Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Document and Record Control Procedure for ISO 9001 and ISO 27001


    You can use your existing Procedure for Document Control for both ISO 9001 and ISO 27001, because ISO 9001 has the same requirements as ISO 27001 when it comes to document control. See also: ISO 27001 implementation: How to make it easier using ISO 9001 https://advisera.com/27001academy/webinar/iso-27001-implementation-make-easier-using-iso-9001-free-webinar-demand/ - the fact that you have two different languages does not matter either.

    If you want to define the rules for information classification, you should do it in a separate policy - this is usually called Information Cl assification Policy - see also: Information classification according to ISO 27001 https://advisera.com/27001academy/blog/2014/05/12/information-classification-according-to-iso-27001/
  • Control A.6.1.5 project management in ISO 27001:2013


    Answer: The standard only says that you need to address information security in any type of the project - this means you have to make sure that the information is protected in all your projects. Usually, this can be done the following way:
    - include security objectives in overall project objectives
    - Include security specifications in your project description
    - perform a risk assessment specifically for the project you are to undertake
    - make sure security rules/technology are included in all the steps/tasks of the project
    - test if the project deliverables are compliant with security specifications
  • ISO 27001 certification scope - include only HQ or also the branches?


    This really depends on the size of the company - if your company is really small, than you should include all your locations; if this is a large international corporation, then you should include only one location.

    This article can also help you: Problems with defining the scope in ISO 27001 https://advisera.com/27001academy/blog/2010/06/29/problems-with-defining-the-scope-in-iso-27001/
  • Preparing Statement of Applicability


    ISO 27001 does not require a minimum or maximum controls to select, nor does it require to select controls from every section of Annex A. Further, you can select the controls that are not listed in Annex A - that you added on your own.

    When you look closely at the Annex A, you will realize two things: (1) it is really difficult to exclude most of the controls because they are common sense - for example, it would be difficult to exclude the control for backup (A.12.3.1) or the control for anti-virus protection (A.12.2.1), and (2) at least 50% of the controls you already did implement before you started your ISO 27001 implementation.

    In effect, most companies do not select less than 90 controls in the SoA. See also this article: Overview of ISO 27001:2013 Annex A https://advisera.com/27001academy/iso-27001-controls/
  • How much of Partial scope is permitted?

    You should identify the interested parties and the issues first, because interested parties may directly influence the scope itself - e.g. some of the government agencies may require you to implement ISMS in your whole company.

    See also this article: How to identify interested parties according to ISO 27001 and ISO 22301 https://advisera.com/27001academy/knowledgebase/how-to-identify-interested-parties-according-to-iso-27001-and-iso-22301//
  • Is the computerized machinery considered to be an asset


    Answer: Yes, I think that computerized machinery can be considered as assets if the corruption of the information they process could cause the machines to malfunction. When thinking about assets and risks, you should always think about what can compromise the confidentiality, integrity and availability of the information in those assets.

    Regarding the risk treatment of such computerized machinery, you have to see whether these computers are connected to a network, and if yes how are they protected from intrusion; also, the question is who has the access to those computers and how do you ensure these people are handling the information in a proper way.
  • Assets dependence

    Cesar,

    If you follow our Risk Assessment Table, then you need to identify all the assets, and then threats and vulnerabilities for each asset. This basically means that if you think an incident can impact several assets, then you should mention adequate threats and vulnerabilities for each of those assets.

    In other words, you don't have to show direct dependencies between assets because that would only complicate the risk assessment; the dependency will be implicit by identifying the same threats for a group of assets.
  • Using risks instead of threats


    Risk is different from threat: risk is "an uncertain event or condition that, if it occurs, has an effect on at least one objective", while threat is "potential cause of an unwanted incident, which may result in harm to a system or organization". So for instance, the threat is a computer virus, and the risk is the loss of all the information on your computer.

    It is true that ISO 27001:2013 does not require the identification of threats any more, but this is in my opinion still the best methodology - read more here: Risk owners vs. asset owners in ISO 27001:2013 https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
  • Security Compromised because of Cost to Company


    Skype and Dropbox is mainly to reduce the cost to company. Being a small sized IT firm the management is not in a position to buy licensed communication softwares. This may be one such instance but I feel we are compromising on security on many aspects.

    How should I handle this situation ? The management is planning to go for external ISO 27001 certification. How should my controls be supporting both security and cost aspect.

    Many companies use exactly the same tools, and yet they pass the ISO 27001 certification.

    The selection of controls must be based on the assessment of your risks, so basically you can use less costly controls if they cover the risks - see also this article: The basic logic of ISO 27001: How does information security work? https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/

    Skype is generally considered to be pretty secure for communication; Dropbox is probably fine if you upload less confidential documents while if you have highly confidential documents it would be probably better to use some other service which encrypts the files before sending them to the cloud. So the point is - you should select your controls based on the assessed risks.

    Of course, all the software you are using must be licensed.
  • SoA

    Cesar,

    You are free to decide whether the controls from Statement of Applicability will apply to your whole organization or only to the ISMS scope.

    However, in case you go for the ISO 27001 certification, then in SoA you should use only the controls that apply to your ISMS scope because otherwise you will have problems with the certification auditor.
Page 1102-vs-13485 of 1127 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +