>Just to mention the team is not part of the scope as reply to the answer .
Answer: In this case the auditor has no previous authorization to audit this provider. He must justify his intention and the organization can decide to authorize or not the audit at its own discretion, but his most probable action is to check how you are managing the relationship with this service provider, i.e., how you can assure that this service provider is fulfilling your security requirements.
Answer:
As with any management system standard the requirement to implement AS9100 Rev D comes down to your customer requirements. If your customer does not require that you implement AS9100, even if you are an aerospace company, then the choice is up to you if you implement this standard. I do not know of a percentage of businesses that this would apply to as you have suggested, but in reality, everything comes down to the requirements of the customer, and baring that the desire of the company to use this standard to their benefit.
For more information on the benefits of AS9100 Rev D, see this article: 7 Key benefits of AS9100 implementation, https://advisera.com/9100academy/knowledgebase/7-key-benefits-of-as9100-implementation/
Regarding specific roles and responsibilities for information security, they are defined through all documents used in the ISMS implementation.
Regarding the Risk Treatment Plan, the responsibilities are defined on column "Responsible person". By the information you provided, it seems you are referring to the Risk Treatment Table, which is a different document.
First of all, you have to perform a risk assessment to identify which risks related to BYOD practice you have to treat, and which legal requirements (e.g. clauses of contracts, laws or regulations) you have to fulfill. After that you have to identify proper controls to be implemented. In general, to secure BYOD practices you have to consider the following controls:
- A.6.2.1 Mobile device policy
- A.6.2.2 Teleworking
- A.13.2.1 Information transfer policies and procedures
- A.13.2.3 Electronic messaging
The definition of general roles and responsibilities for information security is made on the Information Security Policy template, which you can find at folder 04 Information Security Policy of your ISO 27001 Documentation Toolkit.
Regarding specific roles and responsibilities for information security, they are defined through all documents in the toolkit. If you note, every time an activity is defined, it is also required the definition of a “Job Title” or person to perform that activity.
You can but you may find yourself in a potential conflict of interest as you as a CISO are in charge of keeping data assets safe and while doing that you will need to take some measures that may be intrusive. On the other hand, as a DPO you will need to ensure that those measures are not infringing the rights and freedoms of the data subjects.
Acciones que surgen de la identificación de riesgos
Respuesta:
No existe ningún nombre específico para esas acciones, sino que se suelen denominar acciones para abordar los riesgos y las oportunidades.
Dentro de las acciones tomadas la organización puede decidir entre varias opciones:
- Evitar riesgos
- Asumir riesgos
- Eliminar la fuente de riesgo, cambiando por ejemplo procesos, materias primas, etc
- Cambiar la probabilidad de que ocurra el riesgo o las consecuencias del mismo
- Compartir el riesgo, por ejemplo con los proveedores
- Mantener el riesgo asumiéndolo ya que su eliminación o mitigación no compensa a la organización.
An organization must decide how to develop processes to make sure that operational control of its environmental aspects is achieved. Among these controls could be included:
- building processes to get consistent outcomes
- analysing the life cycle of a product when putting controls in place
- using technology to ensure results
- ensuring employees are properly trained
- performing processes in a certain way
- monitoring and measuring of results
It is crucial that the organization also considers what parts of your operational control process are required to record as documented information. Controls can include engineering procedures and procedures.
You can create a procedure to ensure the control over the the creation, approval, distribution, usage and updates of documented information (documents and records ) used in your Quality Management System. Here is an example of a procedure, you can download a free preview of it - Procedure for Document and Record Control: https://advisera.com/9001academy/documentation/procedure-document-record-control/
Answer: First is important understand that for ISO 27001 a "need" is based on results of risk assessment. Considering that, you only have to physically separate your scope if there are unacceptable risks related to keeping a single environment.
2. Our staff always have meetings and they always need to sit and discuss and collaborate on certain tasks and projects that happen between different departments. Shutting down the entrances and closing all the doors between the departments and limiting access will hinder the workflow and coherence of the company. Is there another way about that? Or is the policy very clear and very strict in terms of physical isolation of the departments that are in the scope from the rest of the company? In case it was very strict and isolation measures need to be implemented, would magnetic see throug h doors with swipe cards to isolate the departments who are in scope from the external of scope be sufficient enough? I found this article on your website: https://advisera.com/27001academy/blog/2015/03/23/physical-security-in-iso-27001-how-to-protect-the-secure-areas/
Answer: The same previous answer applies here, you only need to limit access to the scope if there are unacceptable risks that must be treated. In case you indeed have to limit access, you can use the alternative you mentioned (i.e., swipe cards) if it does lead to unacceptable risks.
3. But I would greatly appreciate it if there are more detailed articles about physical security that you might be able to share with me, especially for organizations that are only certifying part of their services.