Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Risk Assessment and frequency


    I want to know how often Risk Assessment needs to be performed as per iso 27001
     

    Answer:

    In accordance with the clause 8.2 Information security risk assessment of ISO 27001:2013: “The organization shall perform information security risk assessments at planned intervals or when significant changes are proposed or occur….”.
    So, you can establish the frequency, although generally can be recommendable once a year.
    Finally, do you know the 6 basic steps of the risk assessment & treatment? Please read this article “ISO 27001 risk assessment & treatment – 6 basic steps” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/
  • Information Security Policy template


    Thank you for your email, actually we need a software to create IT general policy and information security policy and procedure, could you please assist me in this issue if such as software or toolkits available in your company please late me know how to get it
     

    Answer:

    For ISO 27001:2013 is only mandatory to have an Information Security Policy documented (it is not mandatory an IT general policy, or a software to create it), and we work only with the necessary documents for the implementation of this standard. So, if you are interested on this Information Security Policy, you can use our template. You can see a free versión clicking on “Free Demo” tab here “Information Security Policy” : https://advisera.com/27001academy/documentation/information-security-policy/
    By the way, you can also see our toolkit “ISO 27001 Documentation Toolkit” : https://advisera.com/27001academy/iso-27001-documentation-toolkit/
    Finally, do you know the list of mandatory documents of ISO 27001:2013? Maybe this article can be interesting for you “List of mand atory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
  • Software companies


    how can a small software companies with less than 150 employees can implement ISO 27001 standard without much rise in the cost and budget.
     

    Answer:

    You can search external consultants for this job, generally you will find many prices, but maybe the cheapest option is to use templates and implement them by yourself (although you need knowledge about ISO 27001 to do this). Another good option is our templates, because we have all necessary documents, and they are developed for small and medium companies. We also give you support during the implementation of them, so can be very interesting in your case. 
    This article can be interesting for you “5 criteria for choosing an ISO 22301 / ISO 27001 consultant” : https://advisera.com/27001academy/blog/2013/03/25/5-criteria-for-choosing-a-iso-22301-iso-27001-consultant/ and also this one “Do you really need a consultant for ISO 27001 / BS 25999 implementation?” : https://advisera.com/27001academy/blog/2011/12/06/do-you-really-need-a-consultant-for-iso-27001-bs-25999-implementation/
    You can see our toolkit here, and you can see a free version of each document clicking on “Free Demo” tab “ISO 27001 Documentation Toolkit” : https://advisera.com/27001academy/iso-27001-documentation-toolkit/
  • Templates for the implementation of ISO 27001


    We have implanted ISO 27001 in 2012 but we wrote the policy by our self, can we template for procedure and guide lines for the latest services, such as storage using cloud services.
     

    Answer:

    I am not sure if I have understood your question, but if you have implemented ISO 27001 and you have a template for the information security policy and you also have all procedures required by the standard, you can adapt them according to the scope of your ISMS if you have changed it (or if you have extended it to storage using cloud services). 
    Anyway the latest version of ISO 27001 is 27001:2013, so maybe this article can be interesting for you “How to make a transition from ISO 27001 2005 revision to 2013 revision” : https://advisera.com/27001academy/knowledgebase/how-to-make-a-transition-from-iso-27001-2005-revision-to-2013-revision/
    By the way, do you know the list of mandatory documents of ISO 27001:2013? This article can be interesting for you “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
    Finally, this article about the information security policy can be also interesting for you “One Information Security Policy, or several policies?” : https://advisera.com/27001academy/blog/2013/06/18/one-information-security-policy-or-several-policies/ and also this one “Information security policy – how detailed should it be?” : https://advisera.com/27001academy/blog/2010/05/26/information-security-policy-how-detailed-should-it-be/
  • No conformidades relacionados con los controles del Anexo A ISO 27001


    Buenos días, a los controles del anexo A de la ISO27001:2013 se pueden levantar no conformidades o solo a los numerales de la norma.
     

    Respuesta:

    Sí, porque por ejemplo hay varios documentos obligatorios relacionados con los controles de seguridad del Anexo A de la ISO 27001 (por ejemplo A.8.1.1 Inventario de activos), y si tienes implementados estos controles pero no tienes el correspondiente documento obligatorio, el auditor puede levantar una no conformidad.

    ¿Conoces la lista de documentos obligatorios? Este artículo puede ser interesante para ti "Lista de documentos obligatorios exigidos por la norma ISO 27001 (revisión 2013)" : https://advisera.com/27001academy/es/blog/2015/05/04/lista-de-documentos-obligatorios-exigidos-por-la-norma-iso-27001-revision-2013/
  • Differences between ISO 27001:2005 and ISO 27001:2013


    Differences about risk treatment between 27001 2005 and 27001 2013
     

    Answer:

    Regarding the risk treatment, there are no big differences (although in relation with treatment options in the 2013 revision, you are free to consider any option that you find appropriate -not only apply controls, accept risks, avoid or transfer them-), but regarding the risk assessment there are some important changes, for example you need to identify risk owners for each risk, you do not need to use the assets-threats–vulnerabilities methodology to identify risks, etc.
    This article can be interesting for you “What has changed in risk assessment in ISO 27001:2013” : https://advisera.com/27001academy/knowledgebase/what-has-changed-in-risk-assessment-in-iso-270012013/
  • Templates for technical controls


    The templates were very helpful especially the statement of applicability for the security policy Which will help in implementing security in our environment.

    Could you advice on other material that can be helpful in securing information, network security, Access control and system security.

     

    Answer:

    Yes, sure. Regarding securing information, network security, access control and system security, they are related to information security controls, and you can find in our toolkit templates about this. You can find these templates here (tab “Information Security Controls”) “ISO 27001 Documentation Toolkit” : https://advisera.com/27001academy/iso-27001-documentation-toolkit/
    Important: You can see a free version of each document clicking on “Free Demo” tab.
    This article can be also interesting for you "How to structure the documents for ISO 27001 Annex A controls" : https://advisera.com/27001academy/blog/2014/11/03/how-to-structure-the-documents-for-iso-27001-annex-a-controls/
    Finally, our section of free downloads can be also interesting for you: https://advisera.com/27001academy/free-downloads/
  • Nonconformities and incidents


    I am re-using in ISMS a QMS procedure for nonconformities management. May I merge incident management with nonconformities management  in the same procedure?
     

    Answer:

    From my point of view it is not recommendable, because they are different things from information security point of view. Anyway, in ISO 27001 it is not mandatory to have a documented procedure for nonconformities management (only is mandatory to have records about results of corrective actions). So, will be better if you maintain your incident management as independent procedure documented, although you can use you QMS procedure for nonconformities management, but remember, in ISO 27001 is not mandatory to have a documented procedure for this.
    To know the list of mandatory documents and records of ISO 27001:2013, this article can be interesting for you “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
    Finally, this article can be also int eresting for you "How to handle incidents according to ISO 27001 A.16" : https://advisera.com/27001academy/blog/2015/10/26/how-to-handle-incidents-according-to-iso-27001-a-16/
  • Implementation method and status of controls in Statement of Applicability


    For example, for A.9.4.3 Password Management System, we typically use LastPass to store and when necessary share passwords.  We do not have a formal Access Control Policy but we plan to develop one in the coming months.

    So in a case like this, what should we include in the Implementation Method and Status columns? Should Status reflect that we recognize the current implementation needs to be improved?

    Answer:

    In this particular case you should write that the implementation method is "Installation of LastPass and writing the Access Control Policy", and your current status would be "Partially implemented." Of course, after you write your Access Control Policy, you would change the status to "Implemented."
  • Handling documents of external origin


    Could this section be scoped only to related records of external origin? I'm not sure how relevant this is for what we manage. I work for a cloud software company, so we're mostly managing documentation and artifacts related to our infrastructure.

    Thanks for any feedback or examples of how others have handled this.

    Answer:

    In its clause 7.5.3, ISO 27001:2013 explicitly requires you to control documents of external origin that are important for your ISMS. So basically you have to decide what's important, so you might control notifications about the vulnerabilities, communication with your clients related to security issues, etc. In other words, you don't have to control everything.

    Incoming m ail register is not a mandatory document, you can simply have a table where you register who received some important external document, or where such document is stored.
Page 1039-vs-13485 of 1128 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +