If you are collecting/processing data on your website you would need a Privacy Notice to inform the users as required by EU GDPR art. 13 – “Information to be provided where personal data are collected from the data subject” (https://advisera.com/eugdpracademy/gdpr/information-to-be-provided-where-personal-data-are-collected-from-the-data-subject/). The information about cookies need to be provided as per the requirements of the ePrivacy Decision. As for the ”treatment register” I am not you sure what you mean by that.
I am thinking whether I can approach the Cybersecurity in a risk management framework , from risk management strategy to identify and access the risk , build Cybersecurity program and security assurance architecture , mitigate the risk from Cybersecurity plan with security control in ISO 27001 Annex A against the control category in NIST CSF which comply with NERC CIP 02-09.
and since the correlation between NIST CSF and NERC CIP is already mapped, the integration between these three would follow the same logic.
Risks on software development
Answer: The specific risks perceived by an organization regarding its processes (e.g., software development) and provided services (e.g., CRAM software on a SaaS environment) are unique considering its organizational context and objectives, and should be supported by a risk assessment process, but broadly speaking you should consider these references:
- Top Threats to Cloud Computing Plus: Industry Insights https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
- OWASP Top Ten 2017 Project https://www.owasp.org/index.php/Top_10-2017_Top_10
Respuesta: Los indicadores son muy importantes porque puedes usarlos para medir y monitorizar los procesos y los controles de seguridad de la información, que es un requerimiento en la ISO 27001, de acuerdo al punto 9.1 Seguimiento, medición, análisis y evaluación.
Consider auditing a process – what ISO 9001:2015 clauses do you consider?
Auditing process performance (9.1.1 and 9.1.3);
Auditing process control (8.5.1);
Auditing quality control (8.6);
Auditing nonconformities control (8.7);
Auditing order control (8.4)
Auditing documentation control (7.5)
Auditing monitoring resources (7.1.5)
Auditing identification and traceability (8.5.2)
As you can see, you can use several ISO 9001 clauses to audit a process, outsourced or not.
The following material will provide you information about scope definition:
All the data subject requests including the “right to be forgotten request” would be dealt with according to the “Data Subject Access Request Procedure”.
In ISO world, mandatory requirements/documents are related to the words "must" or "shall", while non mandatory requirements/documents are related to words "may"or "should". In ISO 27002, since it provides recommendations for the implementation of controls that may be required as a result of a risk assessment, you will find the guidance ruled by "should", i.e., you only have to consider the recommendations that will help handle the risks you identified as unacceptable.