Organizational knowledge is that knowledge that comes from the experience of operating your processes. For example, consider one process from your company. Then, list all activities performed in that process. For each activity, identify which function performs what. Then, list what kind of knowledge someone on those functions has to have in order to perform those activities competently. That knowledge can include things like:
o knowing work instructions;
o having a professional certificate considering the person as a professional welder;
o knowing how to operate certain machines;
o knowing how to control the quality of certain parts;
o Knowing how to identify, segregate and manage nonconformance parts.
When you identify organizational knowledge you do not consider any person in particular, you are using abstract thinking. What kind of knowledge s hould have anyone performing that function.
Then, look at the actual performance of the process and to the actual persons performing those functions. Do they have the right amount of knowledge? Are they competent enough? Remember, you can have competent people working in a process and because your company becomes more demanding at performance, perhaps those some people become non-competent.
Answer: Each certification body has a set of rules regarding how an ISO certified organization must demonstrate it is certified. It generally involves keeping the certificate in a visible place, the use of certification body logo on organization's marketing material or this information must be provided to customers or other interested parties when requested by them.
1 - Is there something else- more specific- that I can get from you in order to do it right?
Answer: Basically it is rather easy to follow the asset-based methodology - you have to list all the assets, then list all the threats to these assets, and then the related vulnerabilities. The template "Risk Assessment Table" has sheets with examples of assets, threats and vulnerabilities you can use to identify your organization's risks.
If you understand that this additional information is not enough to solve your doubts, included in the toolkit you have scheduled consultations with one of our experts so you can present him the situations you are facing and he will help you define how to handle them.
To schedule a consultation with our expert, please access this link: https://advisera.com/27001academy/consultation/ and provide him as many information as you can so at the scheduled time he can provide you a more effective support.
2 - In addition- is it mandatory to write the Business Continuity Management Policy?
Answer: If you want to be compliant with ISO 27001 only, then Business Continuity Policy is needed; if you want to be compliant with ISO 22301 then BC Policy is mandatory.
Access to suppliers SoA
Answer: For current suppliers you should consult the service agreement/contract established with each supplier. For new suppliers, to have an access to their SoA, should be condition of the suppliers selection process, because this document can provide you a general overview of how the supplier handles its own information security. But you should also note that suppliers can refuse to present their SoAs, and you should be prepared to consider that too in your selection process (maybe include visits to potential supplier's premises for evaluation).
Hello
Thank you alot for this precious enlightenment.
Or can I take a course close to my location?
I work at Algeria Telecom Mobile Mobilis as infrastructure NGBSS system administrator OS and DBA expert level 3 .
In algiers .ALgeria
Best Regards.
Answer: ISO 27001 standard describes how to manage information security in an organization, while COBIT provides implementable controls over information technology, organized into IT-related processes. ISO 27001 provides many security control objectives applicable to information technology that can be used to enhance effectiveness of COBIT (e.g., controls from section A.13.1 Network security management) processes. Additionally, COBIT governance practices and ISO 27001 context understanding requirements can be used together to better align information security and information technology with business objectives.
This article will provide you further explanation about COBIT and ISO 27001:
- How to integrate COSO, COBIT, and ISO 27001 frameworks
Answer: First of all, the expression "there is no risk" is kind of incorrect (there is no situation risk-free). A more appropriate expression would be "all current risks are acceptable."
That said, to state 'sufficiency of controls' a company should identify which controls are applied to each identified risk and how these controls are being measured and evaluated to ensure they are sufficient. Based on that information an auditor can look for evidences of compliance. As for the identification of the most important control to ensure sufficiency, besides the identified risk you should consider the security requirements and objectives established to built a checklist of what to look for. Seasoned auditors can rely on their experience t o quickly identify them.
Answer: Although ISO 27001 does not prescribe any methodology for risk management, its requirements for risk assessment and treatment can be fulfilled by NIST's RMF (it is not a question whether they are similar or not, but that RMF is a framework that fits ISO 27001 very nice).