ISO 27001 clauses to be considered in an HR department audit are mainly related to sections 7.2 (competence), 7.3 (awareness), and 7.4 (communication).
Broadly speaking,you should verify how the organization has identified and ensured the necessary information security competence is available, how employees are aware of the importance of protecting information and how they can contribute, and how their need for communication are identified and ensured.
ISO 27001 Certified ISMS Foundation (CISF) qualification
For information about the use of CISF credential you need to contact IBITGQ (International Board for IT Governance Qualifications).
ISO 14001 on a construction site
Answer:
An environmental management system is used, among other things, to manage environmental aspects. Environmental aspects are mostly related to construction sites and all construction sites are different. Considering that, some typical issues can be:
Landscape change;
Dust generation;
Waste generation;
Water pollution;
Vegetation removal;
Environmental noise;
Waterborne suspended substances;
Destruction of the habitat of endangered species;
Resource deterioration;
Energy consumption on site
Raw materials consumption
Generation of inert waste
Site Hygiene
The following material will provide you information about assessment of environmental interactions:
Perhaps if you can point me for some cyber resilience book. BCM, information security or cyber resilience go hand in hand.
I'm not a tecnical professional, so any plain english guide will suit me just fine.
Answer: Cyber resilience goes through ensuring the management and delivery of IT services, so books about ITIL and ISO 20000, the ISO standard for management of IT services, can be useful for your purposes.
ISO 22301 & ISO 27001 are also framed as per the Annex SL Framework. ISO 45001, ISO 27001 and iSO 22301 are "Risked based" standards.
In view of this whether it will be possible to include ISO 22301 & ISO 27001 under "IMS" additionally ?
Answer: Certainly. Since all these standards are structured according Annex SL all their common requirements can be integrated in a single framework. As for the "Risked based" aspect of the standards, you can consider develop them accordingly ISO 31000, ISO standard for risk management.
Answer: There is no standard or default Recovery Time Objective (RTO) that can be attributed to an application, because the RTO value is based on the results of a Business Impact Analysis (BIA), which is unique for each organization context. The definition of RTO can be made by the person responsible by the application, considering the inputs of interested parties impacted by a disruption on application operation (e.g., customers, regulators, etc.), and it is approved by top management.
The key to integrating the business processes and QMS processes, as mentioned in the article, is to first identify what the business needs are (a SWOT analysis is recommended), from which you can then create your quality objectives to support your business needs.
Once these quality objectives are created they can be integrated into your business processes so that the processes you use to run your business link to your overall business objectives. For instance, If you have a quality objective for improving on-time delivery, you can then have objectives and measurables for the important business process to meet to ensure this on-time delivery is improved.
For more information, see this article on writing quality objectives: https://advisera.com/9100academy/knowledgebase/how-to-define-quality-objectives-in-as9100/
Risk Assessment, Risk Treatment, and Data Protection Impact Assessment templates
Our priority at the moment is complying with GDPR (for obvious reasons) and ensure data protection, in particular in our cloud based solution. We will of course ensure data protection in other business areas also, but our main focus at the moment is within our solution. In relation to this, I have been looking into the ISO 27018 standard for controls, and I see that controls in this standard are much similar to the requirements from our customers and also GDPR.
As a risk manager I am trying to figure out an effective way to perform risk assessments in accordance with information security (ISO 27001) and personal data protection (ISO 27018). Do you have any advice on how I should structure this? In what end should I start? I have started several times, but I feel as though the structure in my Excel sheet is not good, when I try to combine this. Should I have an own file for personal data protection (privacy risks) and information security risks o r could these be combined in a way?
Could you provide a simple example on how you would structure the different risk assessments? Particularly risk assessing a cloud solution for personal data protection. Is this something I can find advise on in the ISO 27018 standard? Or in ISO 27017? We have not purchased any of these standards yet, but we are considering it.
Hope you can assist me on my doubts around this.
Answer: You should go for separated files for information security risks and privacy risks. In fact, in the EU GDPR & ISO 27001 Integrated Documentation Toolkit you bought you have the following templates that can help you:
- Risk Assessment and Risk Treatment Methodology, located at folder 7 - Risk Assessment and Risk Treatment
- Data Protection Impact Assessment Methodology, located at folder 8 - Data Protection Impact Assessment
Also included in the toolkit you have access to a video tutorial that will guide you how to fill the risk assessment and risk treatment methodology.
Regarding ISO 27017 and ISO 27018, they do not provide guidance on the risk assessment process, only on the implementation of security controls related to cloud environments and privacy, respectively.
If you want to develop a checklist to audit top management you should start with the purpose of the audit: Is it to check conformity? Is it to check effectiveness? Let us suppose that it is to check conformity. Then, you should collect the audit criteria (Quality policy, quality objectives, procedures, ISO 9001 and any other external documentation that sets rules for the organization (for example, legislation).
Now is the time to develop the checklist:
Read the audit criteria, and ask yourself: Is this true? Are we doing this? Be suspicious, be cynical and underline all topics that mess with you and your curiosity. Then, for each topic start to list questions that you want to ask (where and to whom), things that you want to observe being done (where and when), things that you want to verify (where).
Now it is just a matter of organizing all those questions, observations and verifications to be done, along an itinerary for your audi t (when in one place you do everything there, to avoid come to a place, walk away and then come back again)
The following material will provide you information about checklists: