hope it helps
Thanks
Leaving belongings on the entrance
We've received the following question:
"...Company will implement ISO27001 and we must leave mobile phone on a box with a key ...We must also leave jackets , home keys, mobile , documentation and all of this in the box. What told ISO27001 about this?
Answer:
ISO 27001 does not specify those particular requirements. Your company can implement those procedures as security measures if they think there is a realistic need, but by doing so they must be compliant with your local legislation.
Thanks
Introducing ISO 22301 to Top Management
What are the critical areas/aspects in ISO 22301 should the Executive be made aware of in introducing them to this standard? Bear in mind there is a mix of appreciation of BCP amongst the senior team....
Records of training, skills, experience & qualifications
We've received the following question:
"...What do we actually look for in terms of evidence for Records of training, skills, experience & qualifications 7.2 in the ISO 27001:2013?
Answer:
Regarding trainning and skills, you should look on the trainning certificates, duration, and their content.
For experience you should look on customer reference letters from activities provided by employees.
Regarding qualifications you should look on the academic qualifications and certifications.
Trainning, Skills and qualifications records shall be in accordance with each the role profile.
It is common to find those records as part of the employees process in the Human Resources Department.
Roles and Responsibilities"
Is there a Template for the document "Definition of Security roles and responsibilities?"