Thank you so much for your response it was really helpfull
Certification ISO 27001
Answer:
ISO 27000 and ISO 27002 aren't certifiable standards, they are support standards to implement ISO 27001, so you only need to fulfill requirements of ISO 27001 to certify an ISMS.
In fact you do not need 10 questions for top management regarding information security, because they do not need to have deep knowledge of information security to properly support it. These are the main questions you should consider asking them:
- Which benefits you understand information security management brings to your company?
- How information security objectives support business objectives?
- By which means do you support information security practices in your company?
Of course you can expand these questions to fulfill your needs (e.g., specific questions about communicating the information security policy and the realization of management review).
Included in your toolkit there is an "IT Security Policy" template, located on folder 08 Annex A ==A.8 Asset management, that define clear rules for the use of the information system and other information assets.
SWOT, context, interested parties and risks
Answer:
So, you want to link:
* internal context;
* external context;
* interested parties and their needs and expectations;
* SWOT analysis;
* risk analysis.
I would start by your SWOT analysis and made a “retro-engineering” exer cise:
Your Strengths and Weaknesses are internal issues with positive and negative connotations.
Your Opportunities and Threats are external issues with positive and negative connotations.
Not all those issues have the same weight or the same impact for your organization. Use the needs and expectations of interested parties to evaluate which issues are more relevant.
Then, pick those relevant positive issues (internal or external) and see if you can find relevant opportunities to evaluate and act upon.
Then, pick those relevant negative issues (internal or external) and see if you can find relevant risks to evaluate and act upon.
Answer:
Strictly speaking, clause 6.1.3, determination of legal requirements and other requirements, talks about having a process to determine what laws and other requirements apply to your OHSMS, how they apply, and what you need to do about them. This section does not necessarily link to the previous clauses about risks and opportunities. They are only together in clause 6.1, actions to address risks and opportunities, because the final sub-clause 6.1.4, planning action, applies to everything in the clause (hazards, risks, opportunities and legal requirements). Plans need to be made for all four of these things which have been determined.
That being said, it is possible that legal requirements could result in risks and opportunities. For instance, if you found out that a legal requirement was changing that would make a chemical that was critical to your operations impossible to use this could be a risk or opportunity for you r company. If the easy replacement chemical is more hazardous to use, this is a risk for your organization. Likewise, finding a less hazardous chemical to use would be an opportunity to improve your OH&S performance, and this opportunity may only have come around due to the change in legal requirements.
For a better understanding of all the ISO 45001:2018 requirements, see the whitepaper; Clause-by-clause explanation of ISO 45001:2018, https://info.advisera.com/45001academy/free-download/clause-by-clause-explanation-of-iso-45001
Scope of ISO 27001 and ISO 9001
Answer:
This article, How to define the ISMS scope - https://advisera.com/27001academy/knowledgebase/how-to-define-the-isms-scope/, starts with this: “The main purpose of setting the ISMS (information security management system) scope is to define which information you intend to protect. Therefore, it doesn’t matter whether this information is stored within your company offices, or somewhere in the cloud; it doesn’t matter whether this information is accessed from your local network, or through remote access. The point is that you will be responsible for protecting this information no matter where, how, and by whom this information is accessed.”
So, if you only intend to protect the information around the scope of your QMS (quality management system) you could use the same scope.
Answer:
ISO 20000, different than in ISO 27001, does not have defined (explicit) security controls, like Annex A in ISO 27001. However, There is Information Security Management process in ISO 20000 and that process requires that risk assessment has to be performed and controls should be determined, implemented and operated. But, it doesn't define any particular controls, yet it refers to ISO 27001 for further details.
Meaning, if you have ISO 27001 in place, you can use controls applied in scope of the implementation.
The date of the audit report can be after the final date of the audit process, but you should not take too long to deliver the report, because there is the risk the scenario changes and the results of the audit cannot be used to correct or improve the audited process (in your example the time difference is one month, and normally it should not take more than 5 days).
Answer:
In ISO 9001:2015 you can find mention to complaints in clauses 8.2.1 c); 9.1.2 (in a note) and 10.2.1. There is no reference to a mandatory procedure, but an organization with a quality management system:
must plan how to communicate with customers when handling complaints;
can include complaints as an input to the customer satisfaction assessment methodology; and
should evaluate the need for corrective action after receiving a complaint