Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • ISO 27001/ISO 27002 vs COBIT


    I use the ISO27001 and ISO27001 the controls to build a robust framework on this subject, but there are many people who say i should use COBIT 5 instead of ISO. What are the main differences between them? What are the advantages of using one or another. In a company with xxx stores and xxx employees is important to define the way before starting to work on this issue. I was grateful if I could give your opinion, obviously non-binding.

     

    Answer:

    ISO 27001/ISO 27002 and COBIT are similar, although COBIT is focused on IT governance while ISO 27001/ISO 27002 are focused on information security, furthermore COBIT is only a framework that you cannot certify, while you can obtain a certificate of ISO 27001 after the implementation. By the way, in the implementation you can use the guideline of best practices of the ISO 27002 (it is only a best practices about information security, you cannot certify ISO 27002).
    For more information about the differences between ISO 27001 and ISO 27002, you can read this article “ISO 27001 vs. ISO 27002” :  https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/
    So, if you need an IT governance framework, COBIT will be more useful for you (but keep in mind that you cannot certify it). And if you need a standard focused on information security and certify it, ISO 27001 will be more useful for you (remember that you can use ISO 27002 as guideline of best practices). 
    Finally, from my point of view, if your organization has stores, an international certificate like ISO can give you prestige and marketing edge, so with ISO 27001 you will obtain more benefits that with COBIT, anyway please read this article about 4 benefits of ISO 27001 “Four key benefits of ISO 27001 implementation” : https://advisera.com/27001academy/knowledgebase/four-key-benefits-of-iso-27001-implementation/
  • Understanding the organization and its context


    Can you help me about organization and its context? How can i Understanding the organization and its context? 
     

    Answer:

    Yes, sure we can help you. The main point of the paragraph "4.1 Understanding the organization and its context” of the ISO 27001:2013, is basically to identify internal and external issues (for the internal context you could consider organizational structure, roles and responsibilities, business strategy and objectives, etc, and for the external issues the most important are the interested parties and their requirements).
    For more information about this, please read this article “Explanation of ISO 27001:2013 clause 4.1 (Understanding the organization)” : https://advisera.com/27001academy/knowledgebase/how-to-define-context-of-the-organization-according-to-iso-27001/
  • Customer environment


    working in a development company , our company have compliance products , out tech support some time need to download the customer data to our internal network to do some troubleshooting upgrades....ect
    the tech support creates customer environment ( OS and related applications) and join it to the domain so that all GP applies to these environment ..
    the tech support is asking is it possible to have these environments on a work group rather than joining them to the domain ? 
    this request is based on a project we are working on to reduce the IT support part . so that the developers can create the VMs by them selves without the need for IT to join them to the domain ?
    is this ok ? i mean from a security point of view ?
     

    Answer:

    From my point of view, there is no problem to separate the customer environment in a workgroup. But on this way, you will need to establish a local policy on each machine to implement access control and give access only to authorized people (it is obviously more easy with domains and GPOs). And if you have a hypervisor for the VMs, I would also be careful with the access to it. 
    By the way, if you have a documented Access control policy (it is mandatory by the ISO 27001:2013 Annex A.9.1.1) you will need to include all of these issues related to the control access to the independent environment.
    Finally, this article can be interesting for you "How to handle access control according to ISO 27001" : https://advisera.com/27001academy/blog/2015/07/27/how-to-handle-access-control-according-to-iso-27001/
  • Internal audit


    We have been recommended for ISO 27001:2013 certification. However, I feel that our internal audits are weak. For example, for Clause 9.1 "Monitoring, Measurement, Analysis, and Evaluation", I would like to see if there are templates or suggestions that for conduction that audit, rather than "re-invent the wheel". Can you point me in the right direction? 
     

    Answer:

    Sure, we can help you. We have a specific toolkit to perform the internal audit. You can see a free version clicking on “Free demo” tab here “ISO 27001 / ISO 22301 Internal Audit Toolkit” : https://advisera.com/27001academy/iso-27001-22301-internal-audit-documentation-toolkit/
    And to perform the internal audit can be interesting to develop a checklist, so this article can be interesting for you “How to make an Internal Audit checklist for ISO 27001 / ISO 22301” : https://advisera.com/27001academy/knowledgebase/how-to-make-an-internal-audit-checklist-for-iso-27001-iso-22301/
  • ISO 27001:2013 and PDCA


    Would like to quickly check whether ISO 27001:2013 is still based on PDCA cycle
     

    Answer:

    It is a good question, and a quick response is: yes, ISO 27001:2013 is still based on PDCA cycle, although it is not explicit as in the previous version (ISO 27001:2005). 
    For more information about this, you can read this article “Has the PDCA Cycle been removed from the new ISO standards?” : https://advisera.com/27001academy/blog/2014/04/13/has-the-pdca-cycle-been-removed-from-the-new-iso-standards/
  • Locking a computer


    Is there a ISO or industry recommended time for locking a computer.  E.g 10-15mins
     

    Answer:

    No, there is not established a concrete time by ISO 27001, ISO 27002  (and I think neither industry recommendation). The important here is to protect the information in an unattended user equipment (it is related with the control A.11.2.8 of the Annex A of the ISO 27001:2013) but you can do it in the way that you want, or in the way that your business needs. 15 minutes can be good for a company where employees are the most of time in front of the computer, but can be long time in a company where employees are constantly moving from a computer to another, and there are people of different companies.
    Finally, if you want more information about physical security in ISO 27001, you can read this article “Physical security in ISO 27001: How to protect the secure areas” : https://advisera.com/27001academy/blog/2015/03/23/physical-security-in-iso-27001-how-to-protect-the-secure-areas/
  • Implement ISO 27001


    If i get certification ISO 27002, i can to implement ISO 27001 and if i can, how much should i charge?
     

