¿Qué procesos críticos seleccionar para la implementación de ISO 27001?
En la empresa en la que laboro, se han definido 10 procesos que son críticos desde el punto de vista del negocio. Para implementar el SGSI:
¿cómo identifico cual de los 10 procesos críticos considerar para implementar el SGSI? .
¿pudo considerar otros procesos distintos a los críticos?
mi consulta va dirigida dado que el ente regulador, al momento de la revisión nos preguntará cual fue el criterio de selección del proceso que se considero para realizar el SGSI, y porque no se considero el resto de los procesos.
Answer:
El principal objetivo de establecer el alcance del SGSI es definir qué información quieres o necesitas proteger en tu negocio, por tanto, necesitas identificar la información que tienen tus procesos y pensar qué información quieres proteger de esos 10 procesos. Y sí, puedes considerar todos los procesos -críticos y no críticos- pero desde mi punto de vista, generalmente los procesos críticos tienen información crítica que se debe de proteger.
El auditor certificador (con esto quiero decir el auditor de la entidad certificadora) revisará si toda la información incluida en el alcance está protegida, por tanto el criterio puede ser que incluyas en el alcance del SGSI aquellos procesos que tienen información relevante para el negocio y es necesario protegerla.
I would like to know which ISO standards should be apply for Data centers. Because my enterprise already started running public datacenter and trying to apply ISO standards as a benefit over competitors. Please kindly suggest me for which ISO we should choose and thanks you very much for your great courses about ISO.
Answer:
One of the ISO standards more focused on data centers is ISO 20000, because it is related to the management of IT services. So, maybe can be interesting for you our blog about ISO 20000 https://advisera.com/20000academy/blog/ and also this page What is ISO 20000? Learn why ISO 20000 can benefit your organization : https://advisera.com/20000academy/what-is-iso-20000/
Another standard related to data centers is the ANSI/TIA-942 although it is not ISO (is an American National Standard).
Anyway, if you want to focus more on security issues, then ISO 27001 might also be appropriate for a data center. So this article can be also interesting for you "What is ISO 27001?" : https://advisera.com/27001academy/what-is-iso-27001/
Internal and external issues, requirements of interested parties
Answer:
ISO 27001 does not require you to document internal and external issues, you only have to take them into account (doing this through the process of risk assessment is fine) - very often the auditors do not understand this so in your case I would challenge this auditor. This article can also help you: Explanation of ISO 27001:2013 clause 4.1 (Understanding the organization) https://advisera.com/27001academy/knowledgebase/how-to-define-context-of-the-organization-according-to-iso-27001/
Appendix 4: Examples of disruptive incidents scenarios
What is the meaning of Appendix 4: Examples of disruptive incidents scenarios?
Answer:
The purpose of the Appendix 4 is to present the most likely incidents and their impacts to the organization. This appendix is directly related to the paragraph 3.2 Risk management of the document Business Continuity Strategy, because for all risks/incidents identified it is necessary to prepare event scenarios which describe how much incidents could affect to the organization.
You can find the template of the Business Continuity Strategy here (you can see a free version clicking on Free Demo tab) Business Continuity Strategy : https://advisera.com/27001academy/documentation/business-continuity-strategy/
Difference between information asset and IT asset?
what is the different between information asset and IT asset? information asset what is that? I want to take asset inventory, what are the thing i have to look in?
Answer:
Information asset is a term used in ISO 27001 and it is related to the assets of type information, but IT asset is not used in ISO 27001, although from my point of view is related to IT, and there are some type of assets related to this, mainly hardware and software. So, an information asset can be the information included in databases, files in PDF, word, excel, etc. But also the information included in paper and other forms.
For the asset inventory first it is important to establish type of assets (information, hardware, software, infrastructure, people, outsource services), and based on this, identify all assets that you have in your business, those that have value to the organization, and are included in the scope of the ISMS. This article can be very interesting for you How to handle Asset register (Asset inventory) according to ISO 27001 : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
Difference between total risk and residual risk
difference between total risk and residual risk?
Answer:
I am sorry but ISO 27001 uses the term risk and residual risk (total risk is not used). A risk is the effect of uncertainty on objectives, while residual risk is the risk remaining after the risk treatment. So, basically before implement the security controls you have risks related to information security in your business (you need to reduce them), and after implementing controls the reduced risk is the residual risk (keep in mind that generally you cannot eliminate absolutely the risk).
Maybe this article about the residual risk can be interesting for you Why is residual risk so important? : https://advisera.com/27001academy/knowledgebase/why-is-residual-risk-so-important/
Standard for protection of personally identifiable information
Any standard or guidelines by ISO for protection of personally identifiable information (PII) other than 27018 i mean not for cloud
Answer:
The standard ISO with guidelines about the protection of personally identifiable information is ISO 27002. This standard has the control "18.1.4 Privacy and protection of personally identifiable information, which is exactly what you need. You can download and buy the standard from the official site of ISO.org : https://www.iso.org/standard/54533.html
Finally, keep in mind that most of countries in the world have laws related to the protection of personal data, so maybe this list of laws and regulations on information security in most important countries can be interesting for you Laws and regulations on information security and business continuity : https://advisera.com/27001academy/knowledgebase/laws-regulations-information-security-business-continuity/
ISO 27001 - Document Control on non-ISMS documentation
In accordance with the clause "7.5.3 Control of documented information" : "Documented information required by the information security management system and by this International Standard shall be controlled...". So it is not necessary that non-ISMS documents follow the control of documented information, although from my point of view can be a best practice. So, "document coding", "classification", "Change history block", "distribution", etc. are not strictly necessary for non-ISMS documents, but can be useful and a best practices for your business.