1. Do you have a list of threats and vulnerabilities for cloud services?
Answer: We have some examples available in the Risk Assessment Table that comes with the ISO 27001 & ISO 27017 & ISO 27018 Cloud Documentation Toolkit, and here are some examples of threats and vulnerabilities from this document:
- Threats: changes in legal jurisdiction, customer's management interface compromising, supply chain failure, unauthorized network access, and resource exhaustion
- Vulnerabilities: weak passwords, inadequate isolation between tenants, and inadequate supervision of external suppliers
Another source I can recommend you it the white paper "The Treacherous 12 - Cloud Computing Top Threats in 2016" from the Cloud Security Alliance (CSA) at this link https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf
2. Would it be possible to talk through our list of assets and threats and vulnerabilities with you?
Answer: Sure. Included in your toolkit you have 2 web conferences with an expert + review of 5 documents you filled in. You just need to schedule a meeting with me at https://www.meetme.so/dejankosutic
Risk treatment
Answer: No. Risk owners are persons from the organization that are responsible for the risks. What can happen is that the risk treatment can be transferred to a 3rd party, but the ultimate responsibility for the risk still is with the organization.
Answer: The establishment of information security rules for interns must follow the local laws, regulations and other legal requirements applicable. On top of that, you can set any security rules for interns that reflect the risks related to their work.
This article will provide you further explanation about identification of requirements:
- How to identify ISMS requirements of interested parties in ISO 27001 https://advis era.com/27001academy/blog/2017/02/06/how-to-identify-isms-requirements-of-interested-parties-in-iso-27001/
Additionally, in the video tutorials that came with your toolkit, you can see examples of how to fill out all the data for Risk assessment and Risk treatment.
Data classification and labelling
Answer: Data classification and labelling are ISO 27001 controls applied to protect information (controls A.8.2.1 and A.8.2.2 respectively). Information classification is used to segregate information according to their value to the organization and to define which type of controls should be applied to protect its confidentiality, integrity and availability during their life cycle (e.g., information with high classification may be gathered only by a certain people, and must be recorded only with electronic media). Labelling is used to allow people to identify the classification of an information, so they can handle them according to the specified rules.
Answer: Yes, they basically have the same meaning (people or organizations that affect or can be affected by the Information Security Management System).
Answer:
To start with the ISO 20000 implementation, you can follow steps presented in the document:
"ISO 20000 implementation diagram" https://info.advisera.com/20000academy/free-download/iso-20000-implementation-diagram
which is a diagram that shows the ISO 20000 implementation process, from the initiation of the project all the way to the certification.
Additionally, you can use "Project Plan for Implementation of the Service Management System according to ISO/IEC 20000-1" https://info.advisera.com/20000academy/free-download/project-plan-for-implementation-of-the-service-management-system-according-to-iso-iec-20000-1 which will enable you to keep oversight and maintain control. This includes milestones, roles and re sponsibilities…etc. Use this document to structure your ISO 20000 implementation project.
Additionally, follow the folder structure in our documentation toolkit, it will also help you keep progress and control.
Performing Risk Assessment
Answer: The first thing you should do is write your risk assessment methodology, so you can have in hand all the rules, considerations and steps regarding how to identify, analyse, and evaluate the risk. After all these items are properly documented you can proceed with the assessment itself (and be sure that people will ask you about these things during the assessment).
Considering the number of people, maybe it would be better to divide them in smaller groups (at most 20 people per facilitator), grouping them by process performed (e.g., accounts receivable, accounts payable, etc.), or by offices (Assuming that this number of people do not stay at the same room), or any other criteria you can use to divide them. Try to make cycles considering the threats and vulnerabilities f or a specific asset before going to another asset. Also consider to take with you checklists to help you identify risks, and paper to take notes of all information.
Answer: The references to clauses of ISO 27001, or any other references like laws or regulations, can be included in the section two of your templates (Reference document). As for the source of the references you consider relevant to include, you should verify the content of the document "List of Legal, Regulatory, Contractual, and Other Requirements".
In the video tutorials that came with your toolkit, you can see examples of how to fill out the details of your policies and procedures.