    Answer:

    I am sorry but you cannot get the certification of ISO 27002, it is only a code of best practices that you can use to implement and certify ISO 27001 in your organization. For more information about differences of both, please read this article “ISO 27001 vs. ISO 27002” : https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/
    Regarding the charge, depend on the organization where you want to implement the standard (scope, number of employees, etc), although typically the cost of the implementation for a company with 50 employees could be between $5.000 - $20.000. Anyway, this article can be interesting for you “How much does ISO 27001 implementation cost?” : https://advisera.com/27001academy/blog/2011/02/08/how-much-does-iso-27001-implementation-cost/ 
    Finally, this free tool can help you to calculate the duration of an ISO 27001 implementation “Free Calculator – Duration of ISO 27001 / ISO 22301 Implementa tion” : https://advisera.com/27001academy/free-tools/free-calculator-duration-of-iso-27001-iso-22301-implementation/
  • DR site

    I suppose that your question is related to the selection of an external provider that give you a DR site. If so, from my point of view is more important that you take into consideration other parameters like support that they can give you (hours, phone, email, etc), the availability and capacity that they provide (should be established in the SLA), certifications (ISO 20000, ISO 27001, ISO 22301, etc), distance from the main data center, guarantees of services, and of course references of another clients (maybe you can find interesting information with your favorite search engine).
    Anyway, keep in mind that the Disaster Recovery is focussed in the information technology, and it is not the same that business continuity. For more information about this, please read this article “Disaster recovery vs. Business continuity” : https://advisera.com/27001academy/blog/ 2010/11/04/disaster-recovery-vs-business-continuity/
    And also this article about the distance of the disaster recovery can be interesting for you “Disaster recovery site – What is the ideal distance from primary site?” : https://advisera.com/27001academy/knowledgebase/disaster-recovery-site-what-is-the-ideal-distance-from-primary-site/
  • Organization structure


    Thanks so much for making me part of your group, the 27001 ACADEMY.  For options b and c in your article below, how does the organization structure look like for the project?
     

    Answer:

    You organization structure for options “b" and “c" can be the same that for the option “a”, because the organization structure should include roles (CEO, CISO, responsible of HR, etc) and generally it is always the same; the difference (options “b” and “c") is that some of these roles can be assumed by external people. For example, there are many companies that have an external experienced professional to assume the role of CISO.
    This article about CISO can be interesting for you “Chief Information Security Officer (CISO) - where does he belong in an org chart?” : https://advisera.com/27001academy/blog/2012/09/11/chief-information-security-officer-ciso-where-does-he-belong-in-an-org-chart/
    And also this article about how to choose a consultant “5 criteria for choosing an ISO 22301 / ISO 27001 consultant” : https://advisera.com/27001academy/blog/2013/03/25/5-criteria-for-choosing-a-iso-22301-iso-27001-consultant/
  • Risk assessment - Assets or process?


    Do you suggest to do risk assessment based on asset or business process? for your information, at this time we use asset based approach and it is too complex for our scope (about 1100 employee) have certification from IQNET, The certification is just for our network infrastructure. Now we are planning to extend the scope.

     

    Answer:

    If you have many assets (thousands of different assets of all type) involved in the scope of the ISMS, can be a good idea the risk assessment based on process, but keep in mind that in the risk assessment based on assets, you can have group of assets like “employees of a department”, “TVs”, “Desktops”, and any other group of assets that can be affected by the same threats/vulnerabilities, and this approach can reduce the risk assessment considerably. 
    But also keep in mind that if you change assets/process in your risk assessment, you will need to start from 0, applying a new methodology in a complex scope.
    So, if you reduce your risk assessment but the number of assets is high, and you can assume the eff ort to change the risk assessment and start from 0, my recommendation is the risk assessment based on process (it is not a problem in the ISO 27001:2013, I mean, you can use a risk assessment based on process without problem, although with the old ISO 27001:2005 you could not). If not, I think that you should maintain your current risk assessment, reducing it.
    Finally, this article about the risk assessment, can be interesting for you “ISO 27001 risk assessment: How to match assets, threats and vulnerabilities” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/
    And also this article about problems with defining the scope can be interesting for you “Problems with defining the scope in ISO 27001” : https://advisera.com/27001academy/blog/2010/06/29/problems-with-defining-the-scope-in-iso-27001/
Page 1052-vs-13485 of 1127 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +