Sure, you are welcome. And sorry but we do not have other specifics examples related to your question, but if you need more information about nonconformities, I think that this article can be interesting for you "Major vs. Minor nonconformities in the certification audit" :
I just want to know that is your new RISK assessment toolkit is based on ISO 31000
Answer:
Our methodology is based on ISO 27005, which has the same structure that ISO 31000 (they are fully compatible), but while ISO 31000 is focused on any type of risk (environmental, financial, information security, etc), ISO 27005 is focused specifically to information security. So, if you want to work only with information security, the best, or our recommendation, is a methodology based on ISO 27005. If you want, you can see a free version of our template clicking on Free Demo tab here Risk Assessment and Risk Treatment Methodology : https://advisera.com/27001academy/documentation/Risk-Assessment-and-Risk-Treatment-Methodology/
Finally, if you need more information about ISO 27001, ISO 27005 and ISO 31000, you can read this article ISO 31000 and ISO 27001 How are they related? : https://advisera.com/27001academy/blog/2014/03/31/iso-31000-and-iso-27001-how-are-they-related/
Questions about ISO 27001
I need some ISMS question for prepare interview.
The interviewer will probably focus on the following:
1.- Which safeguards (controls) are listed in ISO 27001
2.- What is the role of risk management in ISO 27001
3.- Which are general steps in the implementation of this standard
4.- How to setup an ISO 27001 project
Information Security Aspects of Business Continuity
Hi. I am currently working on a project - Implementing Iso27001 for the IT department (Support function- No. of employees is 6) of an organisation. I need clarification regarding the control " Information Security Aspects of Business Continuity". would this be applicable to them ? they are just in the planning phase of DRP and they do not have BCP in Place as of now.
Answer:
Information Security Aspects of Business Continuity is not a control, is a domain (domain A.17) composed by the controls A.17.1.1, A.17.1.2, A.17.1.3, and A.17.2.1. These controls are basically for implement a Business Continuity Plan or a Disaster Recovery Plan in your business. We recommend you to develop a Disaster Recovery Plan because it is related to the Infrastructure IT, so you can find a template for this here (you can see a free version clicking on Free Demo tab) Disaster Recovery Plan : https://advisera.com/27001academy/documentation/disaster-recovery-plan/
Regarding to the applicability, these controls are applicable to your employees if the Di saster Recovery Plan or the Business Continuity Plan can affect their job, and also if they are in the scope of the ISMS. Here is very important the awareness, because each one need to know what to do in case of activation of the plan (DRP or BCP).
Applicability of ISO 27001 procedures in scope with multiple departments
This questions stems from the fact that many of our existing documentation such as standards and procedures have been written up that gives the reader the impression that the controls mentioned in these documents are minimum requirements that are to be applied to all in-scope-units; whereas, in the first instance the control would have been chosen as an answer to one unit's risk.
Answer:
You should decide on your own whether your documents (e.g. policies, procedures, etc.) will apply to your whole organ ization, to your whole ISMS scope, or only to a particular organizational unit. However, when writing your documents, then you have to specify clearly to which organizational units they apply to; you can also specify this information in the Statement of Applicability.
Tengo una duda?, los dominios son como los requisitos o requerimientos?, es el deber ser de la norma ISo 27001?, o los requiesitos son los que usted expone en una pagina donde habla de lo siguiente:
1.Diagnostico y formulacion
1.1. Apoyo de la dirección
1.2. Tomarlo como un proyecto
1.3. Definir el alcance del SGSI
1.4. Política del SGSI
1.5. Definir la metodología de la evaluación de riesgos
1.6. Realizar la evaluación y el tratamiento de riesgos
1.7. Redactar la declaración de aplicabilidad
1.8. Redactar el plan de tratamiento del riesgo
1.9. Determinar como medir la eficacia de los controles
1.10. Implementación de controles y procedimientos obligatorios
1.10.1. Procedimiento para el control de la documentación
1.10.2. Procedimiento para auditorias internas
1.10.3. Procedimiento para medidas correctivas
1.11. Implementar programas de capacitación y concienciación
1.12. Hacer funcionar el SGSI
1.13. Supervisión del SGSI
1.14. Auditoria interna
1.15. Revisión por parte de la dirección
1.16. Medidas preventivas y correctivas
Respuesta:
Esta lista es sólo una guía para implementar la ISO 27001 en su organización, pero cada punto está relacionado con un requisito de la norma. Por tanto, necesitas implementar todos los requisitos de ISO 27001, y para hacer esto, puedes utilizar nuestra lista de 16 pasos.
