Filling template Key Contacts for Business Continuity
Answer:
ISO 22301 only requires that contact information is available, so organizations can define which one they can include in the Key Contacts for Business Continuity. But you have to note that with less alternatives to contact personnel, more difficult may be to reach them in case of need.
You can fill in the Risk assessment table in cycles, including only the few risks each time and analyzing them. If you identify that you still need more risks you can perform any cycles you want. This way you ensure to include the most important and relevant risks with less effort.
By the way, included in the toolkit you bought, you have access to a video tutorial that can help you fill in the risk assessment table. This video uses real data to make the understanding easier.
Performance objectives and strategic objectives
Answer:
For me strategic objectives are performance objectives, but not all performance objectives are strategic. An organization can translate its strategic orientation into a set of objectives and targets, aligned with the quality policy. When we measure the organization’s performance against those strategic objectives, we are measuring the strategic performance. Besides strategic objectives an organization can have other objectives, for example can have process objectives that are not strategic. When we measure the organization’s performance against those process objectives, we are measuring performance or operational performance.
The following material will provide you information about implementing an ISO 9001 management system:
Included with the toolkit you bought you have an access to a video tutorial that can help you fill in the Risk Assessment table. This video tutorial uses the real data to facilitate the process understanding.
In the second sheet of this template you will find a list of suggested assets, and also list of threats and vulnerabilities.
Sharing resources
Answer:
If you can provide evidence that sharing the network cabinet will not affect your information security risks (e.g., through a risk assessment), or that there are implemented controls to maintain the risks in acceptable levels, then you will have no complications with your ISO 27001 implementation.
phpMyAdmin is an administration tool for MySQL databases, so as an application which shows information, you should consider including a label on the user interface (e.g., at the upper left corner of the screen) identifying the most sensitive information the application has access to.
This toolkit can help you to perform an internal audit of information security and/or business continuity according to the requirements set in ISO 27001 and ISO 22301.
Backups
Respuesta: Para gestionar las copias de seguridad, comunmente las compañías definen una política de backup, estableciendo la frecuencia de los backups (por ejemplo, diariamente, o semanalmente, o mensualmente), y la información que necesitan guardar en los backups (información de clientes, proveedores, desarrollo software, etc). También es muy importante planificar restauraciones de la información, para comprobar que las copias están bien, y se debería tener una copia de los backups en una ubicación distinta de la oficina principal. Finalmente, en caso de que tengas que transportar las copias de un lugar a otro, también deberías contemplar la posibilidad de cifrar la información. Todas estas cuestiones básicamente son recomendaciones establecidas en el estándar ISO 27002 (código de buenas prácticas), en el control A.12.3.1