Answer: ISO 27001 does not require a document to cover clause 4.1, so to avoid unnecessary administrative effort there is no template for cover this clause in the toolkit.
2 - How can you best describe our organization’s risk appetite?
Answer: The risk appetite is the organization willingness to take risks, and accept some degree of impact. The risk appetite can be related, among other things, to organizational culture, top management mindset, the desired business outcomes, and the impacts related to disruptive incidents it considers acceptable to take.
3 - How can you best describe the links between the business continuity policy and the organization’s objectives and other policies, including our risk management strategy?
Answer: The organization's objectives are the base for the business continuity policy, the other policies, and the risk management strategy.
Based on the organization's objectives the policies must be developed to ensure they can be achieved (in respect to the business continuity policy, the objectives will help drive the processes and resources to be implemented to ensure the continuity of activities that are related to the objectives). Regarding risk management, the organization's objectives will help the identification of the most relevant risks and how they should be treated.
4 - How can you best describe the potential impact related to a disruptive incident with services, products, etc.
Answer: The best way to describe the impacts of disruptive incidents to the business is by performing a Business Impact Analysis, which will help you identify and demonstrate how business is impacted through time if a disruptive incident occurs.
However, there are certain areas where you would need to turn to local laws, for example in terms of retention periods there are maybe some specific requirements that will require you to keep certain record that may contain personal data for a specific period of time. For example, CCTV footage can be kept no longer than 30 days in certain jurisdiction such as Romania, Poland and Greece. So, my advice is once you have established your Data Retention Schedule to cross check with the local legal requirements.
Another aspect that may differ relates to Labor Law, in certain jurisdiction such as Germany certain processing activities involving employees personal data need to be brought to the at tention of the Work Counsels/Workers Union.
Also, keep an eye on local EU GDPR implementation acts that can add some local flavors to certain topics.
If your suppliers are within EU/EEA there is no need for any safeguards regarding transfers so, no Data Transfer Agreement is needed between controllers and processor that are in the EU/EEA.
However, the Data Processing Agreement which is the legal binding document establishing the obligations of the processors may need to be changed as there are certain requirements that are new and not covered by the current Data Protection Directive. In terms of processor obligations you might find useful the following article on our website : “EU GDPR Controller vs. Processor – What are the differences” https://advisera.com/eugd pracademy/knowledgebase/eu-gdpr-controller-vs-processor-what-are-the-differences/.
Respuesta: Ambas opciones son posibles, es decir, un grupo empresarial puede certificarse en ISO 27001, o cada compañía del grupo también puede certificarse en ISO 27001. Pero, si quieres obtener los beneficios del estándar a nivel de grupo, la primera opción sería la más recomendable.
It is not normal to consider competitors as interested party of an organization. I would consider competitors as interested parties if, for example, they could be partners in research and development, or in the introduction of sectorial practices, or if they could be subcontracted for certain processes.
The following material will provide you information about interested parties:
Answer: Please consider the information in the white paper. Current version of ISO 27001 do not require a documented procedure for control of documents and records. Regarding the differences between the templates and the information on the video tutorials we will verify this situation.
ITSM and Business Continuity competencies
Answer: Considering ISO standards, for ITSM I recommend you the Lead Auditor course for ISO 20000, and for Business continuity I recommend the ISO 22301 Lead Auditor course. For ITSM an alternative source of qualification are ITIL courses.
Certifications differences
Answer: The ISO 27001 Internal Auditor course prepares people to audit an ISMS against ISO 27001 so they can perform audits for their organizations, while the ISO 27001 Lead Auditor certification recognizes people who have competency on auditing an ISMS against ISO 27001 requirements and qualifies them to start the process to become a certification auditor.
Both contents for ISO internal auditor and ISO lead auditor can be useful to prepare someone for the CISA and CISSP certification exams, but otherwise they have no relation.
• Which policies / policies shall be present and which shall I recommend to apply?
• Which processes and procedures should support my approach to secure that we do as we say we will do as attendee?
• Which controls should I set up and carried out to check that we follow the processes and procedure?
Answer: First of all, sorry for the late answer.
Although ISO 27001 defines some common requirements that must be implemented by any organization (e.g., control of document and records, internal audit, management review, etc.), more specific policies, processes, procedures and controls should be tailored by each organization's purposes and needs, as result of risk assessments, so there is no definitive answer to your questions.
- In terms of polices, the mandatory one to be documented is the Information security policy. For network segregation you should consider at least an Acce ss Control Policy and an Acceptable Use Policy, to help guide how these network groups are separated and how they can interact with each other. Other policies (related to ISO 27001 Annex A), should be defined considering the results of risk assessment
- In terms of processes and procedures, the mandatory one to be documented is Risk assessment and risk treatment methodology. At least a change management process should be considered so you can ensure changes in network groups are properly authorized and implemented. Other processes and procedures, should be defined considering the results of risk assessment
- To ensure the processes and procedure are being followed you have to keep records of the following: Records of training, skills, experience and qualifications, Monitoring and measurement results, Internal audit program, Results of internal audits, Results of the management review, and Results of corrective actions. Although there is no standard requirement for processes to be documented, you should consider implementing as a good practice an internal audit procedure.