Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Some questions about ISO 27001:2013


    The purpose is to define a person or entity with the accountability and authority to manage a risk (this a definition that you can find in the ISO 27000:2014). And to determine the risk owners you should aim for someone who is closely related to processes and operations where the risks have been identified. Please read this article for more information “Risk owners vs. Asset owners in ISO 27001:2013”: https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/

     

    Is a communication plan mandatory in the ISMS documentation ? (clause 7.4)

     

    Answer:

    No, it is not mandatory. You can find a list of mandatory documents here “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/

     

     The objectives mentioned in clause 6.2, does it refer to the objectives in the Statement Of Applicability (e.g. : in my company, we chose the whole Annex A for our SoA) 

     

    Answer:

    The objectives in ISO 27001 clause 6.2 can be set both for the whole ISMS, and/or for the control objectives in the Statement of Applicability - usually, the objectives are set at two levels: (1) the general ISMS level, and (2) at the level of security processes or security controls. See also this article: ISO 27001 control objectives – Why are they important? https://advisera.com/27001academy/blog/2012/04/10/iso-27001-control-objectives-why-are-they-important/
  • Asset category


    You can identify it as “Outsourced services”, because is a service that will be done by a external company. Please read this article for more information about this “How to handle Asset register (Asset inventory) according to ISO 27001”: https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
  • Risk related to our building


    After the Risk Assessment you need to perform the Risk Treatment, and basically for each risk you have 4 options: a.- Apply security controls, b.- Transfer the risk to another party, c.- Avoid the risk by stopping an activity that is too risky, d.- Accept the risk (when the cost for mitigating the risk is higher that the damage itself). In accordance with the situation that you are described, the bes t option for your business is “d”. In this case, I recommend you to talk with Top Management, because they have to know this situation and they need to accept formally the risks.
     
    Also I recommend you to read this article about the difference between the Risk Treatment Plan and the Risk Treatment process “Risk Treatment Plan and Risk Treatment Process – What’s the difference?” : https://advisera.com/27001academy/iso-27001-risk-assessment-treatment-management/#treatment
  • Internal and External Issues


    The important here is that you have to define roles and responsibilities of employees of the Organization that are involved in the scope of the ISMS (furthermore, as you know, business strategy and objectives, capabilities and resources, etc). 
     
    In the article that you have referenced (“Explanation of ISO 27001:2013 clause 4.1 (Understanding the Organization)” : https://advisera.com/27001academy/knowledgebase/how-to-define-context-of-the-organization-according-to-iso-27001/), there are information enough to comply with the clause 4.1 of the ISO 27001:2013. It is also important that you know that in the “Informati on Security Policy” you can define the responsibilities. You can see a free version of our template at this URL (please click on “Free Demo” tab): https://advisera.com/27001academy/documentation/information-security-policy/ And of course, if you need more information please ask us.

     
    In our templates, each policy and procedure defines roles and responsibilities, this is so because the ISO 27001 does not require you to have a centralized list of security roles and responsibilities. You can read more information about this here: https://community.advisera.com/topic/roles-and-responsibilities-2/
  • Third Party SLA for out-of-scope Systems

    Sorry for the delay! Here you have our answers:

    Each company should include in its ISMS scope only the assets they control directly – so overlapping of assets means that they didn't set the scope correctly; and sharing the asset list is not necessary if the ISMS scope document is written precisely enough. The certificate of the ISO 27001 is only for 1 organization, so your organization is responsible of the maintenance of his certificate (in terms of his scope). At this point I recommend you to read this article "How to define the ISMS scope”: https://advisera.com/27001academy/knowledgebase/how-to-define-the-isms-scope/
    It is necessary to study each situation, but generally in accordance with my last point, each auditor has to audit each ISMS (based on the scope of each one). So, in this scenario you can develop this SLA, but anyway there will be 2 different ISMS, with 2 different scope, and 2 different internal audit + 2 different certification audit.
     
    Please, if you need more information, give us more information about your situation (scope of your organization, scope of your customer, etc).
  • Risk Assessment Toolkit


    Our Risk Assessment toolkit identifies assets owner, so if you have applications (you can consider it as type of asset), you can have owners to those applications. Also our Risk Assessment toolkit identifies vulnerabilities and threats (and risk owners). Basically there are no questions in our documentation, but catalogs of assets, threats and vulnerabilities the asset owners can choose from. You can download our template “Risk Assessment and Risk Treatment Methodology” at this URL (you can see a free version if you click on “Free Demo” tab) : https://advisera.com/27001academy/documentation/Risk-Assessment-and-Risk-Treatment-Methodology/
  • Implementation Checklist


    The first thing is that you need all necessary documents (you can use all our templates). Second thing is to adapt all documentation to your organization and implement them. An example: You have our template for the Methodology Risk Assessment (to calculate risks), but what assets, vulnerabilities and threats do you have in your organization? So, you need to complete each document with the information of your business, and generate evidences.

    As you know you can download our templates from this URL: https://advisera.com/27001academy/iso-27001-documentation-toolkit/

    Also I recommend you to read this article where you can find basics steps to execute the implementation of the ISO 27001 in your Organization “ISO 27001 implementation checklist”: https://advisera.com/27001academy/knowledgebase/iso-27001-implementation-checklist/

    Ans also you can read this article about Annex A "Overview of ISO 27001:2013 Annex A": https://advisera.com/27001academy/iso-27001-controls/

    Finally, please ask us again if you have more question about the implementation of the standard in your organization.
  • Information Security Policy


    In the new ISO 27001:2013, clause 5.2 and A.5.1.1/A.5.1.2 controls are refer to the same thing: Information Security Policy. But, clause 5.2 describes the top-level Information security policy, while controls A.5.1.1 and A.5.1.2 speak about detailed security policies that cover certain areas of information security. Please, read this article for more information “One information Security Policy, or several policies”: https://advisera.com/27001academy/blog/2013/06/18/one-information-security-policy-or-several-policies/

     

    What is your recommendation to record that employees were aware of the policies and other ISMS documents? 

     

    Answer:

    There are several ways, but I recommend you to perform training sessions (inviting to all staff). In this sessions you can present the ISMS, requirements, documents, records, etc. For each session, you can have a physical document with signature of attendance of all people. After each session, also you can d evelop a small test to evaluate the awareness of each employee (their results is a evidence). If you need information on how to perform training and awareness for ISO 27001, please read this article “How to perform training & awareness for ISO 27001 and ISO 22301”: https://advisera.com/27001academy/blog/2014/05/19/how-to-perform-training-awareness-for-iso-27001-and-iso-22301/
  • Documented information


    Yes, it is correct. There are some documents that are mandatory for the ISO 27001 (an example is the Access Control Policy, by the clause A.9.1.1). If you want to know the list of mandatory documents and records (remember that they are different things), you can read this article (also you can see non mandatory documents) “List of mandatory documents required by ISO 27001 (2013 revision)”: https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
  • Interested Parties need clarification of this.  I'm looking for an example of a

    The main point here is that you have to identify all interested parties (this is a requisite in the ISO 27001 4.2 a)). So, you need to answer this question: Who are interested parties?

    You will find help about how identify interested parties at this article: "How to identify interested parties according to ISO 27001 and ISO 22301": https://advisera.com/27001academy/knowledgebase/how-to-identify-interested-parties-according-to-iso-27001-and-iso-22301//
Page 1083-vs-13485 of 1128 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +