En relación a los activos, el estándar ISO 27001:2013 no establece que se tenga que definir un responsable para una matriz de activos. Sólo es necesario asignar un propietario para cada activo, y en relación a los riesgos se necesita establecer un propietario del riesgo. Creo que puede ser interesante para ti conocer las diferencias entre ambos, por tanto por favor lee este artículo (en inglés) Risk owners vs. Asset owners in ISO 27001:2013 : https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
Neither ISO 27001 nor ISO 22301 require you to have a disaster recovery site. However, what both of these standards require you is to define how you will be able to recover your activities if your primary location is not available any more.
For the implementation of a ISMS there are many steps, but the first thing that you need is a project plan. Also is very important (and sometimes hard to achieve) is to obtain management support. For more information about the design of the ISMS, please read this article ISO 27001 implementation checklist : https://advisera.com/27001academy/knowledgebase/iso-27001-implementation-checklist/
Section 9.1 - Monitoring, Measurement, Analysis and Evaluation
ISO 27001 does not require you to have a separate document for measurement - what is important is to define the objectives and responsibilities who is going to measure whether these objectives are fulfilled.
Objectives are documented here:
General ISMS objectives - in the Information Security Policy
Specific control objectives - in the Statement of Applicability
Responsibilities for measurement are documented in Information Security Policy (section 4.1).
Para saber si tu sistema esta preparado para la auditoría de certificación de ISO 27001, la mejor opción es realizar una auditoría interna. De todas formas, si has comprado nuestro toolkit, puedes enviarnos hasta 5 documentos, y nosotros los revisaremos.
There are some security controls related to the protection and storage of passwords:
9.3.1 Use of secret authentication information: Regarding to your question, here is important to ensure proper protection of passwords when passwords are used as secret authentication information in automated log-on procedures and are stored.
9.4.3 Password management system: Regarding to your question, here is important to store and transmit passwords in protected form.
What is my recommendation? Use a software as a password management system, and store your password there. Also can be interesting that another people of your organization (closer to you) have access to this software.
Anyway, please remember what is the list of mandatory documents reading this article List of mandatory documents required by ISO 27001 (2013 revision) : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/