Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
Considering ISO 27001, please note that the activities users can perform remotely from home is based primarily on the management decision/business need, while the safeguards are determined according to the results of the risk assessment - the audit checklist must take all of these into account.
Normally you should consider at least these points for an audit checklist:
- who may telework (e.g., IT staff, sellers, managers on travel, etc.)
- which services are available for teleworkers (e.g., development environment, invoicing systems, etc.)
- which information can be accessed through telework (e.g., performance dashboards, list of customers, etc.); for more information, see: Information classification according to ISO 27001.
- which access controls shall be applied before access to information and resources is granted (e.g., password, two-factor authentication, use of VPN on communication channels, etc.); for more information, see: How to manage the security of network services according to ISO 27001 A.13.1.2.
- how devices and remote sites should be configured, protected, and used (e.g., devices with cryptography, no use of shared rooms to work, information backup, etc.)
These articles will provide you further explanation about developing this checklist:
- How to make an Internal Audit checklist for ISO 27001 / ISO 22301 https://advisera.com/27001academy/knowledgebase/how-to-make-an-internal-audit-checklist-for-iso-27001-iso-22301/
- How to apply information security controls in teleworking according to ISO 27001 https://advisera.com/27001academy/blog/2021/10/27/how-to-use-iso-27001-to-secure-data-when-working-remotely/
- What to include in an ISO 27001 remote access policy https://advisera.com/27001academy/blog/2019/04/23/iso-27001-remote-access-policy-how-to-develop-it/
Good environmental objectives stem from the environmental policy. A good environmental policy includes the three commitments from ISO 14001:2015 (Continual improvement, Prevention of pollution, Compliance with legal and other requirements) and sets priorities for environmental improvement.
What are the environmental improvement priorities? After the initial environmental survey is made, what are the most significant environmental aspects? In some organizations it may be the amount of hazardous waste they generate, in others it may be air emissions and its quality, in others it may be energy consumption.
For example, in the last EMS implementation project where I worked, the first version of the environmental policy had 4 vectors:
When the EMS reached certification, emissions and noise already complied with the legislation and the environmental policy was updated to focus on points 3 and 4
Goal- general orientation – Example – Improve air emissions
Objective – more detailed information – Example – Reduce organic volatile compounds in our painting department
Target - clear success criteria, how much, and when – Example - Reduce organic volatile compounds in our painting department by 20% in the next 12 months.
The following material will provide you information about environmental policy and objectives:
You can find more information about audits below:
Impartiality and confidentiality are two requirements that are vital for maintaining the trust and confidence that the users of tests and calibrations place in laboratories. In the context of an accredited internal company laboratory, companywide policies should be established and adopted, setting a course of action across the company to safeguard confidentiality and impartiality of the laboratory.
The extent to which impartiality and confidentiality need to be addressed will depend on your company structure. For example, if the company is small and there are shared incentives or resources between production and the quality assurance department or laboratory, either involving personnel or equipment; there is a threat to the impartiality of the laboratory. Identify possible confidentiality and impartiality issues as part of addressing risks and opportunities (another requirement of ISO 17025:2017); and using a Registry of Key Risk and Opportunities. Look at the organisational structure, processes and possible risks. For example, to minimise confidentiality risks, the laboratory should only reveal results and information to authorised personnel. To safeguard impartiality, identify possible commercial, financial, or other pressures from other departments, that may compromise activities and the quality of results. Consider internal issues, personal relationships, or other conflicts of interest. These risks must be addressed and resolved.
For more information, have a look at the advice answers
The ISO 17025 document template: Registry of Key Risks and Opportunities, is available for purchase -https://advisera.com/17025academy/documentation/registry-of-key-risks-and-opportunities/
https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/ does not address question 2
First of all, thanks for the feedback.
The issue about exiting controls is, in fact, missing in the step 2 risk assessment implementation. The proper text is:
"Once you know the rules, you can start finding out which potential problems could happen to you – you need to list all your assets, then threats and vulnerabilities related to those assets, as well as controls you already have implemented, assess the impact and likelihood for each combination of assets/threats/vulnerabilities, considering controls you already have in place, and finally, calculate the level of risk."
We will provide this adjustment ASAP.
With regards to ISO 27001, what is the correct sequence in evaluating risk vs current controls?
Please note that there is no sequence here.
Since current controls have a direct influence on impact and likelihood, the components of the risk, the risk, and current controls have to be assessed at the same time.
For example for the risk of data loss, if you already have a backup solution implemented, it does not make sense to evaluate the risk of data loss without considering the backup. This would result in an unrealistic risk and unnecessary work to evaluate the risk again, now considering the control. The proper approach is to consider the risk of data loss considering the effects of the backup solution.
1. Must first internal audit be executed before certificate audit?
Internal audit is a mandatory requirement of ISO 27001 (clause 9.2), so at least one audit cycle, covering all ISO 27001 requirements must be performed before going for a certification audit.
For further information, see:
This material can also help you:
2. If so, must it cover every area or is it ok to audit some areas after certification audit?
For certification purposes, the internal audit must cover the whole ISMS scope before the certification audit.
Please consider our free webinar on demand - Measurement, analysis, and improvement according to ISO 9001:2015 -
https://advisera.com/9001academy/webinar/measurement-analysis-and-improvement-according-to-iso-9001-2015-free-webinar/ There you can find the rationale for developing KPIs both for processes and quality objectives.
The following material will provide you information about indicators:
Objective is a result to be achieved, while an opportunity is a situation, or set of circumstances, that makes it possible to do something.
For example, decrease information security incidents by 10% in the next quarter is an objective. Using the internal newsletter to raise awareness about preventing security incidents is an example of opportunity.
This article will provide you further explanation about information security objectives:
Broadly speaking, you should consider the following trainings:
The point is, there is no definitive answer, so you have to consider training on the methodology to manage incidents and in the technologies and process you will have to recover in case of an incident.
This article will provide you further explanation about managing incidents:
The scope for the BCMS can be found in the Business Continuity Policy template, section 3.4, located on folder 08 Annex A >> A.17 Business Continuity >> 01 Business Continuity Policy.