Merging internal audit and information security officer function
As a part of ISMF, I have thought of following representatives :-
1. IT - infrastructure, application and operations
2. Business
3. HR
4. Compliance
5. Admin
6. Internal Control or Audit
I assume that by "ISMF" you mean a coordination body for your information security - in this case, yes - I think you have chosen a good balance of people; only I think Internal audit should not be a part of it - again because of conflict of interest.
Design compliance plan for internal use
Kumar, it is neither option 1 nor 2.
You should start with assessing the risks, because the whole idea of ISO 27001 is centered on risk assessment - once you perform the risk assessment you will know exactly which kind of information security standards/policies/procedures you will need to implement. See this article for details: The basic logic of ISO 27001: How does information security work? https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
Confidentiality, integrity and availability in the risk assessment
Reading the standard it says; 6.1.2 c) Apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system
Should I actually record the CIA or just consider each and decide on a consequence/likelihood rating?
Answer: Neither 2005 nor 2013 revision of ISO 27001 require you to assess confidentiality, integrity or availability as a separate valuation, nor do they require you to assess C, I and A separately from the impact, nor do they require you to explicitly identify the relationship between the risk and the C, I, or A. ISO 27001 simply requires you to identify the risk.
Actually, when you look closely, loss of confidentiality, integrity and availability is nothing else but asse ssing the impact. Therefore, you can (a) assess the impact taking into consideration the highest loss from either C, I or A, or (b) you can assess the impact separately for C, for I, and for A.
ISO 22301 certification
There is a difference between accreditation bodies and certification bodies: certification bodies issue certificates to companies, while accreditation bodies are government agencies which give approvals (accreditations) to certification bodies.
Therefore, UKAS provides accreditations not only for ISO 9001 but also for ISO 22301 and other standards. You should check https://www.ukas.com to see which certification bodies have they accredited.
ISMS manual is not a required document; however ISO 27001:2013 clause 6.1.3 d) requires you to identify the status of each control in your Statement of Applicability.
ISO 27001:2013 does not require you to comply with ISO 31000, nor with ISO 27005 when performing your risk assessment - basically, you have to create your own risk assessment methodology (compliant with ISO 27001) that suits your company.
Although this distinction is not yet clearly established, I would say that cybersecurity deals only with digital information, while information security deals also with information in other media (e.g. paper).
You can implement ISO 22301 without ISO 27001 rather easily - although these two standards are highly compatible, they can be implemented separately without bigger problems.