Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Incident Management

    While ISO 27001 only defines one objective for information security incident management, and seven controls that can be applied, it does not specify processes or activities to be performed. ISO 27035 defines detailed phases to be considered:

    • Plan and prepare
    • Detection and reporting
    • Assessment and decision
    • Responses
    • Lessons learned.

    The incident management procedure template included in the Iso 27001 toolkit presents a simple way to cover these phases in a general level to fulfill Iso 27001 requirements (where details related to the specific organizational context are needed, they are identified by comments in the template).

    In this link, you can find more information about this standard: https://www.iso.org/obp/ui/#iso:std:iso-iec:27035:-1:ed-1:v1:en

  • Risk owner problem

    Thank you!

  • ISO 22301 toolkit - audit procedure

    Please note that ISO 22301 does not require clause 6.1 (Actions to address risks and opportunities) to be documented. Since they are related to the implementation of the BCMS, such actions are considered in the project plan, located in folder 01 Preparation for the Project.

    Items related to clause 6.2 of ISO 22301 are covered in the template “Preparation Plan for Business Continuity”, located in folder 06 Business Continuity Strategy.

  • 10.3 Appendix 3 Internal Audit Checklist

    In case you are implementing only ISO 27001, you can exclude the references to ISO 22301 from your internal audit checklist. A certification auditor will not look for compliance against ISO 22301 if it is not part of the certification scope.

    The checklist for ISO 27001 contains all necessary information to cover requirements related to cover continuity of information security in questions related to controls from section A.17.

    This article will provide you a further explanation about building a checklist:

    For further information, see:

  • Key management template

    Please note that control A.10.1.2 is covered in the template Policy on the Use of Encryption, located in folder 08 Annex A Security Controls >> A.10Cryptography

    Included in your toolkit there is a List of documents file which will show which controls and clauses of the standards are covered by each template

    This article will provide you a further explanation about key management:

  • Vendor security clauses

    Please note that “relevant clauses”, and how they are written, will depend on the context of each organization (i.e., results of risk assessment and applicable legal requirements), so we do not recommend such an approach when developing your own agreements.

    In general terms, clauses to be considered would cover:

    • Right to audit
    • Notification about security breaches
    • Adherence to security practices
    • Response time to vulnerabilities
    • Demonstration of compliance
    • Management of supplier’s supply chain risks
    • Communication of changes
    • Maintenance of service levels

    For further information, see:

  • Question about BIA form

    Please note that included in your toolkit you have access to a video tutorial that can help you on how to fill out this document, using real-life examples of what you need to write.

    To access the tutorial, in your Inbox, find the email that you received at the moment of purchase - there, you will see a link that will enable you to access the video tutorial.

  • KPI requirements

    The key performance indicators are used to analyse if an the QMS objectives have been achieved, so if the sales department includes some quality objectives in its processes and is included in the QMS scope, then KPIs should be used to measure if the objectives were achieved.

    The following material will provide you more information:

    - How to define Key performance indicators for a QMS based ISO 9001: https://advisera.com/9001academy/24/define-key-performance-indicators-qms-based-iso-9001/-iso-9001/
    - How to Write Good Quality Objectives - https://advisera.com/9001academy/knowledgebase/how-to-write-good-quality-objectives/
    - Please check this free webinar on demand - The Process Approach - What it is, why it is important, and how to do it - https://advisera.com/9001academy/webinar/iso-9001-process-approach-free-webinar-on-demand/  - how to relate processes and objectives
    - Free online training ISO 9001:2015 Foundations Course – https://advisera.com/training/iso-9001-foundations-course/
    - Discover ISO 9001:2015 Through Practical Examples - https://advisera.com/books/discover-iso-9001-2015-through-practical-examples/

     

  • Define Locations if all staff are remote

    In terms of scope definition, you can state as location (company's headquarters) the home address of the founder / CEO of the company or the address of the office where the people accountable for the company can be found. You can define this address as the company's scope.

    Regarding the remote workers, normally you do not control the environment where they are, so these are kept out of the scope, and you treat remote access as a risk in your assessment.

    These articles will provide you a further explanation about defining scope:

Page 154-vs-13485 of 1127 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +