Answer: Yes, they basically have the same meaning (people or organizations that affect or can be affected by the Information Security Management System).
Answer:
To start with the ISO 20000 implementation, you can follow steps presented in the document:
"ISO 20000 implementation diagram" https://info.advisera.com/20000academy/free-download/iso-20000-implementation-diagram
which is a diagram that shows the ISO 20000 implementation process, from the initiation of the project all the way to the certification.
Additionally, you can use "Project Plan for Implementation of the Service Management System according to ISO/IEC 20000-1" https://info.advisera.com/20000academy/free-download/project-plan-for-implementation-of-the-service-management-system-according-to-iso-iec-20000-1 which will enable you to keep oversight and maintain control. This includes milestones, roles and re sponsibilities…etc. Use this document to structure your ISO 20000 implementation project.
Additionally, follow the folder structure in our documentation toolkit, it will also help you keep progress and control.
Performing Risk Assessment
Answer: The first thing you should do is write your risk assessment methodology, so you can have in hand all the rules, considerations and steps regarding how to identify, analyse, and evaluate the risk. After all these items are properly documented you can proceed with the assessment itself (and be sure that people will ask you about these things during the assessment).
Considering the number of people, maybe it would be better to divide them in smaller groups (at most 20 people per facilitator), grouping them by process performed (e.g., accounts receivable, accounts payable, etc.), or by offices (Assuming that this number of people do not stay at the same room), or any other criteria you can use to divide them. Try to make cycles considering the threats and vulnerabilities f or a specific asset before going to another asset. Also consider to take with you checklists to help you identify risks, and paper to take notes of all information.
Answer: The references to clauses of ISO 27001, or any other references like laws or regulations, can be included in the section two of your templates (Reference document). As for the source of the references you consider relevant to include, you should verify the content of the document "List of Legal, Regulatory, Contractual, and Other Requirements".
In the video tutorials that came with your toolkit, you can see examples of how to fill out the details of your policies and procedures.
Organizational controls
Answer: Defining and documenting policies, or procedures, are considered organizational controls because they involve the establishment of behaviours, either in terms of rules, lik e policies, or in terms of activities to be performed, like procedures.
Additionally, I suggest you to take a look at Conformio, our online ISO tool which have many resources to help you implement and manage your ISO 27001 Information Security Management System, including a list of task about what should be considered in the implementation (we have a free plan includes access for 10 users). You can access Conformio at this link https://advisera.com/conformio/
Procedures vs processes
Answer:
The process approach is required by ISO 14001 and it is demonstrated by applying requirements of the standard to appropriate processes. For example, clause 8.1 Operational controls, contains specific requirements for design and development and purchasing among other, more general, requirements for operational control. But, it doesn't mean that you need to create a process model or to document process procedures. If you implement only ISO 14001, you will need to document only operational controls for the processes and that only to the level you determine as necessary.
The ISO 14001 standard requires process-based approach, but it doesn't require organization to describe its processes and write the procedures for them, that is partially a requirement of ISO 9001. In ISO 14001 you demonstrate to process approach by applying the requirements of the standard on your processes. For example, identification and evaluation of environmental aspects should be done process by process and activity by activity, and later when the significant aspects are determined, you will apply the operational controls to appropriate processes, e.g. in sales, design and development,purchasing, production, etc.