It is a big challenge, their present QMS is pre-process approach that was introduced in 2000. Do not try to do it alone, arrange a team to implement the new QMS. I do not know the dimension of your organization, but consider the following advice:
The duration of implementation depends primarily on the size of the organization, for example:
Smaller organizations (up to 50 employees) usually implement the standard in less than 8 months.
Mid-size organizations (up to 500 employees) usually implement the standard in 8 to 12 months.
Large organizations (500 employees and more) – implementation usually lasts 12 to 15 months.
Beware of companies that drag such projects on for too long (e.g., small companies for more than 12 months) usually never finish the project.
The following material will provide you information about implementing a QMS:
Answer:
You are correct. In clause 8.5.1.3 of AS9100 Rev D, which covers Production Process Verification, there are the requirements which are referred to as First Article Inspection (FAI). The requirements within this clause make no reference to AS9102, and therefore the process of AS9102 is not a requirement of AS9100 Rev D. So, unless you are required by customer to use the AS9102 process and forms these requirements can be fulfilled in other ways as you determine adequate.
For more information on this see the article: https://advisera.com/9100academy/blog/2017/11/07/how-does-first-article-inspection-fit-into-as9100-rev-d/
ISMS implementation strategies
Option 1: Documentation Toolkit
Option 2: Conformio (As I understand, it comes to together with documentation template).
It seems that some consultancy is still needed for this company. What is your advise? How much consultancy is needed?
The scope is - NOC & SOC. (Staff around 15)
Total number of Staff 20 to 30.
Answer: The extent to which a consultancy is needed depends on the complexity and size of the scope, on the extent of the organization, and on the time and resources available. Considering that, and the information you already provided, the options would be:
- Use a consultant to perform most of the effort to implement the ISMS
- Use a consultant only to support the staff on specific issues, leaving the organization's staff with most of the implementation effort.
3 - What will be steps and best approach for me to assist this company.
Answer: Roughly speaking, ISO 27001 implementation steps can be resumed in:
1) getting management buy-in for the project;
2) defining ISMS basic framework (e.g., scope, objectives, organizational structure), by understanding organizational context and requirements of interested parties;
3) development of risk assessment and treatment methodology;
4) perform risk assessment and define risk treatment plan;
5) controls implementation (e.g., policies and procedures documentation, acquisitions, etc.);
6) people training and awareness;
7) controls operation;
8 performance monitoring and measurement;
9) perform internal audit;
10) perform management critical review; and
11) address nonconformities, corrective actions and opportunities for improvement.
The common practice is not to engage processors that cannot be trusted to comply with the EU GDPR provisions or take liability in case of a breaching the EU GDPR provisions. Also remember that you will be responsible for the actions of the processors you contract so having a liability clause would be a must.
>1- Now looking at Dejan's checklist, it contains all requirements in 27001 from chapter 4 to 10 plus all the controls in the appendix.
It doesn't make sense to audit the full checklist for every department so I'm guessing that the auditor, as part of the preparation, choose what clauses in the checklist to include in each audit.
In short, each audit will consist of a subset of the checklist depending on the nature of the department. Can you confirm?
Answer: Your assumption is correct, the auditor can define a subset of the items to be included in the checklist, depending on the purpose of the audit and the audited department.
>2 - We're short on auditors that know infosec and the standard so would you say it would be compliant if we (the security office) audit ourselfs and our own work as long as we “select auditors and conduct audits that ensure objectivity and the impartiality of the audit process”?
Answer: The security office cannot audit its own work alone. The main requirements of ISO 27001 (from clauses 4 to 10) do not require deep knowledge about information security to be audited, so the security office and another auditor with competence in auditing ISO management systems (e.g., ISO 9001 and ISO 14001) working together would be sufficient to ensure the audit process is objective and impartial.
>3 - Regarding the scope of an audit (i.e. what clauses from the checklist to include), would it be ok to narrow the scope to just a few controls? I mean, in your template “Annual Internal Audit Program” the heading “Scope” exists suggesting that the auditor can choose what clauses to include.
An example: The auditor choose to audit the HR dept so he/she sets the scope to A.7 Human resource security and A.9 Access Control.
Would that fly?
Answer: The auditor can narrow the scope of an audit to a few controls if it fits the purpose of the audit, but you must ensure that all controls regarding the certification scope are audited between external audits, according to the external audit plan. For example, if in the next maintenance audit the certification auditor will audit the HR department, you must ensure all controls applicable to HR department, not only the controls from sections A.7 and A.9 (e.g., requirement 7.2 will also be audited by the external auditor). Another option is to use a couple of auditors in each audit event, where each would focus on only one group of controls.
Management principles
Answer: Management principles are concepts that can be used as a foundation to guide an organization’s performance improvement. ISO 27001 shares some management principles with other ISO management standards, such as:
- Leadership
- Process approach
- Improvement
- Evidence-based decision making
Specifically for the ISMS, we can consider as principles:
- Risk-based approach
- Protection of confidentiality, integrity and availability
Auditing ISO 27001 and ISO 27018
Last December our 27001 documentation was audit and approved, and now we have planned an audit type two (implementation phase) for November, but we want to go a bit further and also get and audit against ISO 27018 and scope the requirement of the GDPR Regulation.
My question are:
1 - It is possible to audit both ISO 27001 and 27018?
Answer: ISO 27018 is a supporting standard to ISO 27001, providing detailed guidance and recommendations on the implementation of ISO 27001 Annex A controls, considering privacy in cloud environments, so it is perfectly possible to perform an audit considering these two standards as references.
2 - Is it possible to audit the 11 extra controls of the ISO 27018 only as the controls of the ISO 27001/27002 already apply? how would you recommend to do it?
Answer: You can reduce your audit scope to cover only the ISO 27018 extra controls and the other controls from ISO 27001 that have some specific recommendations provided in the ISO 27018 with no problem.
It provides a list of questions in order to help perform an internal audit against ISO 27001, considering also ISO 27018. For each clause or control from the standard the checklist provides one or more questions which should be asked during the audit in order to verify the implementation.
Passing those exams will document in a formal way that you acquired knowledge about ISO 9001:2015 and about preparation, realization and reporting of internal audits. Your previous experience and education will certainly be very useful for you and for your future audit customers, that kind of experience and education cannot be learned in a fast course and are very important to deal with situations and having a mature and business-friendly point of view. As soon as you get those two diplomas you can start acting as internal auditor for organizations and as long as you gather some actual experience you can start requesting to certification bodies if they have more particular requirements that you must obey in order to be able to apply.
The following materials will provide you details with internal audits:
2. In cross border transfer data , if the adequacy is not fulfilled , what are the penalties?
Answers:
1. There are actually the same. In the context of the EU GDPR both are entities that are receiving personal data. Depending of the purpose of processing ad the business context the Recipient or Third Party can be a data processor, a joint controller or a controller in its own rights. You can find out more about controllers and processors from our article “EU GDPR controller vs. processor – What are the differences?” – https://advisera.com/eugdpracademy/knowledgebase/eu-gdpr-controller-vs-processor-what-are-the-differences/