Answer: I'm assuming that for RTP you are referring to Risk Treatment Plan. Considering that, the answer is no, you can leave some of the controls for the implementation for after the auditing under the following conditions:
1) That you have implemented before the audit the controls that mitigate the biggest risks – in other words, you can leave only less important controls for after the audit
2) That you have specified the deadlines for the controls that you will be implementing after the audit in your Risk Treatment Plan – of course, those deadlines must be after the audit date
3) That your risk owners or top management accept all the risks for which controls have not been implemented before the audit
This means that the most important controls must have ”implemented“ status at the audit, while the less important controls can have status ”planned“ or ”partially implemented" at the moment of the audit. Of course that for controls with status of ”partially implemented" you have t o keep evidences of activities already performed regarding the implementation (the auditor won't audit the control, but he will verify if the implementation plan is being executed).
Shall and should in ISO 27001 standard
Answer: In the ISO standards development, the word "shall" is related to requirements, which are mandatory to be fulfilled, while the word "should" is related to recommendations, which fulfilling is optional.
ISO 27001 provides requirements for the implementation of an ISMS, which are mandatory to be fulfilled for certification (all controls in Annex A deemed as applicable must be implemented). On the other hand, ISO 27002 was designed to be used as support to ISO 27001, or as a separated standard to support the implementation of security best practices, without enforcing them. That's why ISO 27002 replaces the word "shall" by "should"in the description of the controls objectives.
This article will provide you further explanation about the differences between ISO 27001 and 27002:
Answer: In the list of documents file that comes with the toolkit you bought you can identify which clauses from ISO 27001 are covered by each template. In there you will find out that:
- Control A.7.1.1 (Screening) is covered by template "Supplier Security Policy" for external personnel
- Control A.7.1.2 (Terms and conditions of employment) is covered by templates "Confidentiality Statement", "Statement of Acceptance of ISMS Documents", applicable to both internal and external personnel, "Supplier Security Policy", and "Security Clauses for Suppliers and Partners", these last two applicable for external personnel
- Control A.7.2.2 (Information security awareness, education and training) is covered by template"Supplier Security Policy" for external personnel, and template "Training and awareness plan" for internal personnel
- Control A.7.2.3 (Disciplinar y process) is covered by template "Incident Management Procedure"
All these templates are found on:
- folder 09 Training and Awareness Plan (Training and awareness plan)
- folder 08 Annex A, sub-folder A.7 Human resource security (Confidentiality Statement and Statement of Acceptance of ISMS Documents)
- folder 08 Annex A, A.15 Supplier relationships (Supplier Security Policy and Security Clauses for Suppliers and Partners)
Regarding control A.7.2.1 (Management responsibility), responsibilities are defined in each template when required (these responsibilities definition are identified by the expression [job title] you have to fulfil in the templates).
Regarding the control 7.3.1 (Termination or change of employment responsibilities), the compliance with this control is covered through the description in Statement of Applicability (e.g., by the applicability of the access control policy).
But if you have this specific need, or other doubts you want to solve, you can schedule a meeting with one of our experts (this meeting is also included in the toolkit you bought), so he can help you with this issue. To schedule a meeting, please access this link: https://advisera.com/27001academy/consultation/
Fast implementation project
Answer: First of all, you have to identify if it is possible to implement and certificate the management system in such short period. Some organizations may already have another systems implemented, or culture that can make the implementation easier, or the certification scope is small, but for others you will have to start from scratch. And in all these cases you have to count with management support in terms of money and human resources.
What I can say to you is that if you have to start from scratch it will be very unlikely to accomplish implementation and certification in such a small period, most because the quantity of documents to be developed and the time needed to perform all activities that are prescribed by the documentation.
Regarding time allocation, if you identify the three month period (tweelve weeks) is enough for the implementation, this is a good estimation of phases duration:
Weeks 1-2: Project planning and elaboration of basic management system documentation (e.g., ISMS scope, information security policy, procedure for documentation control, procedure for internal audit, procedure for risk assessment and treatment, etc.)
Week 2-3: Carrying out the risk assessment and risk treatment plan elaboration
Week 4-5: Information security policies and procedures elaboration
Weeks 5-8 : Implementation, operation and evaluation of policies and procedures (at this point some corrective actions may be required)
Week 9: Internal audit and management review
Week 10-12: Treatment of internal audit nonconformities and management review decisions
Since this is a short period, the selection of the certification body should be performed in parallel to these activities, starting at the beginning of the project.
The ISO 14001 environmental policy outlines the overall intentions and direction of how the company will relate to its effect on the environment. This statement needs to come from top management, since it is a primary directive for how every individual in the company will perform their job in relation to environmental impact. This is where you display what commitments your company will make to controlling and improving the environmental impact that you make.
In order to be compliant with the standard, the policy must be appropriate to the context of the organization, to provide framework for setting the environmental objectives, include commitment to protect the environment, fulfill legal and other requirements and continual improvement.
Requirements for Quality Manual can be found in clause 7.5.1.1. In order to be compliant with IATF 16949, the manual must include the following:
- scope of QMS (Quality Management System) and justification for exclusions,
- documented procedures or reference to them,
- organization's processes and interaction between them
- a document or matrix that shows where within the QMS the customer-specific requirements have been met.
Documented process vs procedure and product safety
Answer:
Documented process is just another way to require documented procedure. It only allows you to document the process in any way you find the most suitable and that is through flowchart, quality plan or any other way, but the essence is the same.
Clause 4.4.1.2 titled Product Safety requires a documented process (procedure) for the management of product safety. This clause defines 13 normative elements that must be included in the documented product safety process. These 13 requirements include identification of product safety characteristics, inclusion of safety characteristics with approvals in design and process FMEA’s, control of safety characteristics at the point of manufacturer with documentation in control plans with specific reaction plans, and defined responsibilities for product safety management including the definition of an escalation process and flow of information, inc luding top management, and customer notification. Additionally, those personnel involved in product safety related processes will have specific training.
Audit observation
(Hello Dejan, I have a doubt, in recent audit we were made the observation that we have to document a data encryption policy, which is described according to the type of information, status (in transit, storage, moving) and according to their type of storage (servers, computer equipment, etc.), if they require the applications of cryptographic controls, and reviewing the document of the policy of the use of cryptographic controls nothing comes of it, thanks for your support.)
Answer: By the description you gave to us, the informatio n required by the audit can be found in the template "Information Classification policy", which is referenced in the "Policy on the Use of Cryptographic Controls" (on section 3.1). Both documents are part of the ES ISO 27001 Documentation Toolkit you bought. You can find these templates in the following folders:
- Information Classification policy : folder 08 Annex A, sub-folder A.8 Asset management
- Policy on the Use of Cryptographic Controls : 08 Annex A, sub-folder A.10 Cryptography
In the Information Classification policy template, the information about type of information, status and type of storage can be found in the table on section 3.4 - Handling classified information. E.g.: "the document must be stored in encrypted form", and "when files are exchanged..., they must be encrypted"
Thunderstroke?!?
Yes, a thunderstroke is only another way by which a lightning is know.