From my point of view, the key concept of an ISMS is the information (and its protection). And it is also one of the more important things in our current age (information age). How can we protect the information? Basically identifying risks and reducing them, and it is also covered by an ISMS (the risk is also an important concept in an ISMS).
This article about the basic logic of ISO 27001 can be interesting for you The basic logic of ISO 27001: How does information security work? : https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
Data center assets
data center assets, threats and vulnerabilities?
What's assets and common security threats and vulnerabilities in data centers?
I am implementing ISO 27001:2013 for one company. They do not develop any software but they use out of the box softwares for internal usage. Rest they have typical IT network (Switches, Routers, Email etc).
Are below mentioned controls applicable?
A. 14.2.5 Secure System Engineering Principles
A. 14.2.6 Secure Development Environment
A. 14.2.8 System Security Testing
A. 14.2.9 System Acceptance Testing
A. 14.3.1 Protection of Test Data
A. 10.1.1 Policy on the use of Cryptographic Control
I downloaded the free version of the application Risk Assessment Toolkit. My question is the following: the application is helpful only for the preparation of the documents?
Performs cross-checking specific (for example 6.1.3 / Annex A)?
Answer:
I am not sure what you mean, but with our Risk Assessment Toolkit you have all necessary documents to perform the risk assessment and the risk treatment, so you can comply with clauses 6.1.2, 6.1.3 e), 6.2 and 8.2 of ISO 27001:2013. Is a requisite in the standard to have documented these clauses.
Here you can see a list of mandatory documents List of mandatory documents required by ISO 27001 (2013 revision) : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
Finally, if you buy the toolkit you will receive 60-day access to these tutorials that will show you how to fill in the documentation templates:
(1) Video tutorial: How to Write the ISO 27001 Risk Assessment Methodology, (2) Video tutorial: How to Implement Risk Assessme nt According to ISO 27001, (3) Video tutorial: How to Implement Risk Treatment According to ISO 27001, (4) Video tutorial: How to Write ISO 27001 Risk Assessment Report, (5) Video tutorial: How to Write ISO 27001 Statement of Applicability, (6) Video tutorial: How to Write ISO 27001 Risk Treatment Plan, (7) Webinar on demand: Risk Management Part 1, and (8) Webinar on demand: Risk Management Part 2
Group of assets
I have a question about listing assets for the risk assessment. Is it acceptable to list similar assets under a single asset item (e.g. "laptops") instead of listing every item individually?
Assuming this might be ok, is it then acceptable to add more specific items to the same list. E.g. "All Dell laptops" or "Jane Smith's laptop"? Otherwise it seems that the list of assets and risk assessment items could easily grow to impractical or unmanageable proportions.
Answer:
Yes, you can create group of assets, for example laptops if they have the same threats/vulnerabilities and also the same risk. Regarding your second question, you need to take care, because you can have laptops located in others facilities or other companies- which can have different threats/vulnerabilities and risks, so in this case you cannot include them in the same group laptops. It is also important to think about the data that the laptop has: If Jane Smith is for example the head of HR Department, maybe has confidential information (which is not in oth er laptop) and is critical for the business. So from my point of view in this case will be better to have an individual asset.
This article can be interesting for you How to handle Asset register (Asset inventory) according to ISO 27001 : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
Many documents
I am conscious that this process generates a lot of paperwork, and one of the push backs from the business is that it will become too cumbersome to manage and things will get missed / ignored because it is unrealistic to maintain and make people aware of everything. Ultimately, we dont want this just to become a tick box exercise and lose sight of why we are doing it. I would be interested in knowing how other companies have addressed this i.e. have they consolidated all the documents into a single document or grouped certain policies and documents together?
Can you please give me some ideas on what kind of questions can be asked while I perform the internal audit to the HR team, Testing team
Answer:
Generally you need to verify if the HR team is compliant with the domain "A.7 Human resource security , which is included in the Annex A of ISO 27001:2013, and is composed by the objective control "A.7.1 Prior to employment", "A.7.2 During employment" and "A.7.3 Termination and change of employment". In some cases, can be also necessary ask to them questions related to legal obligations (domain A.18), if the HR team is responsible for these issues.
So basically you need to ask questions related to the compliant of controls included in the domain A.7.
Finally, this article can be interesting for you How to make an Internal Audit checklist for ISO 27001 / ISO 22301 : https://advisera.com/27001academy/knowledgebase/how-to-make-an-internal-audit-checklist-for-iso-27001-iso-22301/
Data center relocated
Our data center relocated from one place to another, Can you have any check list through which we assess DC Migration, OR Post DC Migration checklist.
Answer:
I am not sure what you mean, but we do not have this specific checklist. Anyway, if you have relocated your data center, generally it is recommendable to perform again the risk assessment & treatment. You can use our methodology for this, which is composed by a Risk Assessment Table, Risk Treatment Table, Risk Assessment and Treatment Report, Statement of Applicability and Risk Treatment Plan. You can download a free version of our Risk Assessment Toolkit clicking on Free Demo tab here ISO 27001/ISO 22301 Risk Assessment Toolkit : https://advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/
We also have a checklist for the internal audit "Internal Audit Checklist" : https://advisera.com/27001academy/documentation/internal-audit-checklist/
I was wondering if you might have recommendations for implementer training for ISO 27001? My employer is pondering pursuing certification and I've not fully kept up with the standard the past few years. I did implementer training via BSi about 10 years ago, but things have obviously changed since then. Also, the BSi training was quite boring.