Answer:
I am sorry but I am not sure if I have understood your question. The maturity is not a requirement of ISO 27001, and the basic logic is perform the risk assessment and apply the appropriate controls.
Anyway, if you have a standard SQL image into a cloud provider infrastructure, and you can manage for example the information and the software, these assets need to be included in your risks assessment, and security controls involved need to be implemented by your organization.
For others assets that you can not manage (for example the IT infrastructure of the cloud provider), if there are risks related to them, you can perform a treatment establishing during the risk assessment that you transfer to external company the risks related to these assets, which means that in this case the external company is responsible of the implementation of the security controls, although you can review if these controls are implemented.
Answer:
I suppose that your question is related to the implementation process, if so, in the ISO process, for the implementation of an ISO standard, the first thing that you should look at is always related to obtain the management support. For this, is very important to show the 4 main benefits of the implementation of a ISO standard : compliance, marketing edge, lowering the expenses, and putting your business in order. For more information about this, please read this article “Four key benefits of ISO 27001 implementation” : https://advisera.com/27001academy/knowledgebase/four-key-benefits-of-iso-27001-implementation/
By the way, in our free download section you can download a "Diagram of ISO 27001:2013 implementation (PDF)", and you can also download a "Project checklist for ISO 27001 implementation (MS Word)” : https://advisera.com/27001academy/free-downloads/
This is a question of your ISMS scope - obviously the hardware on which the software and applications are running will be outside of your ISMS scope since they are operated by company Y that is not included in your ISMS scope.
However, if you control the data and the applications, then they should be included in your scope even though they are hosted on a hardware that is outside of the scope.
Answer:
There are 4 main points, which are by the way the 4 main benefits of the implementation of ISO 27001 : compliance (to various regulations regarding data protection, privacy and IT governance), marketing edge, lowering expenses and putting your business in order. For more information about these benefits, please read this article “Four key benefits of ISO 27001 implementation” : https://advisera.com/27001academy/knowledgebase/four-key-benefits-of-iso-27001-implementation/
Finally, if you are interested in the implementation of the ISO 27001:2013 in your organization, our online course can be also interesting for you “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Implementing risk management
Answer:
Implementing risk management exceeds the requirements of the ISO 9001 that only requires risk-based thinking. For implementing the risk management it is best to follow ISO 31000 that provides framework for selecting methodology, defining the scope and conducting risk management. The process of risk management includes several steps :
1. Establishing the context
2. Risk identification
3. Risk analysis
4. Risk evaluation
5. Risk treatment
6. Monitoring and review
Answer:
According to PMBOK 5, a work breakdown structure is “A hierarchical decomposition of the total scope of work to be carried out by the project team to accomplish the project objectives and create the required deliverables”.
Best practices in accessing business cloud applications
Answer:
Some best practices in accessing business cloud applications from mobile devices are:
- Use a secure channel for the connection (VPN, SSL, etc)
- Never store information related to your credentials of access in the device (avoid remember user/password in the device)
- Lock your device with a code, and also lock each app (above all the app that you use for accessing business cloud)
- Never share the device with another person
- Avoid Free public Wifi connections, or if you use one, be sure that your connection is protected by a secure channel (VPN)
Since you are dealing with lot of different industries, you will have to make sure which ISO certificate does your client require. I will assume that it is ISO 9001:2015 certificate but the process is pretty much the same.
First you need to conduct the GAP analysis to determine to what extent you already meet the requirements of the standard and also what needs to be done in order to achieve the full compliance. Usually, you need to create additional procedures and records and to establish some new processes. Once you determine all activities that need to be done, you should create the Project Plan and define the deadlines, responsibilities and resources for each activity, this is nor a mandatory step but it will help you avoid missing something out. The next step is to implement all the activities and to conduct internal audit and management review to ensure that you are fully compliant with the standard. The final step is to hire certification body to conduct certification audit and issue you the certificate.
We offer documentation toolkits and free online courses for ISO 9001, ISO 14001 and ISO 27001 and together with the toolkit you will be entitled to online meetings with an expert that will help you in implementation, you can also ask unlimited number of questions via email.
Internal audits, KPIs and Management review according to ISO 9001:2008
I have prepared QMS manual by referring other documents and renewed certificate 9001:2008 but want to learn and do myself since company is not willing to spend money on my training for ISO MR.