Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
I'm assuming that by "cloud adoption lifecycle" you mean a sequence of steps followed to implement cloud computing capabilities.
Considering that, please note that this toolkit includes all you need to perform the cloud security risk assessment and to plan for cloud security controls. You have to follow the steps in the toolkit and use the templates to achieve this.
In case you need further support to implement the documents, you can schedule a call with an expert to have a one-on-one live consultation.
This article will provide you with further explanation about ISO 27001 information risk assessment:
The general approach to performing an audit is:
Considering a cloud environment, you need to clarify the responsibilities for each asset, so you can properly identify who needs to be audited about which asset.
For example, in an IaaS cloud model, the cloud provider is responsible only for the physical structure, while in a PaaS model, the cloud provider is also responsible for the development environment used by application developers, and in a SaaS environment, the cloud provider is also responsible for the applications.
These articles will provide you a further explanation about preparing an audit:
I do not have enough information to respond to the question of how long it would take to calibrate a tester.
For more information on associated calibration intervals, refer to ILAC G24:2007 Guidelines for the determination of calibration intervals of measuring instruments (note currently under revision) available for download at https://ilac.org/?ddownload=818
For more information, have a look at
The article: What does ISO 17025:2017 require for laboratory measurement equipment and related procedures? at https://advisera.com/17025academy/blog/2019/07/25/iso-17025-measurement-requirements-of-the-standard/
ITIL considers the whole life cycle of the service as well as the whole (IT Service Management) organization.
Here are a few articles that can give you an idea of why consider (and implement) ITIL i.e. what are some of the positive outcomes of the ITIL implementation:
It all depends on the role of the subsidiaries, whether they are data controllers or data processors. If they are data processors, it is the role of the data controller to make sure that data subjects are informed by means of a privacy notice. If they are data controllers, they need to make sure that they have a privacy notice describing their processing operations. What is really important is to make sure that the data subject is informed. The privacy notice or notices can reside in a single location, however, they must be easy to read and understand, and contain information about all the processing operations.
Please visit these resources as well:
The departments that need to be audited for the OHSMS will depend on the scope you have chosen for the management system. With ISO 45001 it is up to the organization to determine which processes will become part of the OHSMS, and this will determine what needs to be audited. I like to think of the scope as “where the PH&S rules will apply”.
Once you know which processes are included, then you will prepare to assess each process against the planned arrangement. In effect, you will be collecting evidence to show that process meets their requirements. Where they do not, you will raise a nonconformity which will require corrective action to improve the system and make the process meet requirements once again.
You can find out more on how scope and internal audit work in the articles:
1 - I was assigned to do a review on company (financial institution) IT and IS Risk Assessment. However, I am confuse about the difference of both assessment?
I'm assuming that by ISRA you mean "Information security risk assessment", and that by ITRA you mean "Information Technology risk assessment".
Considering that, although they have an overlap, IT risk assessment and IS risk assessment focus on different things. IS risk assessment focuses on impacts related to the loss of confidentiality, integrity, and/or availability of information, while IT risk assessment focus on impacts that affects information technology assets and/or provided information technology services.
The overlap is that part of IS risk assessment covers information and communication technologies, and part of IT risk assessment covers information related to provided information technology services.
2 - how will I start?
Although these are independent assessments, since information in many situations relies on information technology assets, starting with the IS risk assessment review may provide you with a better understanding when performing the IT risk assessment review because as part of IS risk assessment you need to list all information related assets - and for IT assets you will perform the IT risk assessment.
3 - And what about IT Risk Policy Manual and IT Risk management Framework is same? how is this related on both ISRA and ITRA?
The IT Risk Policy Manual and IT Risk management Framework are not the same.
An IT Risk management Framework provides the general elements for a risk management process (e.g., risk assessment, risk treatment, etc.), while an IT Risk Policy Manual defines the specific rules defined by the organization to be applied to the risk management process.
Risk management framework and risk policy should be developed for information security, and potentially include a further explanation for IT.
This article will provide you with a further explanation of ISO 27001 information risk assessment:
Hello Jaya.
I would also like to add that you can also consider some more dimensions:
-Do you think it can be beneficial to have the accreditation body to be from the same country as the entity audited (cultural similarities, same language - no language barriers etc)?
Why is this important? Well, maybe the staff at the entity/entities only speaks the local language and don't know other languages, which will be an issue for an external auditor that needs to interview the staff.
-Do you need to conduct onsite interviews or can it be done remotely? If some elements need to be conducted onsite (inspect data centers, inspect physical security controls etc), then perhaps it might be less costly to select an accredited body that is local due to travel costs (accommodation, flights etc) for the external auditors.
Please note that justifications in the Statement of Applicability need to be based on applicable legal requirements, relevant risks, or management decisions (in general because management considers the implementation of control as a good practice).
Considering that, the fact that you operate on a remote structure wouldn’t be enough. Since you stated that you do not have legal or contractual reasons for justifying some controls, you should review the results of the risk assessment to see if any identified risk can be used as a justification. If there are no relevant risks, you do not need to implement any controls.
In case you decide to implement a control regardless of the lack of legal requirements and relevant risks, you can state as justification that the control implementation is considered good practice management.
For further information, see:
Yes, it is, because you need to prove that the new company that provides sterilization is just as good as the previous one (so that it has a valid ISO 13485 certificate for its type of sterilization, that you have sterilization validation results with the new provider, that you have done biological indicator tests with the new provider, etc.). Also, in your risk analysis, you should check whether any new risks have appeared with the change of sterilization provider: for example, how long is the transport from you to the new provider, is it longer or shorter, has the responsibility for transport changed.