You can create a procedure to ensure the control over the the creation, approval, distribution, usage and updates of documented information (documents and records ) used in your Quality Management System. Here is an example of a procedure, you can download a free preview of it - Procedure for Document and Record Control: https://advisera.com/9001academy/documentation/procedure-document-record-control/
Answer: First is important understand that for ISO 27001 a "need" is based on results of risk assessment. Considering that, you only have to physically separate your scope if there are unacceptable risks related to keeping a single environment.
2. Our staff always have meetings and they always need to sit and discuss and collaborate on certain tasks and projects that happen between different departments. Shutting down the entrances and closing all the doors between the departments and limiting access will hinder the workflow and coherence of the company. Is there another way about that? Or is the policy very clear and very strict in terms of physical isolation of the departments that are in the scope from the rest of the company? In case it was very strict and isolation measures need to be implemented, would magnetic see throug h doors with swipe cards to isolate the departments who are in scope from the external of scope be sufficient enough? I found this article on your website: https://advisera.com/27001academy/blog/2015/03/23/physical-security-in-iso-27001-how-to-protect-the-secure-areas/
Answer: The same previous answer applies here, you only need to limit access to the scope if there are unacceptable risks that must be treated. In case you indeed have to limit access, you can use the alternative you mentioned (i.e., swipe cards) if it does lead to unacceptable risks.
3. But I would greatly appreciate it if there are more detailed articles about physical security that you might be able to share with me, especially for organizations that are only certifying part of their services.
2- Market value and if I complete that, would I be certified straight away after passing the exam?
Answer: Yes, you get your certificate right after the exam.
3- Would my certificate have an expiry or renewal requirement?
Answer: No, they don't. I would recommend renewing certificate once the new revision is published.
4- Do I have to look for some specific organization with some specific accreditation to take that training?
Answer: No, no specific company.
5- If a company says they don't have A PMG accreditation, instead for ISO courses they've global recognition to accredit themselves – what would that mean?
Answer: That depends also on market you cover (local vs. global)Read the article to learn more “Qualifications for an ISO 27001 Internal Auditor” https://advisera.com/27001academy/blog/2015/03/30/qualifications-for-an-iso-27001-internal-auditor/
Performing audits
Answer: Certification audits are conducted according these stages:
- Documentation review: at this stage the auditor checks if all mandatory policies, procedures, plans and records are in place.
- Main audit: at this stage the auditor, by means of techniques such as observation, interviews and log review, checks if processes and personnel are performing according what is documented. It is at the end of this stage that any identified non compliance is raised.
- Surveillance visits: once you get certified, you have to keep the system working during the three-years certification period. To ensure that, an auditor will come periodically to check if the system is in place and ask for adjustments when needed.
2. What does one take into account when planning for the audit as an auditor?
Answer: The certification auditor has to develop the audit plan to making sure that all documents are compliant with the standard's requirements and that everyone is complying with all the implemented documents. The auditor can do that by means of developing a checklist to help him to ask for the necessary documents and records, as well as to which process to observe and people to interview.
The most important criteria you have to adopt for defining the ISMS scope are:
- which information you want to protect.
- by where this information flows, and where they are processed and stored.
- the effort to keep the environment you want to protect separated from the rest of the environment.
For example, for organizations up to 50 employees normally it is easier to define the wholly organization inside the ISMS scope. In your case, if the information is contained in specific departments, may be easier to define only these departments in the scope (if not then you should define the wholly organization inside the ISMS scope).
Regarding the remote workers, normally you do not control the environment where they are, so the se are kept out of the scope, and you treat remote access as a risk in your assessment.
Answer: The order of implementation will depend on your needs. If your priority is information protection, then you should go first for an ISMS. On the other hand, if your priority is to ensure processes and services delivery under disruptive conditions, then you should go first for a BCMS. It is important to note that if you use as basis for these systems the standards ISO 27001 (for information security) and ISO 22301(for business continuity), you can implement parts of these systems simultaneously, because the have many requirements in common.
2 . What is Step by step guidelines if I need to implement both?
Answer: In a general manner, you have these steps:
- Obtain management support
- Develop a project plan
- Define scope (related to each standard)
- Define top level policies (related to each standard)
- Define basic management system procedures (common to both standard)
- Develop specific policies and procedures (related to each standard)
- Implement policies and procedures and train personnel
- Perform internal audit
- Perform management review
- Proceed with corrective actions
ISO 27000 series do not have a standard providing description about the Document Management setup/workflow. ISO 27001 only defines what must be fulfilled (e.g., documents must be approved, be available to users, etc.). There are other ISO standards that can provide requirements you can use to setup and elaborate the workflow of a DMS (e.g., ISO 15489 Information and documentation – Records management)
If you want to see how a document management system looks like, I suggest you to take a look at our platform Conformio at this link: https://advisera.com/conformio/
Conformio has a set of functionalities for DMS that are fully compliant with ISO 27001, besides other features that can make easier to implement and manage an ISMS.
Answer: All our templates from our ISO 27001 Toolkits, including the templates for risk assessment and risk treatment, are fully compliant with requirements of ISO 27001.
At this link you can see all templates that cover the risks assessment and risk treatment process: https://advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/ :
- Risk Assessment and Risk Treatment Methodology
- Risk Assessment Table
- Risk Treatment Table
- Risk Assessment and Treatment Report
- Statement of Applicability
- Risk Treatment Plan
2. What precautions should be taken to avoid getting Non Conformity on this?
Answer: Key points to pay attention when performing risk assessment and risk treatment are to consider the proper inputs (e.g., legal requirements, scope and policy, etc.), so you do not leave any relevant area of your system uncovered, to cover all the assets in the ISMS scope during the risk assessment (if you decide to use the asset-based approach), and to ensure your risk evaluation and treatment options are aligned with your risk acceptance criteria.