I'm currently trying to implement ISO 22301 for part of my organization. I already have a BCM policy for the whole organization. How do I create the policy required by ISO 22301?
Do I create the policy as separate from the existing one, or as an annex to it?
Answer:
You can maintain the BCM Policy for the whole organization (as a best practice), although the requirements of the ISO 22301 will be mandatory only for the part involved in the scope of the system. If you have a scope limited, our recommendation is that in the future you expand it to all the organization, due to generally on this way is more easy the management.
Am I allowed to lead and manage the internal audit, despite that I am the one who writes the ISMS documentation and am the project manager of the whole ISO 27001 implementation?
I ask because of the sentence: "Internal auditors must be selected in such a way as to ensure objectivity and impartiality, i.e. to avoid conflict of interest, because auditors are not allowed to audit their own work."
Answer:
No I am sorry, your approach is not ok for the standard. The recommendation is that the internal audit be performed by a person who is not related to the implementation of the ISMS (on this way, you can ensure the objectivity and impartiality). One option is to search an external company, but another option is that the internal audit be performed by an internal employe of your company. This employee need to have knowledge about ISO 27001 (maybe you can train him) and of course, he need to be not related to the implementation of the ISMS. Furthermore, this article can be interesting for you "Dilemmas with ISO 27001 & BS 25999-2 interna l auditors" : https://advisera.com/27001academy/blog/2010/03/22/dilemmas-with-iso-27001-bs-25999-2-internal-auditors/
And also our toolkit related to the internal audit can be interesting ISO 27001/ISO 22301 Internal Audit Toolkit : https://advisera.com/27001academy/iso-27001-22301-internal-audit-documentation-toolkit/
Finally, can be interesting for your company our online course ISO 27001:2013 Internal Auditor Course : https://advisera.com/training/iso-27001-internal-auditor-course/
Who should be part of BCM team
I would like to ask another query about Develop Roles & Responsibilities and who should be the part of BCM team to facilitate the Business Continuity programs in terms of Testing Exercising and so on.
Answer:
Generally the BCM is composed by the responsible of the BCM (or Chief Business Continuity Officer), people related to the execution, maintenance and testing of the BCP, DR, etc. and people related to the top management.
By the way, as you know the implementation of the BCMS is composed by documents, and you can define in each one the roles and responsibilities (it is our recommendation).
Finally, this ebook can be also interesting for you, because the roles and responsibilities are explained in detail "Becoming Resilient: The Definitive Guide to ISO 22301 Implementation" : https://advisera.com/books/becoming-resilient-the-definitive-guide-to-iso-22301-implementation/
And also this article can be interestin g for you "Roles and responsibilities of top management in ISO 27001 and ISO 22301" : https://advisera.com/27001academy/blog/2014/06/09/roles-and-responsibilities-of-top-management-in-iso-27001-and-iso-22301/
Puntos relevantes de un BCP ya generado
QUE ASPECTOS O PUNTOS RELEVANTES DE UN BCP YA GENERADO (HACE UNOS 5 AÑOS) DEBO TENER EN CUENTA PARA OBTENER UNA NUEVA VERSION ACTUALIZADA Y ALINEADA CON LA NORMA 22301?? Y QUE SOPORTE UNA AUDITORIA DE CUMPLIMIENTO?
How do you integrate employees as assets in the process, by position, by name, by level? Are the typical risk associated things like resigning, death, intentional damage to other assets, etc?
Could you please suggest me whether SGS Group at india is IRCA approved certification body for ISO 27001 Lead auditor course. And should i enrols myself there.
Answer:
Yes, SGS Group is accredited by IRCA at India for the ISMS Lead Auditor Course, although there are other companies that can be also interesting (Bureau Veritas, BSI, etc.), and my recommendation is that you request a proposal to various entities. Anyway you can find this information in the official website of IRCA : https://members.irca.org/IRCA/train***********************************
By the way, this article can be interesting for you How to become ISO 27001 Lead Auditor : https://advisera.com/27001academy/knowledgebase/how-to-become-iso-27001-lead-auditor/
And maybe can be interesting for you our online course ISO 27001:2013 Internal Auditor Course : https://advisera.com/training/iso-27001-internal-auditor-course/
Actions to be taken after BCM implementation
Would you please send me the actions which needs to be taken from BCM team after implementation on day to day basis and below ;
Annual Actions?
Monthly Actions?
Quarterly Actions?
Weekly Actions?
Answer:
Most of actions have an annual frequency (review the risk assessment, perform internal audit, perform management review, perform corrective actions, etc), although there are actions that can be performed monthly/quarterly: operate the BCMS, monitor and measure the system (for example, if you have defined an indicator on a monthly/quarterly basis), meetings, etc. and on a day-to-day basis you can perform activities described in your policies and procedures. This article can be interesting for you, although is about ISO 27001 but can apply also to a BCMS because there are many similarities between both systems How to maintain the ISMS after the certification : https://advisera.com/27001academy/blog/2014/07/14/how-to-maintain-the-isms-after-the-certification/
Information security job titles
for now my question is about job titling and responsibilities, is there any list of information security job titles for example: info sec manager, info sec officer, info sec-???
Would like to ask you an question about ISO:27002:2013 section 9.4.4. Use of privileged utility programs. Can explain what kind of policy we must make to conform to the standard?
Answer:
First you need to identify any software that you need in your organization for the activity of the business (generally installed in the system operative). Next step is to establish some rules related to the utility programs:
Delete (or not install) unnecessary utility programs
The installation of new utility programs can be only performed by authorized personnel
Create user/password for those utility programs where can access any people
Utility programs which have user/password: Create different users/password for different people (not unique user administrator or root for all