Answer:
The risk is about what can deviate your organization from expected results or what can promote the occurrence of undesired results.
Your company implemented actions to handle risks and opportunities (risks are negative deviations and opportunities are positive deviations) if you were able to meet the desired results and or avoid the undesired results your actions were effective.
2. What are the examples of continual improvement that can be implemented in my company 10.3
Answer:
Continual improvement is finding ways to make the quality management system more suitable, adequate, and effective in a planned and incremental way. Where you want to make your quality management system better, define a target for improving that process, and then make a plan and assign resources to make this improvement happen. For example, maybe your company want to improve the product development process; or to improve product or service specifications, or to improve new employee integration.
Answer:
Authority is about the power of decision, the power of command. Responsibility is about obligation. For example, an operator may have the responsibility to perform quality control and identify the nonconforming product (he or she has the obligation to do it, he or she is expected to do it), and may not have the authority to decide what to do with the identified nonconforming product.
>1 - We use the Microsoft Azure Public cloud heavily to provide Web Services to clients. One of my executives is asking if we can just include this platform in the scope and have the IT department that ‘interfaces’ with it as an ‘interested party’, therefore reducing the amount of work involved. Only the IT Department interfaces with this platform.
In summary, are we able to only include a ‘platform’ or does the scope have to include an organisational unit.
Answer: You can include cloud environments in your ISMS scope without problems, and the extension you have to include them in your ISMS scope will depend of the type of service you have:
- If you have an Infrastructure as a Service (IaaS) agreement, then software and data should be in the ISMS scope, while physical location and hardware are completely out.
- If you have an Platform as a Service (PaaS) agreement, then data and all application software should be included in the ISMS scope, while everything else is out, including all system software.
- If you have an Software as a Service (SaaS) agreement, then only th e data should be in the ISMS scope.
Regarding who will interface with the cloud provider, you can define the IT department without problem also.
>2 - Also, once I have ironed out the requirements of the scope for the meeting, how do I go about recording it efficiently? Am I best using a spreadsheet of some kind?
This document can help clearly define the boundaries of the ISMS fulfilling the requirements of ISO 27001 standard.
Application of BCP on ISO 27001
Answer:
Any control from ISO 27001 Annex must be applied only if one of the following occurs:
- There are risks identified as unacceptable in the risk assessment that require the implementation of the control
- There are legal requirements (e.g., contracts, laws, and regulations) that require the implementation of the control
- There is a top management decision requiring the implementation of the control
If none of these occur there is no need to implement any control considering ISO 27001 requirements, including BCPs.
So, considering your scenario, besides risks and contracts you should also verify if there are no laws and regulations applicable to your business requiring the implementation of BCPs, and the explicit intention of top management not to implement BCPs for ISO 27001.
To obtain a certification your organization has to hire an accredited certification body to perform the certification audit. And although price is an important criteria, you should consider other aspects like reputation, experience, and flexibility.
To help you find a certification body near your location, I suggest you to use this link: https://advisera.com/
Yes, as long as those documents are documented information that support the operation of processes you will need to register them. ISO 9001:2015 in clause 7.5 requires an organization to “Maintain documented information to the extent necessary to support the operation of processes and retain documented information to the extent necessary to have confident that the processes are being carried out as planned.”
Basically you will need to document, no matter what format you decide to use, the following:
- Documenting critical portions of the quality management system (QMS) such as its scope, key operational processes, policies, and objectives.
Documenting important, but less critical information that supports the QMS such as process flowcharts, specific quality and operational procedures, schedules, information collection approaches (i.e. forms, surveys), business plans, etc.
I was wondering how up to date it is and the sources of the information? We were considering purchasing a legal register, but I am not convinced that we need to.
Answer:
Unfortunately, this list is not fully up-to-date because it depends on voluntary contributions from our readers - therefore, it is likely that not all regulations are listed. To make sure you have the latest list of laws and regulations, it would be best to hire a local legal adviser.
Risk assessment
1. Would you please help to guide me how to start to do risk management (from Risk Identified --Risk Treatment Plan)?
This toolkit enables you to implement information security and business continuity risk management compliant with ISO 27001 and ISO 22301, and provides access to video tutorials to help fill in the documents with real data examples.
3. Is it possible to treat or prevent to be zero risk appetite?
Answer: It is not possible to treat risks to achieve zero risk appetite, because the cost to treat all possible risks an organization is exposed to would be prohibitive.
4. If I follow standard COBIT 5 for risk management, I don’t need to do SOA right?
Answer: Your understanding is correct. The Statement of Applicability is not a requirement for COBIT 5, so you do not need to develop such document if you follow COBIT 5 risk management approach.
Template content
Control 6.1.1 Information security roles and responsibilities is covered by all templates in the toolkit. For each required action on a template always it is required the definition of who must perform it (the field [job title]).
Please be aware that ISO 27001 does not require you to document each and every control you declare as applicable, you can simply describe the implementation of such undocumented controls in the Statement of Applicability. In order to avoid overhead for small companies, we have decided to include in the toolkit only those documents that are mandatory + those that are most commonly used; in other words, you will not find in the toolkit the documents that are not mandatory and that are not used very often.