There are many organization issued ISO 270001 Certification like PECB, IRCA , ISO and RABQSA. Which one is the best?
Answer:
They are different things (PECB, IRCA, ISO and RABQSA). Certification bodies can issue a certificate of ISO 27001 for a company; some certification bodies: PECB, Bureau Veritas, BSI, AENOR, SGS, etc. But IRCA, ISO or RABQSA are not certification bodies that can issue certificates for companies, although IRCA and RABQSA can certify individual professionals (ISO 27001 Lead Auditor, Lead Implementer, etc).
So basically a certification body (for example PECB) can certify companies in ISO 27001, but these entities need to be accredited in each country by an accreditation body (In United Kingdom for example is UKAS : https://www.ukas.com).
Also it is important to know that ISO is not a certification body, neither accreditation body, it is only a standardization body that develops and publishes standards (ISO 27001, ISO 22301, ISO 9001, etc).
To know what is the best certification body for your business, there ar e some parameters like reputation, accreditation, etc. For more information please read this article How to choose a certification body : https://advisera.com/blog/2021/01/11/how-to-choose-an-iso-certification-body/
Activity Recovery Plan Section 8
I'm sorry for responding this late.
I didn't quite understand your question - in our template, we have "Recovery steps for the activity" in section 6, and section prior to this is called "Necessary resources".
In any case, in the "Recovery steps" section you should describe exactly what your employees will need to do to resume their business operations - e.g. travel to the alternative location, purchase missing equipment, find additional human resources, restart key software applications, return all the data from the backup, test is some data is missing, etc.
System admin requires ISO 27001 certification?
hi, i am working as manager system admin and having 14 years operations experience, can you share the justification that why system admin require ISO 27001 certification and training and how this course help them to implement best practices and compliance up to mark.
Answer:
It is not established in ISO 27001 that a specific profile (system admin or any other) needs to have an ISO 27001 certification, but obviously if a company wants to implement ISO 27001 needs to have people with experience and knowledge about ISO 27001, so in this case it is necessary training about the standard for those people involved in the implementation (if they do not have the necessary knowledge), and can be interesting to obtain the ISO 27001 Lead implementer, although it is not mandatory.
The course of ISO 27001 Lead Implementer will help to you employees to give them the necessary information to the implementation and to be compliant with the requisites of the standard in your organization, taking into account that ISO 27001 is a standard about Inform ation Security Management Systems.
To implement best practices about information security, the best is to have knowledge about ISO 27002, which basically is a code of best practices about information security, so if you are interested in best practices, it is better training about ISO 27002.
Finally, these articles can be interesting for you:
"How to learn about ISO 27001 and BS 25999-2" : https://advisera.com/27001academy/blog/2010/11/30/how-to-learn-about-iso-27001-and-bs-25999-2/
"Lead Auditor Course vs. Lead Implementer Course - Which one to go for?" : https://advisera.com/27001academy/blog/2014/06/16/lead-auditor-course-vs-lead-implementer-course-which-one-to-go-for/
Certifications and Training programs
I would like to check with you if the BSI Certifications and their Training program are worth and has value and recognition?
Also if there are any other options please advise.
I am in the process of identifying assets for our organization. I ended up identifying several key IT s ervices which enable various business processes. For example:
IT Service: EMAIL
Information Assets: Supports Communication and storage of Customer Information
Application: MS Exchange
OS: Windows Server 2008 r2
Hardware: HP DL380
Facility: DataCenter
In my risk assessment where do I reference the IT Service and Information Assets line, or are they just ignored? Should I reference them in any other documents? I thought this was a helpful way to group as it shows relationships.
Answer:
From my point of view, you should not ignore the IT service, you can identify it as an asset of type service, and assign to it threats/vulnerabilities (in accordance with your methodology). You can reference this type of asset in the same document that you already have, I mean, in your asset inventory.
Finally, do you need information about threats and vulnerabilities that can affect to your assets? This article can be interesting for you Catalogue of threats & vulnerabilities : https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/
Can be interesting for you these articles:
which is the LOG SERVER requirement for the 27001 firewall ?
Answer:
I am not sure what you mean, but there is not specific requirement in ISO 27001 related to log firewalls, although you can find the control objective A.12.4 Logging and monitoring, which has controls for event logging, protection of logs, clock synchronization and administrator and operator logs. So there are requirements in the standard related to any type of logs.
Maybe this article about firewalls can be interesting for you How to use firewalls in ISO 27001 and ISO 27002 implementation : https://advisera.com/27001academy/blog/2015/05/25/how-to-use-firewalls-in-iso-27001-and-iso-27002-implementation/
Outsourced components
We have outsourced a couple of components of our organization. The support of our server hardware and operating system is supported by 1 company, while the datacenter where these servers sit is supported by another company.