My Organisation would like to go for ISO-27001 Certification for its Data Center.Various Applications (All Application belongs to Single client) are hosted some of them Critical and some of them not.All Applications hosted in Datacenter does not have DR.
Some of hosted Applications in Datacenter is critical and it affects their operations part.Due to lack of finance,DR is not operational.It will be operational but will take more time.
So Can I proceed for ISO-27001 Certification right now even when i dont have DR for all application hosted in Data Center???Is there any mandatory requirement of having DR in place.
What about If my client is ready to accept the risk regarding unavailability of application for few hours or even days??
Answer:
The right way is this: You need to perform the risk assessment & treatment, and the first thing that you need is to calculate the risks related to the applications (or to the all Data Center). If after this, the risk is above of the acceptable level, you can:
Reduce the risk (applying security c ontrols)
Accept the risk
Avoid the risk
Transfer the risk
So, in your case, I think that the best is to accept the risk, this means that you know the risks, but due to lack of budget you cannot reduce it. But in this case, it is very important that the top management knows and approve the situation. On this way, you could certify the ISO 27001 in your organization.
Anyway, I think that the best, if you can, is that you implement a DR in some applications, as minimal in the critical applications, on this way you could recover a part of the IT infrastructure.
For more information about the risk assessment & treatment, please read this article Risk Treatment Plan and risk treatment process Whats the difference? : https://advisera.com/27001academy/iso-27001-risk-assessment-treatment-management/#treatment
Awareness for a IT team
Do you have awareness materials which I can use for end users. Also is there anything separate for creating awareness for IT team. What should be included in the IT team training?
Answer:
Regarding to the users, you can use our presentation Why ISO 27001 Awareness presentation. You can find it in our section of free downloads here : https://advisera.com/27001academy/free-downloads/
Regarding to the IT team, it is more complex because there are many security controls related to technology in the standard, and there are different (firewalls, control access, vulnerabilities). Generally IT people has knowledge enough to implement technological controls, but also it is necessary that they are aware in information security, so my recommendation for you is that use the first presentation for this people too. If not, if your IT team is junior, maybe will be necessary some technical certifications like MCSA, LPI, CEH, etc.
Doubts about A.14.2.5
Can you please help us and provide some detailed information as to what should be covered in A.14.2.5 of ISO 27002:2013.
Answer:
Sure, I will give you information about this. If you see the Implementation guidance of the control 14.2.5 in the ISO 27002:2013, you can read this: Security should be designed into all architecture layers (business, data, applications and technology) balancing the need for information security with the need for accessibility. So, this control is related to the large information system design, which also include the software development.
If you need a template to implement this control, this can be interesting for you (you can see a free version clicking on Free Demo tab) Secure Development Policy": https://advisera.com/27001academy/documentation/secure-development-policy/
And also this template can be interesting for you Operating Procedures for Information and Communication Technology : https://advisera.com/27001academy/documentation/security-procedures-for-it-department/
Please, let us know if you need more information about this control.
External CISO
We purchased the consultants kit from your team and so far it has been great. We have starting helping one of our clients with their iso initiative, and we ran into a question I was hoping you could answer.
We perform most all IT functions for this company including its security monitoring, what is the greatest role we can fill with their ISO project team. Can we handle all the traditional functions of a CISO as described in your blog and toolkit? In essence we are already performing those capabilities on a greatly reduced scale. Or do they need to have an internal employee fill that role?
Answer:
Yes, your company can perform tasks related to the manage of the ISMS, including functions of a CISO, so it i not necessary that the company has an internal employee for the CISO position. Here is important that the company that wants to implement the ISO 27001 has the necessary knowledge about the standard to implement it, and they can request services of an external company to do it. But in this case, remember that it is very important to take in place agreements between both companies. Your company will be a supplier for your client, so the template Supplier Security Policy" can be interesting for you. You can find it in the folder 08 Annex AA.15 Supplier relationships.
Finally, I think that these articles can be interesting for you: