So I guess my question is, if in the risk assessment the risk level is a 1 or a 2 can i still put in a control? and would it be a risk acceptance or selection of control under selection of options? Another example would be if the level of risk is a 1 or a 2 and it is an accepted risk but i want to make the treatment method stronger... would i still put risk acceptance and then select a control or just selection of control?
Answer: If during the risk assessment you identify that risks are acceptable because there are already implemented controls, you should mention the related controls in the Risk Assessment Table, column J (Existing Controls), and there is no need to transfer those risks to the Risk Treatment Table, unless you decide to include additional controls to treat these risks, or make improvements on the controls already implemented.
If you decide to include an already acceptable risk in the risk treatment table (because you want to improve a control or add a new one), there is no much sense to choose the option "risk acceptance", because this option means you intend to make changes now.
Included in the toolkit you bought you have access to a video tutorial that can help you perform the risk assessment and treatment.
Answer: Root cause is the main reason why a non-conformity has happened - for example, if you have an employee who didn't perform backup according to Backup policy, a root cause could be that there was no training that explained to employees how this needs to be done.
Such root causes should be documented in the Corrective action form.
Answer: Mortage information is sensitive, and its compromise may have great impacts to the interested parties, so you should consider also ISO 27001 standard, so you can evaluate properly how potential providers handle and protect this kind of information.
Answer: Regarding suppliers, ISO 27001 has a control that requires the definition of requirements for mitigating the risks associated with a supplier’s access to the organization’s assets, which does not require to describe detailed practices. This control is covered by template "Supplier Security Policy" that can be found at folder 08 Annex A A.15 Supplier relationships.
If you need detailed rules about how a supplier should behave, you can use the "Security Clauses for Suppliers and Partners" template, located at folder 08 Annex A A.15 Supplier relationships to define the rules you want your vendors to follow.
Sí, estoy de acuerdo contigo Marcelo. Tú podrías ser el propietario, desarrollando/adaptando los documentos, el miembro del consejo de administración los puede revisar, y gerencia puede aprobarlos.
Referring to the situation you described, if the parents are the ones filling in the details for their own children then they are actually acting on the children's behalf so no additional consent would be required.
Understanding ISO 27001
Is my fear true?
Answer: ISO 27001 is a management standard, so most of its requirements are about roles and responsibilities, and how process should be planned, implemented, controlled and improved, with only minimal requirements regarding technical issues like networking and penetration testing (basically what someone in management position should require from his technical staff). So a non technical education wouldn't be a problem to learn ISO 27001.
Answer:
If Incident was submitted as Service Request (or vice versa) it should be re-routed right at the beginning i.e. before further activities take place. This means that, usually Service Desk staff or technician who took over the ticket, should change Incident into Service Request (or vice versa) and "send" it to the right process.