In the risk assessment table I can use a group/category of assets such as laptops in the asset name section, and identify the threats and vulnerabilities for that category correct? In the inventory of assets do I need to list each asset of the category then?
Example:
Category: laptops
Asset name: [name]-laptop
Or can I keep this section high level as well as example:
Category: ICT and Other equipment
Asset name: Laptops
Answer:
Yes, you can have an asset named laptops in your inventory of assets, and after in the Risk Assessment Table you need to identify threats/vulnerabilities related to it (related to all laptops that have the same threats/vulnerabilities). So, you can have this:
Category: ICT
Asset name: Laptops
Both companies (BSI and PECB) are very good, therefore any of the 2 may be a well choice for the course of Lead implementer. Anyway, we have have free resources that you can use for gain good knowledge about the ISO 27001, you can find them here: https://advisera.com/27001academy/free-downloads/
We have created our ISO 27001 Documentation Toolkit for smaller and mid-sized companies - this is why we have optimized both the number of documents and their size - in our opinion if you had more documents this would create an overkill for smaller companies. Of course, our toolkit has all the mandatory documents required for the certification.
Competences in ISO 27001:2013
Documenting the competences does not differ in 2013 and 2005 revisions of ISO 27001 - if you go for any trainings, you need to have some kind of a record (e.g. the certificate). On the other hand, you do not need any formal qualifications to manage the ISMS - if everything works well, this is a proof of your competence.
Sure, if you have purchased our Premium toolkit you can send us until 5 documents and we will review them
Laws, regulations and ISO 27001 / PCI-DSS
Thank you for replay. Currently we are in process of certification for security standard PCI-DSS for bank card environment.
For other bank organizational units we would like to update regulations to cover requirements of ISO 27001 standard. For this topic I am looking for additional information.
In addition we are using SIEM system (***). Regarding update internal regulation about this we need more information about best practice in this area. Could you help us with more information in this area? We need more information about draft standard ISO 27044 and best practice in this area.
Answer:
If you want to implement the ISO 27001 standard in your organization, you can use our templates, which have all necessary documentation. You can see here a free version of each document clicking on Free Demo tab: https://advisera.com/27001academy/iso-27001-documentation-toolkit/. Regarding regulations, here you can find a list of international laws and regulations related to the information security and business continuity: https://www.infosec pedia.info/laws-regulations-information-security-business-continuity. Also can be interesting for you to know that you can integrate ISO 27001 and PCI-DSS, here you can find more information about this PCI-DSS vs. ISO 27001 Part 1 Similarities and Differences : https://advisera.com/27001academy/knowledgebase/pci-dss/ and PCI-DSS vs. ISO 27001 Part 2 Implementation and Certification : https://advisera.com/27001academy/knowledgebase/pci-dss/
Unfortunately, we have currently no materials on SIEM/ISO 27044 - when we publish any such materials we will certainly let you know.
Information security and BCM/BCP strategies
Yes, our toolkit ISO 27001 Documentation Toolkit is related to information security, but our toolkit ISO 22301 / BS 25999 is related to Business Continuity. Also we have an integration of both ISO 27001 & ISO 22301 Premium Documentation Toolkit, you can download it here (you can see a free version of each document if you click on Free Demo tab): https://advisera.com/27001academy/iso-27001-22301-premium-documentation-toolkit/ (please see the section Business Continuity Strategy if you need specific information about BCM/BCP strategies)
Security risks dealing with suppliers
Presently, our risk assessment is assessing risks that refer to assets vs. CIA.
Other risks that are brought to our attention are those from security incidents /breaches etc, so this is the easy part.
Answer:
If you outsource part of your processes or allow a third party to access your information, you should assess the risks to confidentiality, integrity and availability of your information. For example, during the risk assessment you may realize that some of your information might be exposed to the public and create huge damage, or that some information may be permanently lost. Based on the results of risk assessment, you can decide whether the next steps in this process are necessary or not for example, you may not need to perform a background check or insert security clauses for your cafeteria supplier, but you probably w ill need to do it for your software developer. For more information about it, you can read this article 6-step process for handling supplier : https://advisera.com/27001academy/blog/2014/06/30/6-step-process-for-handling-supplier-security-according-to-iso-27001/
Policy for mobile device/teleworking, NDAs and metrics
1) Can I make one policy for Mobile Device and Tele-working since both are almost similar. Is that accepted ?
2) Isn't confidentiality statement equal to NDA which every employee signs ( our company ensures that every employee signs the NDA which has confidentiality requirements too). Isn't this sufficient ?
3) Similarly with Statement of Acceptance of ISMS. Our company's NDA covers all these aspects and is signed by everyone in the Organization.
4)Request some help on ISMS Metrics. How to align ISMS Objectives to Business Strategy ?