So to clarify, in your example of asset categories if I have a grouped assets under application software (licensed) , I can perform my risk assessment based on this group if the threat and vulnerabilities applies to the group of assets.
So in my inventory of assets, all I need to do is complete the table with the same information I used in the risk assessment table:
ID
Asset category
Name of asset
Asset owner
Asset description
1
Applications and databases
application software (licensed)
IT
Licenced application software.
Would this be sufficient or would I need to list all licenced software?
Answer:
Yes, you are right, in your risk assessment you can have a group of assets (type software) and identify threats and vulnerabilities that applies to it (threats and vulnerabilities related to software), but in your case, I think that it will be better if you have 2 different groups of assets: Applications and Databases, because risks can be different. Only if after performing the risk assessment you see that they have the same risk, you can consider integrate them in an unique group.
Finally, keep in mind that additionally, in accordance with intellectual property legislation, you must to have a inventory of your licensed software.
Measurement of the absolute risk
To evaluate the risk, you should take in consideration the security controls that exist in the organization for each asset. This approach is more real and more closer to the reality of your business, because considers the current controls. If not, you will have a point of view that not reflects the reality. So, our recommendation is the first approach, I mean, that you consider current security controls.
Our Risk assessment methodology is based on ISO 27001 and ISO 27005, and is specially adapted for smaller and mid-sized companies. Further, it is compliant not only with ISO 27001, but also with ISO 22301 (the business continuity standard).
Here you can see a free version of our methodology clicking on Free Demo tab: https://advisera.com/27001academy/documentation/Risk-Assessment-and-Risk-Treatment-Methodology/
Group of assets
In the risk assessment table I can use a group/category of assets such as laptops in the asset name section, and identify the threats and vulnerabilities for that category correct? In the inventory of assets do I need to list each asset of the category then?
Example:
Category: laptops
Asset name: [name]-laptop
Or can I keep this section high level as well as example:
Category: ICT and Other equipment
Asset name: Laptops
Answer:
Yes, you can have an asset named laptops in your inventory of assets, and after in the Risk Assessment Table you need to identify threats/vulnerabilities related to it (related to all laptops that have the same threats/vulnerabilities). So, you can have this:
Category: ICT
Asset name: Laptops
Both companies (BSI and PECB) are very good, therefore any of the 2 may be a well choice for the course of Lead implementer. Anyway, we have have free resources that you can use for gain good knowledge about the ISO 27001, you can find them here: https://advisera.com/27001academy/free-downloads/
We have created our ISO 27001 Documentation Toolkit for smaller and mid-sized companies - this is why we have optimized both the number of documents and their size - in our opinion if you had more documents this would create an overkill for smaller companies. Of course, our toolkit has all the mandatory documents required for the certification.
Competences in ISO 27001:2013
Documenting the competences does not differ in 2013 and 2005 revisions of ISO 27001 - if you go for any trainings, you need to have some kind of a record (e.g. the certificate). On the other hand, you do not need any formal qualifications to manage the ISMS - if everything works well, this is a proof of your competence.