To audit other ISO management standards based on your competencies as an ISO 27001 internal auditor, you have to demonstrate verifiable evidences that you also have competencies on those ISO standards.
For example, if you have attended e.g. ISO 9001 Foundations course, or have previous experience with an ISO 9001 QMS, you can audit ISO 9001.
Although this article aims to ISO 27001, the concepts are valid for any ISO management standard.
Filling templates
Answer: The data related to "version 0.1" in the history section is only for exemplification purposes. You can change this information for your own.
2. The Risk Assessment of course is the bulk of the questions from asset owners. Some are clear such as physical equipment. Some are less obvious, for example SaaS software common these days such as CRM software, GoogleSuite, Office365 etc - do each of these get listed as a separate asset with a separate owner, or can each be listed with a central asset owner. The permutations will very rapidly end up with hundreds of assets for our 5 person company, with then thousands of Risk (by threat and vulnerability). Would you have any samples for very small start-up companies with < $1M in revenues and all assets are cloud based (SaaS, AWS, personal compute devices etc.)? I plan to do all the heavy lifting as much a s possible and will interview the other employees.
Answer: ISO 27001 does not prescribe how the inventory of assets should be developed, so you can use the organization that better fits your needs. Some suggestions are:
- Organize by SaaS provider (e.g., Google applications, Microsoft applications, etc.)
- Organize by purpose (e.g., HR applications, Collaborative applications, etc.)
The most important tip here is that you have to simplify the process by grouping similar assets.
Regarding the designation of assets owners the same applies (you can have one person responsible for all related assets, one for each asset, or a mixed approach). If several users across the company are using particular software or SaaS, then the most senior of them can be the asset owner.
About sample of assets, in this template you have a sheet with a catalogue of assets.
National Competent Authority refers to a government body that is in charge of handling matters related to medical devices in your country. In this case, it should be ANVISA. You might want to discuss with the certification body that audited for ISO 13485 if necessary before any submission.
For more information, you might want to refer to :
Filling template Key Contacts for Business Continuity
Answer:
ISO 22301 only requires that contact information is available, so organizations can define which one they can include in the Key Contacts for Business Continuity. But you have to note that with less alternatives to contact personnel, more difficult may be to reach them in case of need.
You can fill in the Risk assessment table in cycles, including only the few risks each time and analyzing them. If you identify that you still need more risks you can perform any cycles you want. This way you ensure to include the most important and relevant risks with less effort.
By the way, included in the toolkit you bought, you have access to a video tutorial that can help you fill in the risk assessment table. This video uses real data to make the understanding easier.
Performance objectives and strategic objectives
Answer:
For me strategic objectives are performance objectives, but not all performance objectives are strategic. An organization can translate its strategic orientation into a set of objectives and targets, aligned with the quality policy. When we measure the organization’s performance against those strategic objectives, we are measuring the strategic performance. Besides strategic objectives an organization can have other objectives, for example can have process objectives that are not strategic. When we measure the organization’s performance against those process objectives, we are measuring performance or operational performance.
The following material will provide you information about implementing an ISO 9001 management system:
Included with the toolkit you bought you have an access to a video tutorial that can help you fill in the Risk Assessment table. This video tutorial uses the real data to facilitate the process understanding.
In the second sheet of this template you will find a list of suggested assets, and also list of threats and vulnerabilities.
Sharing resources
Answer:
If you can provide evidence that sharing the network cabinet will not affect your information security risks (e.g., through a risk assessment), or that there are implemented controls to maintain the risks in acceptable levels, then you will have no complications with your ISO 27001 implementation.
phpMyAdmin is an administration tool for MySQL databases, so as an application which shows information, you should consider including a label on the user interface (e.g., at the upper left corner of the screen) identifying the most sensitive information the application has access to.