La norma no exige ningún tipo de formato, es más no respecto al Contexto de la organización no requiere conservar ningún registro o documento. Dicho esto, le aconsejo que al menos guarde un acta de reunión donde se lleve a cabo algún análisis para determinar el contexto de la organización , como el análisis DOFA (debilidades, oportunidades, fortalezas y amenazas). También puede desarrollar un procedimiento para definir de manera sistemática cómo se aborda el contexto de la organización, aquí puede ver un ejemplo - Procedimiento para determinar el contexto de la organización y partes interesadas: https://advisera.com/9001academy/es/documentation/procedimiento-para-determinar-el-contexto-de-la-organizacion-y-partes-interesadas/
CI program you have established can fulfill the first part of 10.3.1 clause because of performance indicators and their effectiveness, as Kaizen events and Just Do It initiatives, are typical Lean methods that lead to the increase of process effectiveness.
Also, consider Improvements in the manufacturing process to reduce process variation. This can be achieved by using Six Sigma as methodology as it is the methodology used for reducing variation in the process.
Although knowledge on PM and BA can make easier the ISO 27001 implementation, this knowledge is not mandatory, because there are at least three approaches for an ISMS implementation:
- Use your own staff to implement the ISMS (this is the case where knowledge on PM and BA is most needed)
- Use a consultant to perform most of the effort to implement the ISMS
- Use a consultant only to support the staff on specific issues, leaving the organization's staff with most of the implementation effort.
ISO 27001 does not prescribe a minimum amount of information security objectives, so each organization can define as many objectives as they see fit for their business. Normally 3 to 4 objectives allow an ISMS to support properly the business (e.g., one operational objective, one financial objective, one business objective, and one compliance objective).
Answer: This 2017 version refers to the British version of ISO 27001 (the BS EN ISO/IEC 27001:2017), which does not include any change that impacts requirements defined by the ISO 27001:2013, so the need for updating the toolkit is not necessary.
2. In particular, I miss, of course, Chapter 18 of Appendix 27002.
In addition I miss further documents, which are requested in the appendix of the ISO, as example fall to me ad hoc first:
· Contact with authorities
· Contact with special interest groups
I will continue to look at the package. Maybe then I have more questions.
Answer: First of all, sorry for this confusion.
The documents from section A.18 are not missing from the toolkit – you can find them here:
- A.18 – these documents are covered in the toolkit in folder "02 Procedure for identification of requirements”
Every control does not need to be documented, and to avoid unnecessary administrative work the toolkit includes only all the mandatory + all most common documents.
In the root folder of the toolkit you'll find a document called “List of Documents” that explains which control/clause is covered by which document, and which documents are mandatory.
In case your implementation requires the mentioned controls, or other controls not covered by the toolkit, you can contact us by email or schedule a meeting and we can provide the support to develop these documents
Objectives, risks and opportunities and the HR department
Answer:
1. What kind of outcomes does your organization’s top management expect from the HR department? This will most likely depend on your context. I can imagine things like:
No problems with compliance obligations;
Ability to find skilled candidates;
Contract people that will stay with the organization;
Contract a diversified set of persons;
Provide timely and effective training;
Promote the right people;
Getting a certain people turnover;
…
Now you can choose which topics are more relevant and translate them into objectives that could be used to monitor and evaluate HR department performance.
2. Risk is about possible conditions that can affect an organization’s ability to meet expected, desired results or that can promote undesirable results.
Picking the list of desired outcomes above what can happen that affect, positively or negatively each one?
Insufficient awareness of compliance obligations changes;
A strong economy is starving the number of skilled candidates;
A good reputation can help find skilled candidates;
Using the lowest price as criteria to contract trainers can affect training effectiveness rate;
…
(The IT mission of a company is managed (development, operations, support) by a third party, for which this operation means 90% of its business. The decision has been taken to acquire that company, which is certified ISO 27001. The main company has its own ISMS, but with different criteria, methodologies, procedures. It is necessary to "keep" the current certificate. What could be the alternatives to adopt / adjust / integrate the ISMS? Which may require less effort? Which could be less ris ky (lose the certificate)?)
Answer:
First it is important to note that if both, the main organization and the acquired organization are ISO 27001 certified, then in the first moment the best strategy is to keep both certificates (i.e., work with two separated scopes), not to affect your current operation during transition period.
Considering a second moment, the solution which requires the less effort regarding risk management is for you to identify how risks from one methodology can be translated to the other, so you can have comparable results. For example, if for methodology 1 the risks are valued from 1 to 3 and for methodology 2 they are valuated from 1 to 5, the risks identified by methodology 1 must be divided by 0.6 (3/5) to be compared to risks identified by methodology 2. For the reverse path the risks identified by methodology 2 must be multiplied by 0.6 (3/5) to be compared to risks identified by methodology 1.
This way you do not need to change anything on existent frameworks, but the trade-off is that you will have more administrative effort to keep managing two different risk methodologies. You can adopt this alternative until you define a single approach for all risks (i.e., methodology and criteria).
As for procedures, at a first moment you can keep all procedure and define a schedule to evaluate similar procedures and how to integrate them.
You also should consult with your certification body(s) about how to integrate the ISMS from the certification perspective.
Handling nonconformities
Answer: I'm assuming you are referring to control A.6.1.5 - Information security in project management.
First it is important to note that there are many similarities with implementing an ISMS in an organisation that you can use to drive the implementation of this control in a specific project:
1 – You have to define information security objectives and include them in the project objectives, the same way you define information security objectives for an ISMS aligned with organization's objectives, the only difference is that these objectives are restricted to the scope of the project
2 – You have to perform at the beginning, and periodically, information risk assessments in the project, like you would do it with other business processes, to identify necessary controls
3 – You have to ensure that information security practices are part of all phases of the project (e.g., from the issue of the project charter to project closing)
In short, you can think the inclusion of information security in project management as if you are going to implement a small ISMS that will fit the projects needs and will be proportional to the project's lifetime and budget.
Considering these, you would be using the same documents you use for an ISM applied to your organization (there is no need for documents specific for managing information security in a project) , and for any non conformity related to ISO 27001 you can use a document called Corrective Action Form, which describes the non-conformity, its cause, defines corrective / preventive actions and verification method of their implementation.
Answer:
Implementing ISO 45001:2018 follows a fairly simple path, common to all ISO management system implementations, where you identify the requirements that need to be put in place (including Iso 45001 as well as legal and other requirements), then you identify how you will satisfy these requirements for the organization. Using this information, you put in place the policies, processes and procedures needed to meet all requirements, use the processes to gather records, and monitor and improve the management system through internal audit, management review and corrective action. Finally, you will have auditors from a certification body come to verify that your processes meet the requirements of ISO 45001.
As for incorporating ISO 45001 into an IMS, this is certainly possible and often preferred. Both standards now follow the same document structure so it is easy to see what is common, such as internal audit, control of documented information and management review. In this way you can even use the same processes and procedures for these common elements and ensure that you cover both aspects of the processes.