I'm not sure what ISO principles do you mean, but I assume your thinking of ISO 9001 principles. New version of the standard has 8 principles instead of 7 in the previous version. The principles are translated into requirements of the standard and by meeting the requirements, you will apply the quality principles.
Please can you assist me with a presentation on introduction to ISO 9001:2015 Transition slide to be presented for my staff and the management entirely.
Thank you for always there for always there for me.
Answer: I assume you are referring to security practices from IT applicable to SCADA (Supervisory Control and Data Acquisition). Information Technology (IT) and Industrial Control System (ICS), which embraces SCADA, have different business requirements, implementation architectures, and security goals, which makes direct application of security solutions from IT to SCADA unpractical. But in terms of concepts and high level approaches, they are highly compatible (you can also consider for SCADA security approaches like harden the perimeter, defense in depth and securing remote access). Considering ISO standards, ISO 27002 may help with some approaches (for remote access you have control 6.2.2 - Teleworking, and 13.1.2 - Security of network services), but ISO 27019:2013, wh ich provides guiding principles based on ISO/IEC 27002 for information security management applied to process control systems used in the energy utility industry, can provide more related information regarding Industrial Control Systems in general.
ISO 9001 has no explicit requirements regarding documented information on the context or the interested parties. However, it requires organization to monitor information over these topics and most effective way of meeting these requirements is to at minimum make a List of interested parties and their requirements.
Answer: We intentionally didn't develop a special document in the toolkit for the measurement results because in most cases companies already have some system of reporting their results – e.g. they use automatic reporting from their systems (e.g. fault logs from their servers), they use their regular reports (e.g. in the reports about monthly performance they include also the security results), or in some cases they have a Balanced Scorecard system in place where they simply add the security measurement.
If you have none of these, a simple report with stated objectives, date of measurement and the measurement results will be enough – you have to decide whether this report will be sent only to the mid-level management, or to the top management during the Management review.
Considering these, the re are two documents in the documentation toolkit that will be helpful regarding the measurement and monitoring:
- In the top-level Information Security Policy, in the section 4.1 you need to specify the responsibilities for measurement and monitoring.
- Risk Treatment Plan – in the column “Method for evaluation of results” you need to specify how you will evaluate whether the implementation plan of the controls has been complied with, while in the column “Status” you need to specify whether particular control is implemented or not, which you can use for monitoring the implementation plan.
By the way, to perform the measurement first you need to develop a set of measurable objectives, and you can use our Statement of Applicability template to document the objectives for your controls (or groups of controls), and you can document the top-level objectives in your Information security policy.
Answer: First thing is that ISMS is not a certification, it is a system to protect information (ISMS stands for Information Security Management System). Considering this, currently we have two types of certifications regarding an ISMS: certification of an organization's ISMS, based on the requirements of ISO 27001 standard, and certification of persons who work with an ISMS as a lead auditor or lead implementer, but only the former issues a internationally recognized certification, based on courses accredited by institutions like IRCA or RABQSA. You can find detailed information about certifications for organizations and persons here: ISO 27001 certification for persons vs. organizations https://advisera.com/27001academy/iso-27001-certification/ .
In terms of competences to be successful in an ISO 27001 lead auditor or lead implementer course, more important than the years of experience is the understanding of the link between information security, technology, and business processes (e.g., someone can pass years of a professional life seeing only one aspect of IT while other professional in a couple of years can cover aspects from network infrastructure to business intelligence).
Answer: ISO 27002 shows in details recommendations and best practices for the implementation of the controls described in ISO 27001 Annex A, and its numbering sequence is the same as from the ISO 27001 Annex A (e.g., recommendations for Annex A section A.5 are on ISO 27002 section 5 and so on). So no additional mapping is required.