Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Data center assets


    data center assets, threats and vulnerabilities?
    What's assets and common security threats and vulnerabilities in data centers?
     

    Answer:

    In accordance with the definitions of ISO 27000, an asset is “anything that has value to the organization”. So, from my point of view you can identify: servers, switches, routers, Access points, operative systems, databases, employees, facilities, etc. This article can be interesting for you “How to handle Asset register (Asset inventory) according to ISO 27001” : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/ 
    And there are not common threats and vulnerabilities related to data centers, but you can use a catalogue and select those that can affect to your assets. Here you can find a catalogue of threats and vulnerabilities “Catalogue of threats & vulnerabilities” : https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/
    Finally, I think that this article can be also interesting for you “ISO 27001 risk assessment: H ow to match assets, threats and vulnerabilities” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/
  • Company that does not develop software


    I am implementing ISO 27001:2013 for one company. They do not develop any software but they use out of the box softwares for internal usage. Rest they have typical IT network (Switches, Routers, Email etc).
    Are below mentioned controls applicable?
    A.      14.2.5 Secure System Engineering Principles
    A.      14.2.6 Secure Development Environment
    A.      14.2.8 System Security Testing
    A.      14.2.9 System Acceptance Testing
    A.      14.3.1 Protection of Test Data
    A.      10.1.1 Policy on the use of Cryptographic Control
     

    Answer:

    The decisions about if these controls apply, needs to be made after the risk assessment & treatment. So, if there are no risks related to the develop of software, or with cryptographic controls, you don’t need to apply them.
    Finally these articles can be interesting for you:
    “ISO 27001 risk assessment 6 treatment – 6 basic steps” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/
    "The basic logic of ISO 27001: How does information security work?" : https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
  • Risk Assessment Toolkit


    I downloaded the free version of the application Risk Assessment Toolkit. My question is the following: the application is helpful only for the preparation of the documents? 
    Performs cross-checking specific (for example 6.1.3 / Annex A)? 
     

    Answer:

    I am not sure what you mean, but with our Risk Assessment Toolkit you have all necessary documents to perform the risk assessment and the risk treatment, so you can comply with clauses 6.1.2, 6.1.3 e), 6.2 and 8.2 of ISO 27001:2013. Is a requisite in the standard to have documented these clauses.
    Here you can see a list of mandatory documents “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
    Finally, if you buy the toolkit you will receive 60-day access to these tutorials that will show you how to fill in the documentation templates: 
    (1) Video tutorial: How to Write the ISO 27001 Risk Assessment Methodology, (2) Video tutorial: How to Implement Risk Assessme nt According to ISO 27001, (3) Video tutorial: How to Implement Risk Treatment According to ISO 27001, (4) Video tutorial: How to Write ISO 27001 Risk Assessment Report, (5) Video tutorial: How to Write ISO 27001 Statement of Applicability, (6) Video tutorial: How to Write ISO 27001 Risk Treatment Plan, (7) Webinar on demand: Risk Management Part 1, and (8) Webinar on demand: Risk Management Part 2
  • Group of assets


    I have a question about listing assets for the risk assessment.  Is it acceptable to list similar assets under a single asset item (e.g. "laptops") instead of listing every item individually?

    Assuming this might be ok, is it then acceptable to add more specific items to the same list.  E.g. "All Dell laptops" or "Jane Smith's laptop"? Otherwise it seems that the list of assets and risk assessment items could easily grow to impractical or unmanageable proportions.

     

    Answer:

    Yes, you can create group of assets, for example “laptops” if they have the same threats/vulnerabilities and also the same risk. Regarding your second question, you need to take care, because you can have laptops –located in others facilities or other companies- which can have different threats/vulnerabilities and risks, so in this case you cannot include them in the same group “laptops”. It is also important to think about the data that the laptop has: If Jane Smith is for example the head of HR Department, maybe has confidential information (which is not in oth er laptop) and is critical for the business. So from my point of view in this case will be better to have an individual asset.
    This article can be interesting for you “How to handle Asset register (Asset inventory) according to ISO 27001” : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
  • Many documents


    I am conscious that this process generates a lot of paperwork, and one of the push backs from the business is that it will become too cumbersome to manage and things will get missed / ignored because it is unrealistic to maintain and make people aware of everything.  Ultimately, we don’t want this just to become a tick box exercise and lose sight of why we are doing it.  I would be interested in knowing how other companies have addressed this i.e. have they consolidated all the documents into a single document or grouped certain policies and documents together?
     

