Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Query Related to ISO 27001

    From your scenario, I’m understanding that your customer is a solution provider that does not own the operational infrastructure.

    Considering that, ISO 27001 certification is possible for this customer considering the protection of the information in the process it controls (i.e., sales marketing).

    Since the IT solutions provided are outsourced, these are out of the scope (these could be handled by means of contracts/services agreements signed with such providers).

    For further information, see:

  • ISO 27001:2013 Certification

    Please note that ISO 27001 provides a systematic way to implement Information Security management, and its sequence is a bit different from what you proposed:

    1. getting management buy-in for the project
    2. defining ISMS basic framework (e.g., scope, objectives, organizational structure), by understanding the organizational and the requirements of interested parties
    3. development of risk assessment and treatment methodology
    4. perform a risk assessment and define a risk treatment plan
    5. controls implementation (e.g., policies and procedures documentation, acquisitions, etc.)
    6. people training and awareness
    7. controls operation
    8. performance monitoring and measurement
    9. perform internal audit
    10. perform management critical review
    11. address nonconformities, corrective actions, and opportunities for improvement.

    In short:

    • part of the mandatory documents and records are created before risk assessment and treatment processes (e.g., scope, objectives, organizational structure), and the other part after it (e.g., policies and procedures documentation related to implemented controls, internal audit report, management review, etc.)
    • controls are implemented after the approval of the Statement of Applicability, not before

    This article will provide you with further explanation about ISO 27001 implementation:

  • A.8.11 Data Masking

    The implementation of data masking as a good practice or to fulfill a requirement will depend on the results of risk assessment (i.e., relevant risks), and the existence of applicable legal requirements (e.g., laws, regulations, or contracts).

    In case you have relevant risks or legal requirements demanding the implementation of data masking, implementing control A.8.1.1 control would be a requirement, otherwise, its implementation could be seen as a good practice.

    Regarding its balance with the business day to day operation, you should evaluate the positive impact of its implementation (e.g., reduction of costs due to information security incidents) against negative effects (e.g., reduction in processes performance or productivity), so you can evaluate the extension on ho implement the control.

    For example, for some processes, you may implement heavy masking practices and still have acceptable operational results, and for others, even the slighted practices won’t be worth it (and for these cases you may have to accept the risk, since applying the control will bring more problems than solving them).

    This article will provide you with further explanation about applying controls:

  • Sample document

    Thank you Rhand.

  • ISO 27001 - Enquiry

    1 - Can you confirm if during stage 1 of a certification process, does an organisation certified Lead Implementer or Auditors within the organisation before the organisation is certified and which clause demands this.

    I’m assuming you are asking if certified Lead Implementers or auditors need to be present in the organization as certification criteria.

    Considering that ISO 27001 does not prescribe the role of lead implementer so the presence of a lead implementer is not a requirement for certification. Regarding the auditor role, the standard defines it in clause 9.2, but only requires that the internal audit needs to be performed by a person with proper competency (clause 7.2 competence), so the presence of auditors is not a requirement for certification (the certification auditor will only check if audits were performed by auditors with proper competencies).

    For further information, see:

    2 - Secondly, can an organisation outsource the roles of ISO 27001 LA and LI and be successfully certified?

    I will be grateful to have your feedback.

    ISO 27001 does not prescribe that auditors and implementers need to be employees of the organization, so it is acceptable to outsource these roles.

    For further information, see:

    • How to prepare for an ISO 27001 internal audit https://advisera.com/27001academy/blog/2016/07/11/how-to-prepare-for-an-iso-27001-internal-audit/

    • Free ISO 27001:2013 to 2022 Conversion Tool – find out what has changed

      Please note that this tool does not provide deep insights or gap analysis on the changes brought by the 2022 revision of ISO 27001. It only shows how previous controls from the 2013 version are now mapped. For Example:  

      ISO 27001:2013 controls:

      • A.8.1.1 Inventory of assets, and

      • A.8.1.2 Ownership of assets

      ... have merged into ISO 27001:2022 control: 

      • A.5.9 Inventory of information and other associated assets

      This is an example right from the tool.

      For further information about new controls introduced by ISO 27001:2022, please read:

      • ISO 27001 2013 vs. 2022 revision – What has changed? https://advisera.com/27001academy/blog/2022/02/09/iso-27001-iso-27002/

      • External auditor for contamination for warehouse environment

        It is usually inspected for pests - rodents, flies, and cockroaches. Therefore, it is checked whether the traps are installed and whether they are inspected regularly. The external auditor looks at how the finished goods are arranged, whether the boxes are damaged, and whether the product itself may be damaged. And the third is to check whether the defined storage conditions are ensured - whether the temperature/humidity is measured, whether temperature mapping has been done in the case of a high-shelf warehouse, and whether the products are placed somewhere so that they are directly exposed to the sun.

        All these situations can lead to contamination of the finished product.

      • Question about requirement for Internal Auditor of IATF

        If you do not have additional customer special requirements, you should complete ISO 9001 and IATF 16949 standard training, internal auditor training, and core tools (APQP, PPAP, SPC, MSA, FMEA) training for internal auditors and supplier auditors.

      • ISO sign off on staff policy

        You can access these logs through the Responsibility Matrix, which you can access through the link in the left side panel of your screen.

        In the Responsibility Matrix screen, you can filter the logs by “One task” and search for activities titled “Please read the document…”

        For each line, you can identify, using the colored indicators, if the document was read or not.

      • Risk Management

        First of all, sorry for this confusion.

        The Risk Management tool kit can be used for both ISO 27001 and ISO 22301. In all templates, you can find comments instructing you, when applicable, on which changes should be made to the document in case you are applying it to ISO 22301.

        For further information, see:

Page 51-vs-13485 of 1128 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +