Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
The standard does not require a particular document that would mark an end of ISO 27001 implementation.
In the situation where you were not involved in the implementation, you could perform the internal audit (as defined in clause 9.2), and the results of this internal audit could be used to assess the level of compliance and readiness for the certification process. You can also show to your client the Statement of Applicability that displays which controls are already implemented - this is a good overview of how far the implementation has gone.
For further information, see:
Although it is possible to insert controls from the IT Security Policy into the Information Security, we do not recommend this approach. This is so because both policies have different purposes.
The Information security policy is a high-level policy that defines rules for the whole organization considering information security, while the IT Security Policy is an operational policy aimed at the security of the information regarding Information Technology.
For further information, see:
IT General Controls (ITGC) are controls that are common to IT processes, providing stable and effective operation of application controls. They cover fields like creation/acquisition of systems, SDLC Process, access control, backup, change control, etc.
SOX is a United States federal law, that sets requirements for improving the accuracy and reliability of financial disclosures of organizations trading on U.S. territory.
Considering that, an ISMS compliant with ISO 27001 can be one way to fulfill the requirements of SOX-ITGC.
However, being compliant with ISO 27001 would not enable you full compliance with SOX-ITGC, this could only be a part of your compliance effort.
For more information, please see:
I don’t have experience in the mining industry, but I can point to some articles that can help you:
The advantages of ISO 14001 for a company are based on the context, current performance, and interested parties' expectations.
Yes, you can combine roles inside your (ITSM) organization. This is not unusual, particularly for smaller organization.
Here are more details:
If a company is cloud-based, and it does not have its own network - in such a case a company should mark controls A.13.1.1 and A.13.1.2 as not applicable in the Statement of Applicability because there would be no risks nor third-party requirements that would require such controls to be implemented.
For the European market, all medical devices must be in compliance with Medical device regulation MDR 2017/745. In this document, all relevant information is what needs to be prepared to get the CE mark.
You can find the MDR in full text on the following link: https://advisera.com/13485academy/mdr/
Also, you can find a lot of supporting reading material in our ISO 13485Academy on the following link: https://advisera.com/13485academy/free-downloads/
Including physical security monitoring inside the Access Control Policy is an acceptable option to document this control, in case you consider this documentation relevant to your organization.
An alternative would be a document called Procedures for Working in Secure Areas.
To see how this document can include physical security monitoring, please access this demo: https://advisera.com/27001academy/documentation/procedures-for-working-in-secure-areas/
First is important to note that such classifications are defined only in ISO 27002, and they are not mandatory to be used to be compliant with ISO 27001.
Considering that, these classifications are known in ISO 27002 as control attributes, and they provide a standardized way to sort and filter controls against different views to address the needs of different groups.
The detective, corrective and preventive attributes belong to the “control type” attribute category. ISO 27002 provides other four categories that can be used instead of “control type” to sort controls:
For example, control 5.1 Policies for Information Security, in its attribute Control type is classified as preventive, while its Concept attribute is identify. As for control 7.4 Physical Security Monitoring in its attribute Control type is classified as preventive and detective, while its Concept attribute is protect and detect.
For further information, see: