Competencies for ISO 27001 implementation and management
Answer: ISO 27001 requires that people with roles and responsibilities regarding information security have competency on the activities to be performed, in terms of education, experience or skills. So, you do not have to have certain certificates if you can show your competence by other means like the registry of the time you've been performing these activities.
Regarding the participation of the consultant, this is not mandatory, and if you are confident that you can handle some activities by yourself you do not need to use a consultant for them (instead of a full time work, you can use him only as a mentor to guide or review your work). For cases like this we also suggest people to take a look at the free demo of our ISO 27001 Documentation Toolkit at this link: https://advisera.com/27001academy/iso-27001-documentation-toolkit/
This toolkit is made for companies that implement the standard for the first time and consider they do not need a consultant for the whole project. You only have to scroll down the scree a little to access the free demo tab.
3 - Does the company that has ISO 27001 certification must have defined ISO or CISO function? Does that position require certain mandatory certificate?
Answer:By the standard there is no mandatory requirement to designate a CISO function, but in operational terms it is a good idea to consider one. Again, there is no need for a certificate if you can show some other form of evidence that this person has the required competence (e.g., a registry of the years working in this function)
There are reference to clause 5 of the standard in the Quality Manual and there is a Quality Policy as a document explicitly required by the standard. The rest of the requirements from clause 5 do not require any documented information and therefore they are not documented within the toolkit.
Answer: In fact the questions is in the other way around, is IBM QRadar SIEM (a technical implementation) compatible with ISO 27002 (a guidance of best practices)?
-Provides real-time visibility to the entire IT infrastructure to threat detection and prioritization
- Reduces and prioritizes alerts to focus security analyst investigations on an actionable list of suspected, high probability incidents
- Enables more effective threat management while producing detailed data access and user activity reports
- Produces detailed data access and user activity reports to help manage compliance
- Offers multi-tenancy and a master console to help managed service providers provide security intelligence solutions in a cost-effective manner
The standard does not prescribe how the work instruction should be structured neither it prohibits to use different structure for different work instructions or even procedures. Instead of focusing on the form, the standard allows organizations to use any style or format that they find the most appropriate and effective.
IATF 16949 implementation project suffers from the same risks as any other project, it can stretch for too long, it can go over budget and so on. Such risks can be mitigated by being identified at the beginning on the project and by taking appropriate actions.
As far as risk assessment requirements goes, there are no significant changes between the old and new version of the standard. FMEA is still a must and as far as risks and opportunities are concerned, there are no extension of requirements that ISO 9001:2015 has. For more information, see: How to address risks and opportunities in ISO 9001 https://advisera.com/9001academy/blog/2016/06/21/how-to-address-risks-and-opportunities-in-iso-9001/
Evaluation of outsource partners
Answer:
The company needs to evaluate all its external providers of processes, products and services and it can be done in different ways. Due to difference of nature of relationships with customers and suppliers, the company will have to use different methods. Survey wouldn't be appropriate methodology but rather the company should define crtiria that are important for it and evaluate the suppliers against those criteria. Criteria can be quality of products and services, price, packaging, etc.
In theory, the organization doesn't have to have any training records. For example, if it has only low skilled workers that do not need any training, then the company can have a certificate without any training record. The standard requires organization to retain appropriate documented information as evidence of competence. This means that the company needs to have at least some evidence of employee's competence such as college degrees, high school diplomas, licences, etc. but they do not have to have training records if they determined that no training is needed. There is no requirement for employees to attend training on the polic y or the standard itself, but if they attended any training, there should be a record about it.
Please let me know if this is sufficient for the ISO 27001 audit.
Answer: Yes. If your risk evaluation, considering your acceptance criteria, has defined that only 5 risks are considered unacceptable, you can have treatment plans only for these 5 risks.
In the video tutorials that came with your toolkit, you have access to a video about Risk Assessment Methodology that can provide you more information about risk acceptance criteria.