The implementation of ISO 27001 is quite similar regardless the industry and size (what differs is the quantity of resources and complexity of deliverables), and the general steps are:
1) getting management buy-in for the project;
2) defining ISMS basic framework (e.g., scope, objectives, organizational structure), by understanding organizational and requirements of interested parties;
3) development of risk assessment and treatment methodology;
4) perform risk assessment and define risk tent plan;
5) controls implementation (e.g., policies and procedures documentation, acquisitions, etc.);
6) people training and awareness;
7) controls operation;
8 performance monitoring and measurement;
9) perform internal audit;
10) perform management critical review; and
11) address nonconformities, corrective actions and opportunities for improvement.
This article will provide you further explanation about ISMS implementation:
- ISO 27 001 implementation checklist https://advisera.com/27001academy/knowledgebase/iso-27001-implementation-checklist/
Regarding implementation approaches, the most common are:
- Use your own staff to implement the ISMS
- Use a consultant to perform most of the effort to implement the ISMS
- Use a consultant only to support the staff on specific issues, leaving the organization's staff with most of the implementation effort.
Answer: The process is similar, in this case:
- Asset: Email service
- Threat: Disruption of service / inability to send and receive emails
- Vulnerability: No alternative provider
- Control: Open account with other email service provider(s) as a backup
- Asset: Email service
- Threat: Disruption of service / inability to access existing emails
- Vulnerability: The data is not backed up
- Control: Use local email client to archive all emails
Project Manager as internal auditor
Answer:
The project manager is involved in most of the activities related to the implementation of the ISO 27001, and since one requirement to be observed for an auditor is impartiality (an auditor cannot audit his own work), this person will not be able to perform the auditor role. The same applies to CISO, since he is responsible for reporting the ISM performance.
The best course of action would be to train an employee to perform internal auditor or hire an external auditor.
I don`t see a problem with this as long as there is no sensitive information disclosed about the student.
ISO 27001 and ISO 27002
Answer:
The main differences are:
- ISO 27001 is a certifiable standard that defines the requirements for an Information Security Management System (ISMS), as well as provide, on its Annex A, suggested security controls to be implemented, according to results of risk assessment or legal obligations.
- ISO 27002 is a non certifiable standard that provides details and guidance on the implementation of the controls from ISO 27001 Annex A.
- ISO 27002 is not mandatory to be certified against ISO 27001.
Answer
No, there are no mandatory processes in ISO 9001:2015. Each organization should design a model about how it works based on the process-approach.
- Training procedures.
- Procedures for customer satisfaction.
- Procedures for review by management.
I don't know whether I should distinguish between process and procedures. What would be ur answer if we substitute the word "Procedure" with "Process".
Answer
First – ISO 9001 has no mandatory requirement for any procedure – please consider the first link below.
Second – Attention! Process and procedure are two different things don’t use the words interchangeably. Please check the second link and the webinar on demand.
The FMEA handbook is both released and effective from June 2019. AIAG and VDA released a standard and common practice is that there will be a transition period. Your OEM will give you more detailed guidelines.
Question:
ISO 27001 and GDPR
Personal Data Protection Policy, Website Privacy Policy, Data Retention Policy, Data Retention Schedule, Data, Protection Officer Job Description, Cookie Policy, Inventory of Processing Activities, Data Subject Consent Form, Data Subject Consent Withdrawal Form, Parental Consent Form, Parental Consent Withdrawal Form, DPIA Register, Standard Contractual Clauses for the Transfer of Personal Data to Controllers, Standard Contractual Clauses for the, Transfer of Personal Data to Processors, Supplier Data Processing Agreement, Data Breach Response and, Notification Procedure, Data Breach Register, Data Breach Notification Form to the Supervisory Authority, Data, Breach Notification Form to Data Subjects, Data Subject Access Request Procedure, Data Subject Access Request Form, Data Subject Disclosure Form, Data Protection Impact Assessment Methodology, Cross Border Personal Data, Transfer Procedure, IT Security Policy, Access Control Policy, Security Procedures for IT Department, Bring Your Own, Device (BYOD) Policy, Mobile Device and Teleworking Policy, Clear Desk and Clear Screen Policy, Anonymization and Pseudonymization Policy, Policy on the Use of Encryption, Disaster Recovery Plan.
For example IT security policy complies with clauses ISO/IEC 27001 A.6.2.1, A.6.2.2, A.8.1.2, A.8.1.3, A.8.1.4, A.9.3.1, A.11.2.5, A.11.2.6, A.11.2.8, A.11.2.9, A.12.2.1, A.12.3.1, A.12.5.1, A.12.6.2, A.13.2.3, A.18.1.2 if they are marked as applicable on the ISO 27001 Statement of Applicability.
First it is important to note that ISO 27002 is a support standard to implement ISO 27001, and it is not certifiable, which makes difficult to track the organizations which have implemented it.
On the other hand, since ISO 27001 is a certifiable standard you can track which organizations have implemented it, but it requires some effort, because there is no central list of certified organizations (you must consult each certification body to track which companies are certified by them).
However, the ISO site provides an ISO survey where you can find general information about certifications, like total quantity, quantity per country, quantity industry, etc. It does not nominate organizations.