Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Risk Assessment Methodology

    Antoin,

    Here are the answers:

    1) Yes, this is a classic approach to risk assessment methodology, completely acceptable by ISO 27001; additionally you need to identify the risk owners as well. See also this article: How to write ISO 27001 risk assessment methodology https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/

    2) ISO 27001 does not require you to separate assessments for impact on confidentiality, integrity and availability (in such case the highest value is your impact) - however you can separate them if you want your assessment to be more precise. Usually financial institutions are doing this more detailed approach to risk assessment.
  • Communication Plans

    What are necesarry for them?

    Answer :

    There are two sides at your question. One related to the ‘internal’ and one to the ‘external’ communication plans.

    The internal communication plan concerns how the top management disseminates its requirements and objectives through policies.

    -       clause 5.1.d requires that the organisation communicate on the importance of effective information security and on compliance to the requirements set in the policy

    -       clause 5.2.f. requires to communicate the policy within the organisation.

    Clause 7.4 (Communication) is the most explicit in answering your question as it insists on defining who, on what, to whom, when and how.

    Clause 7.4 also refers to external communication which is a control covered by ISO 27002 in clauses 16 and 17 dealing with ‘Management of information security incidents and improvements’ and ‘Information security aspects of business continuity management’ (controls A.16.x and A.17.x in ISO27001 Annex A).

    An external communica tion plan is a reactive control in case of incident to inform the targeted interested parties on the nature of the event and the measures you are taking to solve it in the shortest delay. This communication plan has to be prepared in advance to transmit a message of the organisation’s preparedness.

    So the internal and external communication plan should contain

    -       Who is responsible to organise and operate the communication plan,

    -       What is the object and the messages contained: policy, requirements, procedures, security awareness, incident warning, etc.

    -       Who will receive what message,

    -       When you will communicate and in which conditions

    -       How the communication should happen: type of communication (mails, screen saver, web page, flyers, etc.) and communication protocols.
  • ISO 27001 how to assign risk value


    1) ISO 27001:2005 does not require risk value to be assigned to asset risk - this standard requires impact to be one of the factors that determines the level of risk.

    2) ISO 27001:2013 does not require risk value to be assigned to owner of the asset risk - this standard also requires impact to be one of the factors that determines the level of risk.

    These articles will help you understand these issues:

    How to write ISO 27001 risk assessment methodology https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/
    Risk owners vs. asset owners in ISO 27001:2013 https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
    What has changed in risk assessment in ISO 27001:2013 https://advisera.com/27001academy/knowledgebase/what-has-changed-in-risk-assessment-in-iso-270012013/
  • Controls and Clauses Related to BYOD

    Hi Ravi

    All questions are good questions if they allow you to better understand.

    The first issue is that ISO 27001 is not the good place to look, as your question has no relation with the ISMS processes, but with the controls in Annex A. You need to go to ISO 27002 that explains how to implement these controls. In your situation, it is highly recommended to read ISO 27002.

    You could have a look at this blog post : ISO 27001 vs. ISO 27002 (https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/

    1)     There are, sadly, no controls on BYOD (understanding ‘personal electronic devices brought at work’) in ISO 27002. You can’t easily control it. The explanation in clause 6.2.1 (Mobile device policy) in ISO 27002 would help you further.

    2)     The only approach from ISO 27001 is risk management and defining the adequate policy. E.g.:

    No classified information will be transmitted to and from BYOD equipment.
    The use of BYOD to take pictures, audio and video recording must be authorised by the management.
    The company will install software on mobile devices enabling it to delete the company information remotely.

    3)     Risk management approach is described in ISO 27005. The main risks are: there comes ‘professional’ information on a non controlled device through received emails, photos, videos and audio recording. Then: who may access this information around the user and what if it’s lost or stolen?

    Finally, you’re right it’s not a mandatory control. This blog post gives the point : List of mandatory documents required by ISO 27001 (2013 revision) - https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
  • Control A.17.1.1 in ISO 27001

    disaster recovery." It's not clear to me if its enough with Polices and Procedures and BIA, or is needed something else (some kind of controls), Could please put some light in my doubts?

    Answer:

    ISO 27001 nor ISO 27002 are not very clear when it comes to business continuity. But yes - BCM policy, business impact analysis, but also identification of context and interested parties should be enough to identify all the requirements for business continuity.

    It seems to me you are referring to your question to ISO 27002, so you should primarily read what ISO 27001 says in its clause 4.

    See also these articles:

    Explanation of ISO 27001:2013 clause 4.1 (Understanding the organization) https://advisera.com/27001academy/knowledgebase/how-to-define-context-of-the-organization-according-to-iso-27001/
    How to identify interested parties according to ISO 27001 and ISO 22301 https://advisera.com/27001academy/knowledgebase/how-to-identify-interested-parties-according-to-iso-27001-and-iso-22301//
  • How to become ISO certified for myself


    The most popular ISO 27001 certificates are Lead Auditor and Lead Implementer - these articles will help you learn the details:
    - How to become ISO 27001 Lead Auditor https://advisera.com/27001academy/knowledgebase/how-to-become-iso-27001-lead-auditor/
    - Lead Auditor Course vs. Lead Implementer Course – Which one to go for?  https://advisera.com/27001academy/blog/2014/06/16/lead-auditor-course-vs-lead-implementer-course-which-one-to-go-for/
  • CISO role


    2. What is the “Document valid as of date” in all the template, is this the date the template get approved.

    Answers:

    1. ISO 27001 allows you to allocate the responsibility of security to anyone in the organisation as long as (1) he has enough authority, and (2) he has sufficient independence, and 3° he has a minimal of education in security.
    This post will probably help you further: What is the job of Chief Information Security Officer (CISO) in ISO 27001? https://advisera.com/27001academy/knowledgebase/what-is-the-job-of-chief-information-security-officer-ciso-in-iso-27001/

    2. The field ‘Valid as of date’ indicates the date from which the document and its content is applicable. It me be months after validation, for example when the organisation has to acquire and install technology or gain a specific competence.

    Best regards
  • security audit of a hypothetical supplier

    Hi Victor

    The audit should go on how the provider complies with the contract your company did pass with them. Controls A15.1.1 to A15.2.2 are pertinent for the security clauses when they are included in the SOA:
    A15.1.1 Information policy for supplier relationship;
    A15.1.2 Addressing security within supplier agreements;
    A15.1.3 Information and communication technology supply chain;
    A15.2.1 Monitoring and review supplier services;
    A15.2.2 managing changes to supplier services.

    Here is an article that is applicable to your situation: 6-step process for handling supplier security according to ISO 27001: https://advisera.com/27001academy/blog/2014/06/30/6-step-process-for-handling-supplier-security-according-to-iso-27001/

    Best regards

    Jean-Luc
  • To whom to handover confidential data in case of a disaster?


    As part of your business continuity plans, you have to define the deputies/substitutes for each and every person who perform certain important activity. Therefore, you have to define upfront who will be responsible to manage those important files in case the persons who are normally in charge for that would be unavailable.

    This article can also help you: Business continuity plan: How to structure it according to ISO 22301 https://advisera.com/27001academy/knowledgebase/business-continuity-plan-how-to-structure-it-according-to-iso-22301/
  • Mandatory processes


    There is a crucial difference between ISO 27001 and ISO 27002. The first one is a set of requirements for an information security management system. The second one a ‘code of practice’ with a list of controls to operate and manage information security and can be uses without relation with ISO 27001.

    SO 27001 requires an audit and a system of audits. This is a mandatory procedure to make sure the ISMS still complies with the documentation and, if certified, with the certificate.

    This is not the case for ISO 27002 where the controls are to be selected them through a risk management process. None is, initially a mandatory procedure.

    ISO 27002:2013 control 12.7.1  covers the risk that an audit would disturb the business process and the operation. So the intention is completely different to the requirement in ISO 27001 and there is no reason worry about.

    The following references may help you further:
    - ISO 27001 vs. ISO 27002 (103): https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/
    - MANDATORY DOCUMENTED PROCEDURES REQUIRED BY ISO 27001 (108): https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
    - How to maintain the ISMS after the certification (3): https://advisera.com/27001academy/blog/2014/07/14/how-to-maintain-the-isms-after-the-certification/
Page 1096-vs-13485 of 1128 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +