Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
For more detailed documentation for change management, I suggest you take a look at the templates in this toolkit that are compliant with ISO 20000 (the ISO standard for the management of IT services): https://advisera.com/20000academy/itsm-change-management-toolkit/
They can be used in an ISMS, but they are not mandatory for ISO 27001 compliance.
You need to go through all controls listed in Annex A and explain why we have (or haven't) decided to implement them.
Please note that according to ISO 27001, the following information must be included in the SOA:
You can also add information you consider relevant to help manage the ISMS (e.g., a brief description of how the control is implemented).
For further information, see:
1: How do I as an individual convince companies to take up my services as an ISMS expert individual contractor
Basically, you need to demonstrate to them how you can add value to their business:
For more information, see:
2: if I'm ISMS expert working on my own how do I convince companies to take me on as an Independent contractor
The same answer from the previous answer applies to this question also.
In case you want to implement additional controls to treat risk, then you need to duplicate the risk line so you can assign a new control. You need to do that for each additional control you want to use to treat the same risk.
By the way, included in your toolkit you have access to a video tutorial that can guide you on how to perform the Risk Treatment.
For further information, see:
You can define the scope in terms of only part of the organization (i.e., IT department), but in general, for small and mid-sized businesses, the best approach is to include the entire organization in the ISMS scope, because the effort to separate the scope for such organizations may not be worthy.
These articles will provide you with further explanation about the scope definition:
These materials will also help you regarding the scope definition:
Regarding implementation time, it may take a couple of months for smaller companies and up to more than a year for larger organizations. You can use these values as an initial reference:
For further information, see:
It is possible to make the transition from an initial ISO 27001:2013 implementation project to the 2022 version of the standard to be certified against ISO 27001:2022.
For that you will need to:
For further information, see:
This material can help you:
1. The analysis of technical vulnerabilities of information assets can be done by the own organization or should they contract with an external provider specialized in security?
ISO 27001 does not prescribe who should perform the assessment of technical vulnerabilities, so organizations are free to choose the approach that best fits their needs.
2. The company has bought an appliance for the analysis of technical vulnerabilities of digital assets, the device will be managed by the systems area staff, and could this generate a non-compliance in the event of a third-party audit?
Provided that the staff managing the technical vulnerabilities’ appliance devices do not own the digital assets being assessed, there will be no problem regarding compliance with ISO 27001.
For example, systems’ owners cannot run the technical vulnerabilities' appliance over the systems they manage.
This is so to provide assurance of independent evaluation.
3. What are the recommendations for the management of vulnerability analysis and tests of intrusion to digital assets?
The main recommendations for vulnerability management take into account:
Regarding penetration tests, they should be performed considering at least these phases:
For further information, see:
1. What is the data label? what assets does the data label apply to?
What are the best practices for data labeling?
Can you give me examples of data labeling?
A data label is any mean you can use to attribute information to an information asset. In the context of ISO 27001, a data label is generally applied to show the information classification.
The assets to which the data label applies to will depend on how you treat classified information. For example, all information classified as secret may require assets that contain them to be labeled.
ISO 27001 does not prescribe practices for data labeling, but some examples you may consider are:
For further information, see:
2. What is the relationship between the classification of assets and/or identifying the level of importance of the asset with the risk analysis? Finally, what is the asset classification for me?
The risk analysis, along with the identification of legal requirements (e.g., laws, regulations, and contracts), is the main source of information for asset classification. The higher the risks related to an asset, the higher would be the asset classification.
The asset classification will help you to know how to treat information. Normally, the higher the classification, the more controls you will need to implement to protect the information.
3. The level of importance of assets calculated in the assessment of assets based on the analysis of confidentiality, integrity and availability of the assets is what is used to estimate the impact on the business if it materializes a risk?
Please note that the thinking process is the other way around. The impact of materialized risks over confidentiality, integrity, and availability of information is that will be used to estimate the classification level of an asset.
4. What are the information security processes that must be documented?
ISO 27001 does not require information security processes related to information classification to be documented, but in general, organizations document an Information Security Policy as a way to make the rules on how to classify, label, and treat information, clear to all personnel that handles information that needs to be protected.
5. How can you monitor information security risks, and the risk treatment plan?
Monitoring of risks will depend on their nature, so here are some examples:
Regarding the Risk Treatment Plan, since it defines resources and deadlines for each action, you can use this information to track the implementation progress.
For further information, see:
6. Which templates can I use to monitor the risks and the risk treatment plan?
To monitor risks you can use the Risk Assessment Table, located in folder 05 Risk Assessment and Risk Treatment. In this table, you can include new risks or update the status of currently recorded risks.
To monitor the actions related to Risk Treatment Plan you can use the Risk Treatment Plan itself. Like in the Risk Assessment Table, you can include new actions or update the status of current actions to implement risk treatments.
7. When I receive the toolkit update with the new version of iso 27001:2022
All customers which bought their toolkits within 12 months from October 31st, 2022 are entitled to receive an updated toolkit. If this is your case you will receive your updated toolkit as soon as the Spanish version is released.
I understand that but exception management and vulnerability management are the basic controls which we need to have a policy created.
Please help me with this.
Are you asking if it is acceptable to keep the laboratory QMS based on ISO 17025, Option A, in other words as if there was no ISO 9001 certification, even if at the same time the organization is applying for ISO 9001?
The answer is for accreditation purposes there is no problem, you do not have to integrate the laboratory QMS into the ISO 9001 certification. This would be in order, even from an operational perspective, if the approach to management requirements is consistent. Otherwise, it will create confusion and gaps in the systems. For example, it would not make sense if the way you address nonconformances and risks in the laboratory as part of ISO 17025 compliance, is different from how it is done for ISO 9001 QMS. My recommendation would be to keep the laboratory registers separate, but the organisations' activities just falling under ISO 9001, (for example finance) should follow a process adapted from the laboratory processes and templates.
Lastly, if the laboratory is seeking accreditation to ISO 17025, there is no need to include the laboratory in the ISO 9001 certification scope as the laboratory is considered to operate in accordance with ISO 9001 principles. Refer to Annex B of the ISO 70125 standard.