As I had to take the exam and I still didn´t have answer for the question I bought ISO 27001 Risk Management, hoping to find the answer. But I didn´t.
The pocket book is really fine, though having read “Becoming resilient” most of the contents of the ISO 27001 Risk Management pocket book are exactly the same. But anyway I think I learned some new things.
Answer: Risk mitigation involves the implementation of controls to reduce the impact and/or probability of a risk to happen, so by mitigating risks before implementing the strategies for BC will help reduce the required resources to implement BC strategies. Regarding ISO 27001 Risk Manag ement, it has much more precise requirements regarding the timing of the mitigation - the controls do not need to be implemented right away, but they need to be planned through the Risk Treatment Plan.
For example, by installing a lightning rod system, you can reduce the need for a secondary site as result of a lighting storm damaging a build electrical infrastructure.
Clarification on Penetration test
Answers:
1. Control A.12.6.1 can become required as result of risk assessment if you identify, for example, that one of your software suppliers often releases security updates for a critical system your organization uses.
An example regarding legal requirements is the compliance with PCI-DSS, an standard for credit card industry, which requires periodic verification of vulnerabilities on assets handling customer's credit data.
2. Provided that you are capable to evidence that the personnel performing the tests have the competencies to do so (by means of certificates, experience records or external references), these people do not need to be part of your ISMS scope.
GDPR and recorded calls
I am not sure about the rights of the customers (callers) and I am not sure about my rights either.
1. Can a customer (caller) ask to delete the records with his/her voice?
2. Am I eligible to ask the same from my company (if for example I would like to delete all records with my voice from the archive of the company)?
Answers:
There is the same approach regardless if the request comes from an employee or a customer.
A data controller must comply with the request where:
- the individual has objected to the processing and (other than in relation to objections to direct marketing) there are no overriding legitimate grounds to justify that processing;
- the personal data is no longer needed for the purpose for which it was collected or processed;
- the individual withdraws consent and there are no other grounds for the processing;
- the per sonal data is unlawfully processed;
- there is a legal obligation under Union or Member State law to erase the personal data; or
- personal data was processed in connection with an online service offered to a child.
However the right to erasure is not an absolute right and the controller does not need to comply if the processing is:
- necessary for rights of freedom of expression or information;
- for compliance with a legal obligation under Union or Member State law;
- in the public interest or carried out by an official authority;
- for public interest in the area of public health;
- for archiving or research; or
- for legal claims.
“….as part of the risk assessment the IT Security Questionnaire is completed by third parties providing details around their information security management system and control environment.”
As a growing publicly listed firm, my IT team get a lot of new software requests from our staff. Due to the maturity of some of the Fintechs that I’m asked to review I can tell that IT security framework is not that great. Hence the need for a questionnaire.
Answer: Included in the toolkit you bough there is an Internal Audit Checklist template that you can use to evaluate IT aspects of information security management.
Sections covering the controls from Annex A, specially sections A.6.2, A.9, A.10., A.12, A.13, A.14 and A.15 can help you evaluate not only your own infrastructure but also from third parties.
This template is locate on folder 10 Procedure for Internal Audit.
Training and awareness
I am pleased to inform you that we have successfully completed the ISO27001 Stage 2 Audit and have been recommended to be certified. Thank you for all your help J.
One of the findings from the Stage 2 Audit is to generalise further the Information Security Awareness Training for our employees. Would you by any chance be able to direct me to one of your articles/presentations on this subject?
Whilst thanking you in advance for your feedback on the matter, I look forward to hearing from you soon.
Answer: First of all, congratulations for your achievement.
ISO 9001:2015 does not require neither procedures nor records about implementation of risk-based thinking. When I work with companies implementing a quality management system according to ISO 9001:2015 I recommend having a risk register and having a small instruction or procedure to assure a consistent procedure year after year. Attention, remember that my approach is not mandatory. So, your approach is acceptable, although I would like to work with recrds of the full risk assessment.
The following material will provide you information about risk -based thinking:
Answer:
This question has a huge scope, not easy to answer in some lines. Pick a project manager, a small team and a project sponsor with influence over the top management. Study ISO 9001, develop a process map of how your organization works and develop a project plan. Then is simple project management.
The following material will provide you information about internal audits:
If it's required,kindly oblige me ways to go about it.
Answer: ISO 22301 does not require the elaboration of a manual, and we do not recommend organizations to adopt one, because:
- merging required documents in a single document makes them no easier to read;
- the longer the documents are, the smaller the chance someone will read them because not every BCMS document is intended for everyone in an organization;
- since individual BCMS documents change rather often, it would be a nightmare to update such handbook so frequently.