ISO 9001 has no explicit requirements regarding documented information on the context or the interested parties. However, it requires organization to monitor information over these topics and most effective way of meeting these requirements is to at minimum make a List of interested parties and their requirements.
Answer: We intentionally didn't develop a special document in the toolkit for the measurement results because in most cases companies already have some system of reporting their results – e.g. they use automatic reporting from their systems (e.g. fault logs from their servers), they use their regular reports (e.g. in the reports about monthly performance they include also the security results), or in some cases they have a Balanced Scorecard system in place where they simply add the security measurement.
If you have none of these, a simple report with stated objectives, date of measurement and the measurement results will be enough – you have to decide whether this report will be sent only to the mid-level management, or to the top management during the Management review.
Considering these, the re are two documents in the documentation toolkit that will be helpful regarding the measurement and monitoring:
- In the top-level Information Security Policy, in the section 4.1 you need to specify the responsibilities for measurement and monitoring.
- Risk Treatment Plan – in the column “Method for evaluation of results” you need to specify how you will evaluate whether the implementation plan of the controls has been complied with, while in the column “Status” you need to specify whether particular control is implemented or not, which you can use for monitoring the implementation plan.
By the way, to perform the measurement first you need to develop a set of measurable objectives, and you can use our Statement of Applicability template to document the objectives for your controls (or groups of controls), and you can document the top-level objectives in your Information security policy.
Answer: First thing is that ISMS is not a certification, it is a system to protect information (ISMS stands for Information Security Management System). Considering this, currently we have two types of certifications regarding an ISMS: certification of an organization's ISMS, based on the requirements of ISO 27001 standard, and certification of persons who work with an ISMS as a lead auditor or lead implementer, but only the former issues a internationally recognized certification, based on courses accredited by institutions like IRCA or RABQSA. You can find detailed information about certifications for organizations and persons here: ISO 27001 certification for persons vs. organizations https://advisera.com/27001academy/iso-27001-certification/ .
In terms of competences to be successful in an ISO 27001 lead auditor or lead implementer course, more important than the years of experience is the understanding of the link between information security, technology, and business processes (e.g., someone can pass years of a professional life seeing only one aspect of IT while other professional in a couple of years can cover aspects from network infrastructure to business intelligence).
Answer: ISO 27002 shows in details recommendations and best practices for the implementation of the controls described in ISO 27001 Annex A, and its numbering sequence is the same as from the ISO 27001 Annex A (e.g., recommendations for Annex A section A.5 are on ISO 27002 section 5 and so on). So no additional mapping is required.
Answer: The answer to this question depends fundamentally of the type of your business and the needs and expectations of you interested parties. For example, a research and development company will have different critical information assets than a bank. In this case I suggest you first identify which requirements your information security management system needs to fulfil, because those requirements will tell you which are the most critical assets you should focus on.
2 - Is it true that: the more controls in the Statement of Applicability are applicable, the easier it is to get certified? Or are just all mandatory controls enough? (I know it depends on the risk assessment table, but still)
Answer: The truth is just the oppo site, the less controls you need, the easier is to get certified, because you will have less work to do implementing and managing them. And there is no such thing as "mandatory controls" required by the standard. Documents from Annex A are mandatory only if there are risks which would require their implementation, and this decision is up to the organization. Basically, the justifications in a Statement of Applicability for implementing controls refers to (1) risks, (2) requirements of interested parties and (3) other logic considered by your organization.
3 - Any other parts of the project we should put extra focus on?
Answer: Definitely awareness and training should be on your list, because if people in the organization do not adopt the information security culture, you can have the best procedures and technical controls and still the organization's information won't be safe.
Answer: ISO 28001 deals with supplier security covering more aspects than ISO 27k series, which covers most Information and Communication Technologies issues. You can map ISO 28001 practices to ISO 27002 controls from section A.15 - Supplier relationships, but I suggest you to take a look at ISO 27036 ( Information security for supplier relationships), which has more detailed information regarding information security with suppliers. You can find this standard on this link: https://www.iso.org/obp/ui/#iso:std:iso-iec:27036:-1:ed-1:v1:en
Regarding the ISO 28001 Annexes, documents from Annex A and B (security assessment and treatment) can be mapped to sections 6.1 (Actions to address risks and opportunities), 8 (Operation), 9 (Performance evaluation) and 10 (Improvement) from ISO 27001.
Unfortunately we do not have a direct mapping document available.
- This is a great domain to be aware of in terms of cyber security
- It is able to develop specific communication skills so to identify risks in a company
- It is establishing a CIA mindset whenever positioning a specific technology
I wonder what else can be justified so the management to support the certification process and related costs
Answer: All benefits you mentioned are related to the auditor itself. To get the buy in from management to support the certification process and related costs, you should explain to them that a certified auditor is more capable to identify both non conformities and opportunities for improvement (which are much better) during internal audits, and that knowledge makes it easier to talk with the certi fication auditor, avoiding misunderstandings and getting useful tips to improve the information security management system.