Documenting the EMS is only one of the steps in the implementation or transition. The documents cannot be created without process based approach. For example, when you conduct identification and evaluation of environmental aspects, you need to examine all processes and activities to determine where the significant environmental aspects emerge and to define operational controls that will be applied in appropriate activities and processes to decrease or prevent the impact on the environment.
Once the documents are developed, they need to be applied in the organization. For example, document management must be conducted according to the procedure for document management, operational controls that are defined and documented need to be applied, etc. For more information, see: 5 tips to maintain your ISO 14001-based EMS after certification https://advisera.com/14001academy/blog/2016/01/11/5-tips-to-maintain-your-iso-14001-based-ems-after-certification/
Main objective of the EMS
Answer:
The main objectives of the environmental management system are to prevent pollution, meet compliance obligations and enhance conditions of the environment.
A systematic approach to environmental management can provide the organization with information to build success over the long term and create options for contributing to sustainable development by:
- protecting the environment by preventing or mitigating adverse environmental impacts;
- mitigating the potential adverse effect of environmental conditions on the organization;
- assisting the organization in the fulfilment of compliance obligations;
- enhancing environmental performance;
- controlling or influencing the way the organization’s products and services are designed,
manufactured, distributed, consumed and disposed by using a life cycle perspective that can
prevent environmental impacts from being unintentionally shifted elsewhere within the life cycle;
- achieving financial and operational benefits that can result from implementing environmentally
sound alternatives that strengthen the organization’s market position;
- communicating environmental information to relevant interested parties.
Question: Does this mean the competency only needs to be assessed of
Those who put together and manage the ISMS ? I.e. Me as head of Infosec and those who write or approve any policy? Or do we need to assess the competency of anyone who has to follow the policy?
Answer: You need to assess the competency of anyone who has an impact in the performance of the ISMS, i.e. those who put together and manage the ISMS and also of those who have to follow the policies.
Information security profile
Answer: Yes, in the context of the Implementation process diagram, the security profile is exactly the Statement of Applicability, which shows what controls are applicable or not and why.
Answer:
No, ITIL does not have something like statement of applicability.
Starting ISO 9001 implementation
Answer:
First, you need to get familiar with requirements of the standard and than to do a GAP analysis to determine to what extent your company is already compliant with the standard. Here you can find our free GAP analysis tool https://advisera.com/9001academy/iso-9001-gap-analysis-tool/
Quality Policy is a general document that defines what the organization aims to accomplish with its Quality Management System (QMS) and it should not contain any precise details about how some activities or processes are done. It should contain statements that provide framework for setting quality objectives, commitment to satisfy applicable requirements and commitment to continual improvement of the QMS.
Quality Assurance system will be incorporated in the policy if the policy states for example that the company strives toward providing high quality products and enhancing customer satisfaction. This statement is a framework for establishing quality assurance process that will enable company to accomplish its mission.
(I will initiate an ISO 9001: 2015 course for the implementation of certification for my company. I am also interested in knowing how to implement ISO 27001. My question is. What do you recommend me to do for these implementations? First the ISO 9001 or obtain the 2 certifications simultaneously?)
Answer: ISO 27001 and ISO 9001 have a lot of requirements in common, so it is perfectly possible to go for the two certifications simultaneously, and in fact this can bring many benefits, like decreased costs in implementation and with internal audits, but first you have to consider your organization's situation in terms of available resources, knowledge and personnel.
Answer: In terms of communication, the standard only requires that the information security policy must be communicated within the organization, and that it is available to interested parties, as appropriate. So, the organization is free to decide how to do this, and having a signed copy posted in the office is only one alternative. The organization can define the policy shall be available on the organization's web site, on banners in the corridors, to be communicated periodically in email newsletters, or that is available on the internal Document Management System. There is no mandatory way an organization should follow.
Regarding Document Management System, I suggest you to see Conformio, our ISO online tool, so you can see an example on how to make the Information Security Policy available, as well as to konw other resources that can help you implement and manage an ISO 27001 ISMS. The link to Conformio is https://advisera.com/conformio/
Risk assessment
Answer: Regardless of the target of the assessment, proper risk assessment methods have these things in common:
- they define the elements that will be under risk and need assessment (in the case of ISO 27001, these elements are information confidentiality, integrity and/or availability)
- they define how to identify risk owners (those who are responsible for risk treatment)
- they define clear criteria for risk assessment (normally by assessing the consequences and likelihood of the risk)
- they define how the risk is calculated
- they define criteria for accepting risks
2 - What are the attributes of selection of risk assessment tools and what are the best risk assessment techniques needed in such critical infrastructure especially in mitigating against an insider threat because insider threat is one of the biggest problems faced with nuclear industry today?
Answer: For attributes to select a risk assessment tool you can consider orientations of ISO 31010, the ISO standard about risk assessment techniques. This standard defines 4 requirements to evaluate a tool:
- Resources required to perform the assessment in terms of time to perform, expert knowledge, data gathering and cost
- Complexity of the problem or situation to be assessed, as well as the specific methods required to be used
- The level of uncertainty that can be accepted
- If the method can offer a quantitative result
In the second part of this question, I assume you want recommendations about risk treatment techniques. Generally speaking you can consider physical and logical segregation controls, user management practices, and physical and logical monitoring to deter, prevent and detect attempts from insiders. See this article for more information: How to handle access control according to ISO 27001 https://advisera.com/27001academy/blog/2015/07/27/how-to-handle-access-control-according-to-iso-27001/
3 - Where can I get your presentation on statement of applicability and risk treatment?