By implementing ISO standard, I assume you mean ISO 9001, but the implementation process wouldn't differ too much from standard to standard, only the different requirements would be implemented.
Assuming that you already have support from the top management, the best way to start the implementation process is by conducting GAP analysis to determine to what extent your organization is already compliant with the standard and what needs to be done to achieve full compliance with the standard. Once you determine the gaps, you can develop project plan for the implementation defining what needs to be done, who will do it, what resources are needed and what are the deadlines.
Then you should start implementing requirements of the standard and the implementation process is consisted of developing documents, updating and establishing processes to meet all applicable requireme nts of the standard. When the implementation project is over, you should conduct internal audit and management review to ensure that your Quality Management System is compliant with ISO 9001. Finally, you can hire certification body to conduct the audit and issue your company the certificate.
Answer: ISO 27001 books are a good support to understand the concepts and find details about how implement the standards requirements, but these are not substitute for the standard, that you should also consider to buy (the link for buying the standard is https://www.iso.org/isoiec-27001-information-security.html).
Is there any sample threat and vulnerabilities database that can be used for contractual agreement, outsourcing, SLA and regulatory requirement.
Answer: Our Risk Treatment Plan does not have drop-down menu for threats and vulnerabilities because this is part of the risk assessment and is covered in the Risk Assessment Table. As our video tutorial shows, you should simply copy the unacceptable risks (with all the assets, threats and vulnerabilities) from the Risk Assessment Table and paste them into the Risk Treatment Table.
In the Risk Assessment Table you'll find a list of of threats and vulnerabilities related to outsourcing, SLAs and regulatory requirements: e.g., breach of contractual relations, breach of legislation, unauthorized access to facilities allowed and unclearly defined rules for access control.
Material for information protection
1. Assess and provide guidance on how to handle classification of data or information
2. Review and provide guidance in terms of the approach that should be followed to determine the various levels of classification.
3. Review the impact analysis process for when data is lost or when confidentiality of the information is compromised and provide recommendations to improve the process.
Difference between sites and Certificates in ISO SURVEY
Answer: ISO 27001 certificates may be defined in terms of processes/services, organizational units or locations (the ISMS scope), and a single certification may cover multiple locations, also called sites. For example, you can have an organization's HQ and its filial covered by a single ISO 27001 certificate, resulting in one certification and two sites.
I have to admit that your templates/documentations were so handy and helped me well, however I would like to know if what I have already, is up to date and would help me implement the BCMS, or do you have any updated version?
Answer: The toolkit available in May 2015 at Advisera was already compliant with version 2013 of ISO 27001 and it is perfectly integrable with ISO 22301, which will make it easier for you to implement a BCMS ISO 22301 compliant.
Answer: In fact BIA and Risk assessment are two different processes with different purposes that can't be merged, although they exchange information between them. They main question between practitioners is in which sequence they should be performed. I particularly follow the thought that risk assessment should be performed before the BIA and the BIA questionnaire, because this way both BIA and questionnaire can make use of the results of risk assessment to help improve the reliability of their results (by identifying the risks you’re most exposed you can focus on consequences of those incidents and the main assets that are under risk).
Does it have to be in the contract, or in the customer salable drawing, or somewhere? Or is just "common sense"?
In my company we design and manufacture several automotive components, for example, harnesses and stereos. I would assume that the stereo is not "product safety", but the harness?
I looked for the definition of the term and couldn't not find anything.
regards.
Answer:
There is no universal rules for safety of all products. Safety requirements for some products are defined by legislation or CE mark, or by customer requirements. It is not common to define requirement for product safety in contracts, simply because such requirements are implied. Or, it can be part of customer requirements as requirement for raw materials to be used or features of the product to be demonstrated.
In you case the product safety can be demonstrated by providing attestation of safety of raw materials or by testing durability of t he product (harness) on strain or other product features. Basically, you need to demonstrate that your product is safe for use and fit for its purpose and, maybe, you can consult your customer on how to demonstrate this.
I would start with gap analysis to determine what needs to be done to achieve full compliance with the standards and then develop project plan for implementation. When developing a pr oject plan, you should assign roles and responsibilities within the project to as many people as possible to decrease the time and also to ensure that the most relevant people are involved in implementing requirements of the standard.