Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
This role is not prescribed by the standard, so you can designate any existing role in your organization, or create a new one, to perform activities generally performed by the CISO/Information Security Manager.1 - Does ISO 27001 require the presence of a CISO or an Information Security Manager in the organizational chart?
For further information about the CISO, see:
Besides top management and internal auditor, ISO 27001 does not specify any other roles for information security, so you can include any specific role you consider relevant.2 - What are the roles that must appear in the organizational chart by ISO 27001 requirement and that we should include in the current *** organizational chart?
3 - Could all these roles be covered by *** current QARA Manager?
I’m assuming that by QARA you mean Quality Assurance & Regulatory Affairs.
Considering that, provided that the QARA manager has the competencies needed to perform the roles relevant to information security, this person can assume these roles.
4 - What do you recommend in this regard?
Roles and responsibilities generally designated to a CISO are very similar to those of a QMS manager:
Considering that these management activities can be designated to the QARA.
However, some security roles may require expertise in other areas that may require to be performed by other roles (e.g., network security, performed by an IT analyst).
I’m assuming you are referring to control CDL 9.5.1 - Segregation in virtual computing environments.
Regarding the “Risk assessment performed” you can show as evidence the last risk assessment and treatment report, showing to which risks related to “customer-developed/supplied software in the cloud environment” the control CDL 9.5.1 is used as treatment.
Regarding the “mitigating controls to address risks imposed by customer-developed/supplied software in the cloud environment”, examples of evidence of implementation of this control are:
Control A.11.2.4 - Equipment maintenance applies to all equipment in the ISMS scope.
Considering that, this control may be applied either to your laptops (where you will have to implement the control) or to the equipment provided to you by your supplier (e.g., WiFi router as part of the leased office where you work).
For further information about applying this control, see:
No, there is no such direct requirement according to ISO 13485 and MDSAP. Considering the Health Canada regulation, I really do not have information regarding that regulation.
I’m assuming that you did not complete the Risk Register / Statement of Applicability in Conformio.
Considering that, to complete the IT Security policy according to the ISO 27001 standard, you need to perform the Risk Assessment and Risk Treatment, using the Risk Register Module. After you complete the assessment, Conformio will automatically generate the SoA indicating which controls need to be applied to your IT Security policy.
Then you need to start the Wizard and answer the required questions (these are based on the results of risk assessment, i.e., the controls that need to be considered for the IT Security policy).
This way all the relevant controls will be covered in the IT Security Policy, and section 2 of the policy will refer to all controls that are included.
Flammability is a specification for the product. In the PPAP process, you will need to perform flammability tests while producing samples according to customer requests.
There is no expectation in the IATF standard as the number of tests.
After the product approval, if there is no special customer requirement, it may be necessary to look at the annual product inspections and layout inspections.
The ISMS scope should be determined considering the information you want to protect, not the relation between the entities of a holding company (this specific issue about entities involved in the certification needs to be aligned with your certification body).
Regarding policies, since the entities have different natures, it would be better to draft different policies, according to the specific risk profile of each entity, as well as other specific issues.
For further information, see:
According to the definition in Article 4 GDPR – Definitions, "personal data" means any information relating to an identified or identifiable natural person. The usernames, although some of them are emails and some of them are not, they do lead to the identification of natural persons. They are considered pseudonymized personal data. According to the definition in the same Article 4 GDPR, "pseudonymization" means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.
So storing this list of usernames is considered processing of personal data, also according to the definition in Article 4 GDPR, where ‘processing’ means any operation or set of operations which is performed on personal data or on sets of personal data.
Please also consult these links: