Absolutely - ISO 22301 does not require you to have your own disaster recovery center. ISO 22301 requires you to prepare your activities to recover their operations if your primary location is destroyed, so if you can do that using third-party services within the RTO (Recovery Time Objective), they you do not need to invest in your own DRC.
As a consequence, more and more companies are using e.g. cloud services because they don't have to worry about physical infrastructure in case of a disaster.
objectives in the policy document
Information security objectives should be no different from the ISMS objectives, however you could have different interpretation of these terms:
1) "information security objectives" could be interpreted as a generic term for any kind of objectives related to information security, whereas
2) "ISMS objectives" could be interpreted as top-level information security objectives for your overall ISMS - usually, these are the ones set in the top-level Information Security Policy
This means you could also have lower-level information security objectives for your processes, controls, departments, etc.
Thanks for your comment, dmikulsk - I understand your point that BCM manual can be a useful document to describe the business continuity process; however, wouldn't the ISO 22301 standard itself be a better document for that purpose?
How to document the external and internal context of the organisation
Debasish,
In my opinion, it is not necessary to write a separate document for the context of the organization (clause 4.1 in ISO 27001:2013) - you can cover it through these documents:
- Business plan (if you have one)
- ISMS Scope
- List of requirements from your interested parties
- Risk assessment report
By "arrangement" you could have a written or oral agreement, or something similar.
Change the top-level policy
Our white paper "Twelve-step transition process from ISO 27001:2005 to 2013 revision" suggests you can change the title of the policy if you wish, but this is not necessary; also if you wish you can also delete some items from the policy because they are not needed any more. However, if your ISMS Policy is compliant with ISO 27001:2005, you can leave it as it is and it will be compliant with ISO 27001:2013 as well.
How does an organization become able to audit / certify against 27001?
An organization can start issuing ISO certificates if it becomes accredited, i.e. if it gets the license for doing such a job. The accreditations are issued by a local government body in each country - e.g. in UK this is the UKAS, whereas in the United States this is ANAB.
Incident management procedure-A.16.1.5 is new control?
I basically agree with you there is no big difference between incident management controls in ISO 27001:2005 and ISO 27001:2013; the only difference is that control A.16.1.5 of 2013 revision requires incident procedures to be documented, while controls in 2005 revision did not have such requirement.
step2
I assume you refer to our free download "Twelve-step transition process from ISO 27001:2005 to 2013 revision"?
An interface is something that stands between your ISMS and the outside world - for example, if room A is within the scope, and room B is out of the scope, then the door between those two rooms is an interface; if you have two segments on your local network, the network device that is in between them is an interface. Therefore, your ISMS scope has various interfaces as borders to the outside world.