    Answer:

    Generally the number and complexity of documents is adapted to the particular needs of each company, please read this article for more information “8 criteria to decide which ISO 27001 policies and procedures to write” : https://advisera.com/27001academy/blog/2014/07/28/8-criteria-to-decide-which-iso-27001-policies-and-procedures-to-write/
    By the way, in accordance with ISO 27001, there are some mandatory documents, you can see the list here “List of mandatory documen ts required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
  • Questions for HR team during the Internal Audit


    Can you please give me some ideas on what kind of questions can be asked while I perform the internal audit to the HR team, Testing team
     

    Answer:

    Generally you need to verify if the HR team is compliant with the domain "A.7 Human resource security” , which is included in the Annex A of ISO 27001:2013, and is composed by the objective control "A.7.1 Prior to employment", "A.7.2 During employment" and "A.7.3 Termination and change of employment". In some cases, can be also necessary ask to them questions related to legal obligations (domain A.18), if the HR team is responsible for these issues.
    So basically you need to ask questions related to the compliant of controls included in the domain “A.7”. 
    Finally, this article can be interesting for you “How to make an Internal Audit checklist for ISO 27001 / ISO 22301” : https://advisera.com/27001academy/knowledgebase/how-to-make-an-internal-audit-checklist-for-iso-27001-iso-22301/
  • Data center relocated


    Our data center relocated from one place to another, Can you have any check list through which we assess DC Migration, OR Post DC Migration checklist.
     

    Answer:

    I am not sure what you mean, but we do not have this specific checklist. Anyway, if you have relocated your data center, generally it is recommendable to perform again the risk assessment & treatment. You can use our methodology for this, which is composed by a Risk Assessment Table, Risk Treatment Table, Risk Assessment and Treatment Report, Statement of Applicability and Risk Treatment Plan. You can download a free version of our Risk Assessment Toolkit clicking on “Free Demo” tab here “ISO 27001/ISO 22301 Risk Assessment Toolkit” : https://advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/ 
    We also have a checklist for the internal audit "Internal Audit Checklist" : https://advisera.com/27001academy/documentation/internal-audit-checklist/
  • Legislation starter list


    do you have relevant legislation starter lists ? 
     

    Answer:

    Yes, we have an article where you can find a list of laws and regulations related to information security of various countries. You can see it here “Laws and regulations on information security and business continuity” : https://advisera.com/27001academy/knowledgebase/laws-regulations-information-security-business-continuity/
  • Implementer training for ISO 27001


    I was wondering if you might have recommendations for implementer training for ISO 27001? My employer is pondering pursuing certification and I've not fully kept up with the standard the past few years. I did implementer training via BSi about 10 years ago, but things have obviously changed since then. Also, the BSi training was quite boring.
     

    Answer:

    There are many entities, mainly certification bodies like BSI, that has courses about ISO 27001 Lead Implementer (and also ISO 27001 Lead Auditor). Examples: Bureau Veritas, AENOR, SGS, etc.
    Our recommendation is that the company that offers the course has an accreditation (for example IRCA). Anyway, this article can be interesting for you “How to become an ISO 27001 / ISO 22301 consultant” : https://advisera.com/27001academy/blog/2014/07/21/how-to-become-an-iso-27001-iso-22301-consultant/ 
    Finally, maybe can be interesting for you to know changes in the new ISO 27001:2013, so this article can be interesting for you “Infographic: New ISO 27001 2013 revision – What has changed?” : https://advisera.com/27001academy/knowledgebase/infographic-new-iso-27001-2013-revision-what-has-changed/
  • Exclude controls


    The scope of our certification is IT Customer Operation Department – including Internal IT, Engineering and Infrastructure…  HR and Legal are excluded from the scope. My question is if I can exclude all the controls which are in their responsibility for example Securing Offices, Disciplinary Process or Identification of applicable legislation…
    Thank you in advance for your opinion,
    One more question do you also offer consultation?
     

    Answer:

    You can exclude controls only if there are no risks which would require such controls. So if after the risk assessment & treatment you do not need these controls to reduce risks, you can exclude them. 
    Anyway, from my point of view generally you cannot exclude controls related to compliance, laws or applicable legislation, because they are requirements of the business. 
    This article can be interesting for you “ISO 27001 risk assessment & treatment – 6 basic steps” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/
    And also this article “How to defin e the ISMS scope” : https://advisera.com/27001academy/knowledgebase/how-to-define-the-isms-scope/
    Regarding your last question, yes we offer consultant services for the implementation of ISO 27001 in your business if you buy our toolkit, although you can also ask us questions related to ISO 27001 and/or ISO 22301 without cost.
Page 1044-vs-13485 of 1127 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +