While ISO 22000 defines requirements for food safety management systems, ISO 22301 defines requirements for business continuity, so organizations can manage conditions to protect business from disruptive incidents when they arise, and ensure minimal continuity levels.
Considering your demands, you should look for training on ISO 22000. Unfortunately at this moment we do not provide such training.
To extend the ISMS scope you have to perform all the steps as if you were implementing the ISMS for the first time, in an scale equivalent to the size of this extension.
While you will have less effort related to common requirements such as document and record control, internal audit and management review, the effort for the risk assessment and treatment will depend on how similar this extension is to the current scope. If they are similar you may use existent controls and security metrics with only minor adjustments.
Included in your toolkit there is a List of Documents file that shows which controls from Annex A are covered by each template from your toolkit. This file is on the root folder of the zip file your received.
Processes periodicity
Answer:
Considering as example a software development company, as processes performed on a daily basis that we can mention are codification and testing activities. As for weekly based process you can think of the release of a new version on production environment.
ISO 27001 does not prescribe how many controls you must use to treat a risk, so you can use as many controls as you see is proper for your organizations (the applicable controls will have to be stated as such on the SoA. It is important to note that while applying multiple controls can significantly decrease a risk, it will also require more administrative effort, and these controls may also introduce new risks, so this approach should balance security with effort and new risks.
Answer: ISO 27001 does not require you to assess assets, but it does require you to assess likelihood and impact of a risk. When the impact of a risk is assessed, you have to take into account the effects of this risk on the confidentialiy, integrity and availability of your data.
Q2: Does the RTP have to cover all risks identified against each of the controls or only high/medium risks identified from your risk assessment performed against the companies assets?
Answer: The Risk Treatment Plan (RTP) has to cover only the controls that have not yet been implemented - it doesn't matter to which assets or risks those controls are related to. The risk treatment process has a differentu purpose than the RTP - it has to cover only the unacceptable risks, i.e. the highest risks you identified during the risk assessment process.
The development of business continuity plans often requires the involvement of several persons, because the plan has to consider multiple views such as business, operation, financial, etc. Since these people normally have low experience on developing BCPs, it is the role of the BC manager / implementer to coordinate their efforts, guiding them on the identification of needed information and resources, defining objectives and activation/deactivation conditions, etc. On some cases, after gathering all the information, they can elaborate the part of the plan that involves the activities they will be involved with, while you can write the parts more related to the Business Continuity Management System (e.g., communication plan).
ISO 9001:2015 doesn´t state or require anything on how organizations should name the different documents, so then it will be up to the company how to do it. As you mention in your consultation, usually companies use the following documentation structure:
- level 1 - Quality Manual
- level 2 - Quality Policy
- level 3 - Procedures
- level 4 - Instructions
- level 5 - Records
When it comes to risk treatment, there are four general options: mitigate, avoid, transfer and accept. So, in a sense, even raw risks can be considered residual risks (when the chosen treatment for them is to accept the risk).
NIST 800-171, Aerospace standards, CIS 20, NIST 800-53 with ISO 27001 Standards
Answer:
NIST 800-171, NIST 800-53, and CIS 20 (Center for Internet Security) provide detailed information for implementation of some controls related to ISO 27001 Annex A, so to integrate these controls to ISO 27001 you have to map the relationship between them. NIST documents already have annexes that identify these relations (NIST 800-171 Annex D and NIST 800-53 Anex H). Unfortunately we are not experts on CIS 20 to inform you have such relations already been mapped.
Regarding Aerospace standards, without details about which one you are referring to, we are unable to provide a proper answer.