Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
To fulfill ISO 27001 requirements related to competence (clause 7.2), you need to identify which competencies are necessary for doing work that affects information security performance.
While the Security Awareness Training, GDPR e-learning, and training about policies and procedures most probably will fulfill part of the requirement, you need to check if more specific activities are required. For example, training on a specific technology used by your organization, or on a new process that needs to be implemented, like a disaster recovery process.
This article will provide you a further explanation about training and awareness:
If there are certified calibrators for the test method then you could provide the traceability that way.
I suggest you contact the national accreditation body or preferred accreditation body and discuss what programme your work would fall under. Then you will know if you need to address traceabilty as a calibration test (i.e calibration lab) or equipment performance test (i.e a testing lab). At the same time, the accreditation body will be able to provide an estimate of the costs to apply for accreditation.
Then regarding your implementation costs, they will depend on your scope of work and whether you use a consultant or a toolkit. For more information have a look at my response to a similar question regrding costs; at https://community.advisera.com/topic/iso-17025-accreditation-2/. There are number of links there to assist with further.
Firstly, note that procedure can be either documented or not whereas all work instructions are documented. A documented procedure could be a Standard operating procedure (SOP) or a Test Method. A SOP documents a higher level of information to standardise a full procedure. It covers who is responsible for what, what and how activities are carried out and a certain amount of operational detail, especially if there are no separate Work instructions as appendices / attachments. An example would be a SOP for a particular test. This type of SOP would typically include several steps and tasks, such as preparing the sample, calibrating the instrument, analysing the sample, and reporting the results.
A work instruction on the other hand is used to document the detailed steps of how to perform a particular task, for example how to perform a daily verification of a balance. That said, bear in mind that documentation could include any media. Thus, a work instruction could be written out as text, a diagram, audio file or video; or a combination thereof. SOPs are typically written out as text, with diagrams and tables included.
Have a look at the following material where you can obtain more information about documentation structure:
ISO 9001 – How to structure quality management system documentation - https://advisera.com/9001academy/knowledgebase/how-to-structure-quality-management-system-documentation
Thanks for the quick reply, much appreciated 😀
ISO 27001 does not require an asset management process to be implemented, only that an inventory of assets associated with the Information Security Management System (ISMS) is drawn up and maintained in case-control A.8.1.1 Inventory of assets is identified as applicable by the organization.
Considering that, Conformio enables you to draw up the list of assets during the risk assessment process by suggesting a checklist of potential assets you can find in your company.
For further information, see:
- The basic logic of ISO 27001: How does information security work? https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
- How to handle Asset register (Asset inventory) according to ISO 27001 https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/
- ISO 27001 risk assessment: How to match assets, threats and vulnerabilities https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/
For access management Conformio provides you with the Access Control Policy document through which you define rules on which people can access which systems and with whose authorization.
For further information, see:
- How to handle access control according to ISO 27001 https://advisera.com/27001academy/blog/2015/07/27/how-to-handle-access-control-according-to-iso-27001/
No, Iso 13485Internal audit checklist responds only to the requirements stated in the ISO 13485:2016. Missing elements from the ISO 9001:2015 are the ones considering context, interested parties, and business risks.
More information regarding the Internal audit checklist for ISO 9001 you can find on the following link:
How it is constructed in our ISO 9001:2015 Documentation toolkit you can find on the following link:
1. With just inquiry/Sample order (before products approval) how can we conduct Process audits /product audits /Internal audits?
All internal audits, according to IATF standard 7.2.3; should be done by competent auditors. The automotive process approach is essential in system audits. You may need to take internal auditor training for this. Production audits should be made for each shift and for each production process. In addition, it is necessary to be competent in the process of FMEA and control plan. You may need training in this. Product audits can be performed by employees who understand the technical drawing of the product and use measuring instruments.
2. How can we monitor KPI?
KPIs ''key process indicators'' on a monthly or quarterly basis, on a process basis; can be followed with excel tables.
3. How can we conduct MRM?
Every subject mentioned in IATF standard 9.3.2 and 9.3.2.1 should be reviewed with senior management and the team at least once a year. These meeting notes can be documented with either word or PowerPoint. It would be better if the decisions are documented with who, when, what to do, and the result format.
Yes, legally you have to treat this person as an employee of a third party, but even then you can require this third party that their employees follow the internal rules (policies and procedures) of your own company.
Considering your area of expertise in consultancy, certifying against ISO 27001 can bring you a competitive advantage since you will be able to demonstrate that you can properly protect the intellectual property and privacy of data your customers share with you.
Regarding ISO 22301, this implementation will provide your customers more confidence that your work won’t be significantly impacted by disruptive events, and that you will be more able to fulfill deadlines and service levels agreed with them.
For further information, see:
About evidence of the Communication Plan for Communications Related to the ISMS, please note that ISO 27001:2013 requires you to define a communication process, although there is no requirement that such a process must be documented.
Considering that, communication is an activity that is performed by many processes in information security according to ISO 27001, with different purposes. So to have a centralized communication procedure would overhead people responsible for communication with activities that may not be a part of their attributions. That’s the reason there isn’t a specific template for clause 7.4.
The main documents in the toolkit that define how communication needs to be done are:
About evidence of Documented Management Review Process, there is no requirement that such a process must be documented. The rules defining interval and purpose for performing the management review are defined in the Information Security Policy, section 4.4. This template is located in folder 4 General Policies.
About and Evidence of the Results of the Management Reviews, ISO 27001:2013 requires only the results of the management review to be documented, and for that, you can use the Management Review Minutes template, located in folder 11 Management Review.