I am implementing ISO 27001:2013 for one company. They do not develop any software but they use out of the box softwares for internal usage. Rest they have typical IT network (Switches, Routers, Email etc).
Are below mentioned controls applicable?
A. 14.2.5 Secure System Engineering Principles
A. 14.2.6 Secure Development Environment
A. 14.2.8 System Security Testing
A. 14.2.9 System Acceptance Testing
A. 14.3.1 Protection of Test Data
A. 10.1.1 Policy on the use of Cryptographic Control
I downloaded the free version of the application Risk Assessment Toolkit. My question is the following: the application is helpful only for the preparation of the documents?
Performs cross-checking specific (for example 6.1.3 / Annex A)?
Answer:
I am not sure what you mean, but with our Risk Assessment Toolkit you have all necessary documents to perform the risk assessment and the risk treatment, so you can comply with clauses 6.1.2, 6.1.3 e), 6.2 and 8.2 of ISO 27001:2013. Is a requisite in the standard to have documented these clauses.
Here you can see a list of mandatory documents List of mandatory documents required by ISO 27001 (2013 revision) : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
Finally, if you buy the toolkit you will receive 60-day access to these tutorials that will show you how to fill in the documentation templates:
(1) Video tutorial: How to Write the ISO 27001 Risk Assessment Methodology, (2) Video tutorial: How to Implement Risk Assessme nt According to ISO 27001, (3) Video tutorial: How to Implement Risk Treatment According to ISO 27001, (4) Video tutorial: How to Write ISO 27001 Risk Assessment Report, (5) Video tutorial: How to Write ISO 27001 Statement of Applicability, (6) Video tutorial: How to Write ISO 27001 Risk Treatment Plan, (7) Webinar on demand: Risk Management Part 1, and (8) Webinar on demand: Risk Management Part 2
Group of assets
I have a question about listing assets for the risk assessment. Is it acceptable to list similar assets under a single asset item (e.g. "laptops") instead of listing every item individually?
Assuming this might be ok, is it then acceptable to add more specific items to the same list. E.g. "All Dell laptops" or "Jane Smith's laptop"? Otherwise it seems that the list of assets and risk assessment items could easily grow to impractical or unmanageable proportions.
Answer:
Yes, you can create group of assets, for example laptops if they have the same threats/vulnerabilities and also the same risk. Regarding your second question, you need to take care, because you can have laptops located in others facilities or other companies- which can have different threats/vulnerabilities and risks, so in this case you cannot include them in the same group laptops. It is also important to think about the data that the laptop has: If Jane Smith is for example the head of HR Department, maybe has confidential information (which is not in oth er laptop) and is critical for the business. So from my point of view in this case will be better to have an individual asset.
This article can be interesting for you How to handle Asset register (Asset inventory) according to ISO 27001 : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
Many documents
I am conscious that this process generates a lot of paperwork, and one of the push backs from the business is that it will become too cumbersome to manage and things will get missed / ignored because it is unrealistic to maintain and make people aware of everything. Ultimately, we dont want this just to become a tick box exercise and lose sight of why we are doing it. I would be interested in knowing how other companies have addressed this i.e. have they consolidated all the documents into a single document or grouped certain policies and documents together?
Can you please give me some ideas on what kind of questions can be asked while I perform the internal audit to the HR team, Testing team
Answer:
Generally you need to verify if the HR team is compliant with the domain "A.7 Human resource security , which is included in the Annex A of ISO 27001:2013, and is composed by the objective control "A.7.1 Prior to employment", "A.7.2 During employment" and "A.7.3 Termination and change of employment". In some cases, can be also necessary ask to them questions related to legal obligations (domain A.18), if the HR team is responsible for these issues.
So basically you need to ask questions related to the compliant of controls included in the domain A.7.
Finally, this article can be interesting for you How to make an Internal Audit checklist for ISO 27001 / ISO 22301 : https://advisera.com/27001academy/knowledgebase/how-to-make-an-internal-audit-checklist-for-iso-27001-iso-22301/
Data center relocated
Our data center relocated from one place to another, Can you have any check list through which we assess DC Migration, OR Post DC Migration checklist.
Answer:
I am not sure what you mean, but we do not have this specific checklist. Anyway, if you have relocated your data center, generally it is recommendable to perform again the risk assessment & treatment. You can use our methodology for this, which is composed by a Risk Assessment Table, Risk Treatment Table, Risk Assessment and Treatment Report, Statement of Applicability and Risk Treatment Plan. You can download a free version of our Risk Assessment Toolkit clicking on Free Demo tab here ISO 27001/ISO 22301 Risk Assessment Toolkit : https://advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/
We also have a checklist for the internal audit "Internal Audit Checklist" : https://advisera.com/27001academy/documentation/internal-audit-checklist/
I was wondering if you might have recommendations for implementer training for ISO 27001? My employer is pondering pursuing certification and I've not fully kept up with the standard the past few years. I did implementer training via BSi about 10 years ago, but things have obviously changed since then. Also, the BSi training was quite boring.
The scope of our certification is IT Customer Operation Department including Internal IT, Engineering and Infrastructure HR and Legal are excluded from the scope. My question is if I can exclude all the controls which are in their responsibility for example Securing Offices, Disciplinary Process or Identification of applicable legislation
Thank you in advance for your opinion,
One more question do you also offer consultation?
Answer:
You can exclude controls only if there are no risks which would require such controls. So if after the risk assessment & treatment you do not need these controls to reduce risks, you can exclude them.
Anyway, from my point of view generally you cannot exclude controls related to compliance, laws or applicable legislation, because they are requirements of the business.
This article can be interesting for you ISO 27001 risk assessment & treatment 6 basic steps : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/
And also this article How to defin e the ISMS scope : https://advisera.com/27001academy/knowledgebase/how-to-define-the-isms-scope/
Regarding your last question, yes we offer consultant services for the implementation of ISO 27001 in your business if you buy our toolkit, although you can also ask us questions related to ISO 27001 and/or ISO 22301 without cost.