Question 1: How would I write this up for our asset inventory?
Question 2: Are the contracted companies asset owners or risk owners?
Question 3: Do I list the datacenter facility as a facility asset or simply identify the environmental threats for the servers there as having sharedoutsourced risks for their security control, and ensure our supplier contracts discuss mitigating those threats?
Question 4: For that matter should I ever list the facility as an asset, or simply the systems and information contained in the facility as assets?
Answers:
Answer 1: From my point of view, simply including them in your asset inventory (following your methodology), if these assets are related to the scope of your ISMS.
Answer 2: Yes, external companies can be asset owners and risk owners (even for those assets that are n ot part of the ISMS scope). For example, the asset owner of a server can be the IT administrator of the external company, and the risk owner can be the head of the IT department of the external company. For more information about these terms, please read this article Risk owners vs. Asset owners in ISO 27001:2013 : https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
Answer 3: From my point of view it is better if you list the datacenter as facility asset. Here it is important to have an asset for the datacenter (type facility), because there are threats directly related to this type of asset (there are also other threats directly related to the servers), furthermore you need to ensure that your supplier contract discuss about risks and the mitigation of threats.
Answer 4: An approach can be: Identify the facility as an asset, and also the systems and information contained on it, because they are different type of assets and have different threats/vulnerabilities. Another approach can be: Identify an unique asset and assign to it all threats/vulnerabilities related to the facility, systems and information.
Finally, this article about the asset inventory can be interesting for you How to handle Asset register (Asset inventory) according to ISO 27001 : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
Categorize software
Your documents reference software as being an asset, shall I document client pcs software individually as an asset(office, adobe ,etc), group them as a business productivity apps category, or ignore them altogether?
Answer:
Yes, we reference the software in our templates as a type of asset, and from my point of view the best is to document and group the software in categories (operative system, office, database, etc.)
By the way, do you know how to match assets, threats and vulnerabilities? This article can be interesting for you ISO 27001 risk assessment: How to match assets, threats and vulnerabilities : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/
External vendor performing the Risk assessmentPhone handset, Asset?
Is there any part of the risk assessment methodology and process, per your template, that an external vendor performing the assessment and consulting on the isms can not do?
Answer:
I am not sure what you mean, but any part of the risk assessment methodology and process of our templates can be done by any person that knows your business, so you can have external help for this (although the evaluation of impact and likelihood in most cases cannot be done by external consultant), but it wont be necessary because if you buy our templates you will have our support.
Generally if you hire an external company, or external experts, to perform all activities related to the risk assessment, it will be most expensive.
Finally, these articles can be interesting for you:
5 criteria for choosing an ISO 22301 / ISO 27001 consultant : https://advisera.com/27001academy/blog/2013/03/25/5-criteria-for-choosing-a-iso-22301-iso-27001-consultant/
Do you really need a consultant for ISO 27001 / BS 25999 implementation? : https://advisera.com/27001academy/blog/2011/12/06/do-you-really-need-a-consultant-for-iso-27001-bs-25999-implementation/ We have received this question:
Would a phone handset be considered an asset falling under the jurisdiction of iso 27001?
Answer:
From my point of view, generally no. In accordance with ISO 27000 (this standard defines terms of information security) an asset is anything that has value to the organisation, and I think that a phone handset has low value for an organization, although can be important to consider phones, smartphones, etc.
Anyway if you want, or if in your business a phone handset is important, you can have in your asset inventory this asset.
Regarding the asset inventory, this article can be interesting for you How to handle Asset register (Asset inventory) according to ISO 27001 : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
People asset
It is possible or even likely that a company would not have any people assets with respect to knowing information which is not found anywhere else? The company is about 100 people in scope? If I may be missing something, what would be the best method for determining if a person needs to be listed as an information asset?
Answer:
I am not sure what you mean, but generally is not possible that a company haven't people assets with critical information which is not found anywhere else. All companies have a hierarchy, and generally the top of the organization has information about the business that dont know normal employees (neither external people). So all people related to the scope of the ISMS- it is important for the risk assessment, so it is important to identify them in your inventory asset.
Regarding your last question, the best method for determining if a person needs to be listed as an information asset is to know is this person is affected by the scope of the ISMS (if is working in the ISMS, or has any responsibility, or ha s information about the business related with the ISMS, or perform activities related to the scope of the ISMS, etc).
Finally maybe this free webinar can be interesting for you The basics of risk assessment and treatment according to ISO 27001 : https://advisera.com/27001academy/webinar/basics-risk-assessment-treatment-according-iso-27001-free-webinar-demand/