Answer: Here is an example you can use to guide you to fill this template:
Job title or name: Security Officer
Necessary knowledge and skills: Risk Management
Which training is necessary: ISO 27005 course (Information technology -- Security techniques -- Information security risk management)
Implementation record of necessary training: Course certificate
Have training objectives been achieved?: Yes
Achieved knowledge, skills, experience: Security officer is now capable to identify, analyse, evaluate and treat risks according the organization context and risk acceptance criteria.
ISO 27001 and NIST
Answer: First, let's understand both NIST and ISO 27001:
- NIST SP-800 series of documents provides detailed information about processes to select and implement controls for computer security
- ISO 27001 provides general requirements for the implementation, operation, control and improvement of a management system to protect information, regardless of the environment where it is (e.g., physical reports or digital databases). ISO 27001 provides protection through the selection of security controls described in its Annex A, as well other controls that can be added by the organization.
The ISO 27001 Documentation Toolkit has templates that are organized and can be used to implement either the management requirements of the ISO 27001 standard, as well as the most common used information security controls from ISO 27001 Annex A, some of them IT related, and that can be linked to NIST SP-800 documents.
Considering that, you can use the ISO 27001 Documentation Toolkit to implement the overall approach to protect information, and after the identification of controls that can be related to NIST documents, you can use the NIST documents to implement the details for each control. For example, you can use information from SP 800-53 control for contingency plan testing to implement the Disaster Recovery Plan template.
Answer: ISO 27001 Foundations course can add value to your competencies by giving you an overview of how information security concepts and practices fit in a ISO management system frameworks, which are used by organizations world-wide. Since ISO 27001 is similar in structure to other management systems, this course can also be used as a first step in knowing management systems like ISO 9001 (quality management) and ISO 20000 (IT services management).
Answer: Large organizations often require more detailed policies and procedures, because they:
- face a wider range of risk scenarios
- have multiple sites that require different approaches to handle the same risks
Considering that, the point is to increase the level of details in each template and elaborating multiple documents. The problem with this approach is that a manual document control of such a great number of documents may become unfeasible, then you should also consider this when adapting our toolkit to a large organization.
It is also important to note that you may have to create some documents that do not exist in the toolkit (e. g., physical security), because they do not exist in the toolkit because they are not mandatory and smaller companies usually do not need them.
BYOD Policy
Do you happen to have some examples or a list for some ideas what to put here?
[List of acceptable BYOD devices and their settings]
[List of prohibited BYOD applications]
Answer: For BYOD devices you should consider any asset your employees can bring to work premises (e.g., cellphones, tablets, and notebooks).
For allowed settings you should consider configurations that can improve information protection (e.g., "storage encryption" and "screen locking" should be enabled). For prohibited settings, you should consider configurations that may compromise information storage or processing on the device (e.g., "Bluetooth connections" and "local password storage" should be disabled).
Examples of prohibited applications are unlicensed software, and software no t related to work, even if they have license (e.g., games).
It is important to note that the creation of those lists are defined in sections 3.2, 3.3, and 3.4 of the BYOD Policy, not only in section 4.
An integrated management system for a mining operation
Answer:
Those are two very general questions. Implementing ISO 9001 and 14001:2015 in a mining environment is no different from other organizations and sectors. For ISO 9001 I would start with the process approach by mapping how the mining operation works as a set of processes. For ISO 14001 I would start with the environmental assessment to identify significative environmental impacts and compliance obligations. Then, I would develop a quality and environmental policy and determine context and interested parties. Then would apply the risk-based approach and develop quality and environmental objectives and plans to meet them. Naturally, there are some iterations needed to fine tune things. Then would start with monitoring of operations/processes and objectives.
The following material will provide you information about implementing integrated management system:
The EU GDPR is applicable for “processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which form part of a filing system or are intended to form part of a filing system” so if the personal data of the attendees is collected and processed then the answer is yes.
Respuesta: Sí, puedes usar el mismo procedimiento, porque el requerimiento relacionado con el control de documentos es común en ISO 27001 y los otros estándares.
The document you are looking for is usually called a Data Processing Agreement or Processor Addendum and you can find a template in our EU GDPR Documentation Toolkit in section 7 – Third Party Compliance https://advisera.com/eugdpracademy/eu-gdpr-documentation-toolkit/