ISO 27001 is not an IT standard - only ca 50% of the controls are IT related, which means that non-IT departments can implement many controls as well - e.g. classification of the information, access control, physical security, etc. After you perform the risk assessment for your department, you will know exactly which controls to implement.
I have the standard BS ISO IEC 27002-2005 BS 7799-1-2005, which defines all the risk events and controls for IS. How does this compare with 27001:2013. and which of the new standards also lists the risk events and control?
Answer:
I am sorry but ISO 27002 is not about risks, is only about security controls. You can use these security controls to reduce risks, but the standard that is about information security risks is ISO 27001.
By the way, the last version of ISO 27001 and ISO 27002 is from 2013 (ISO 27001:2013 and ISO 27002:2013), and they are the more important ISO standards related to risks and controls, although others standards related to information security risks are ISO 27005 (best practices for the development of the information security risk management) and ISO 31000 (the same that ISO 27005 but for any type of risk), although they are not new. And others new standards related to security controls are ISO 27017 (information security controls for cloud services) and ISO 27018 (protection of the privacy in the cloud).
We're implementing an ISMS for a cloud Provider. Our client provides Housing services (Clients bring their own Device to the Data Center), Hosting services (web hosting, etc), Cloud services (SaaS, IaaS). Virtual machines are managed by the client: they can install whatever they want on the machine even the OS. the problem is while identifying the assets, how do we deal with Virtual machines management? Is the VM owned by the Cloud Provider or the Client.
Answer:
First of all you need to define clearly the scope of the ISMS, because if the scope is limited to the Housing services, maybe there are no assets related to virtual machines. However, if the scope includes the Hosting services and/or Cloud services, from my point of view the virtual machines managed by the client need to be identified as assets in the risk assessment, because there are risks related to them that can affect to the business of the Cloud provider (if the hosting service is provided through virtual machines, and they are stopping, the service cannot be provided).
Anyway, if the virtual machines are not managed by the cloud provider, I recommend you to exclude them from the scope of the ISMS.
my question is about opportunity in clause 6 of ISO 27k it seems no clear for me to develop it
second did we need to develop process for our ISMS ?
Answer:
I am sorry but I am not sure if I have understood your questions. Regarding the clause 6, I suppose that you mean “6.1 Actions to address risks and opportunities”, if so, risks and opportunities are related to the objectives, and any action that you take that is related to the achievement of the security objectives, but is not related to the risk management, can be considered to be addressing the opportunities (An example related to an opportunity: Your organization buy a cheap firewall which gives your organization the opportunity to reduce risks, but it can produce increased risks due to low quality of the device). You can document such actions in your Management review minutes, corrective actions, or any other records or documents that you use in your company.
Regarding the process for your ISMS, again I am not sure what you mean, but really a process is a set of interrelated or interacting activities which transforms inputs into outputs, so in accordance with this you can define the process that you want to implement the ISMS (some examples: information security risk assessment process, risk treatment process, audit process, etc).
quite easily formalise additional roles if it needed. One single person might have more than one role.
Answer:
For such a small company you basically need only one additional role - a person who will coordinate the implementation of ISO 27001 (i.e. project manager), and this person can be at the same time the security manager (i.e. CISO). Of course, these roles can be performed by some of your existing employees, probably someone from the top management (it will take him/her perhaps 20% of the time).
All the other security roles will be included in the responsibilities of existing employee s/managers - e.g. for passwords or for the backup, the responsible person will be the person in charge of the IT. You should formalize those responsibilities throughout various ISMS policies and procedures.
soy estudiante de seguridad informatica y quiero implementar un SGSI de la seguridad informatica a una empresa, por eso quiero capacitarme en esta norma y lo que tenga que ver para asegurar la informacion . quedo atento de su comentarios, si es posible hablar con el asesor es mucho mejor, no hablo ingles.
Respuesta:
Antes de nada, aclarar que la seguridad de la información no es lo mismo que la seguridad informática, es muy importante tener claro esta distinción: la seguridad de la información básicamente está relacionada con la protección de la información (es un término genérico, e incluye, entre otras cosas, la seguridad informática), y la seguridad informática básicamente está relacionada con TI (servidores, hacking, etc). Por tanto, un SGSI está relacionado con la seguridad de la información.
Y si eres nuevo en seguridad de la información, nuestros recursos te ayudarán a aprender más sobre la ISO 27001, por tanto, por favor visita estos enlaces:
Por último, recordarte que nosotros tenemos un paquete de documentos que contiene todo lo necesario para implementar la ISO 27001, el cual puedes encontrar en español aquí (puedes descargarte una versión gratuita pulsando en el botón "DESCARGAR DEMOSTRACIÓN GRATIS"):
I need to get some good guidance on internal auditing for ISO 27001 as I am tasked with internal auditing as we have almost completed our development of ISMS.
If you have any tips/training videos etc for internal auditing of SOA/controls that would be very timely for me.
Although you can also use our template for the checklist (you can see a free version clicking on “Free Demo” tab), which has questions related to all clauses and controls of ISO 27001 that you can use during the internal audit “Internal Audit Checklist” : https://advisera.com/27001academy/documentation/internal-audit-checklist/
Aspect and Impact Analysis in the new version (2015)
Answer:
New version of ISO 14001 did not bring many changes regarding identification and evaluation of environmental aspects and impacts. However there is now emphasis to take into account the changes in processes, activities and products or services when conducting the evaluation as well as abnormal conditions and reasonably foreseeable emergency situations.
So if you took into account these two topics, you can keep your old evaluation as still valid. You only need to adapt your procedure to align it with the new version of the standard.
How similar are 22301 and SOC II? We are already doing SOC II. Will we be able to leverage some of the work we've done for SOC II for 22301?
Answer:
SOC II has some points where speaks about availability (references CC3.3 and A1.1 in SOC 2), system recovery, recovery plans (references A1.1, A1.2, A1.3 in SOC 2), etc. Which are directly related to ISO 22301 (mainly with the section 8), although ISO 27001 has more common points with SOC II. So, if you have implemented SOC II, the implementation of ISO 27001 will be more easy that ISO 22301 (although ISO 22301 will be also easy).
By the way, as you know, you can implement ISO 27001 and ISO 22301 together, and the integration with SOC II would be also very easy.
ISO 27001 and HITRUST
How does it relate to HITRUST? I am getting ready to start an accreditation
Answer:
Sincerely I am not an expert in HITRUST, but it is related to the information security in health information systems environments, and ISO 27001 is an international standard (also has similarities with HIPAA), and is related to information security, so probably can help you to implement the Common Security Framework (CSF) of HITRUST, because there are common areas.