Answer: There is indeed similarity between BC strategy and BC plan because the BC plan is a detailing of BC strategy when specific situations are considered (you can see this difference in the section one of both documents - Purpose, scope and users). For example, in BC strategy you may identify the type of database to be available for all BC plans, and in each BC plan you will detail where this database is located (e.g., server, physical address, etc.) for each business unit or site that specific BC plan covers.
So, you will find this type of duplication in every situation where you need to define high level guidelines and these must be implemented in different ways for each interested party. For example, in the BC strategy you define the general RTO (Recovery Time Objective) and RPO (Recovery Point Objective) to be achieved by the organization, and each business plan define its own RTO and RPO considering its own scenario (e.g., IT systems, financial processes, etc.) and the strategic RTO and RPO to be achieved.
Regarding if you need to fill both documents, the main criteria to consider this is the number of different conditions and BC plans you have. If you have many plans and each one of them has different conditions, it is better you have a BC strategy document to define high level conditions.
By the way, in the video tutorials that came with your toolkit, you will find information about BC strategy and how to fill out BC plans.
Audit demanded by client
We own and license a web service that stores information and displays it to users, through a front end website. One of our existing clients has just licensed it and they have provided an extensive network and security questionnaire and one of the requirements is to provide a copy of the security audit. Since we never factored this in to our license, I need to understand what the best approach to this may be, what do I need, and who I can hire to perform the task.
Answer: The first thing you should identify is which level of independence is required by the client for this security audit, since there is three possible levels: first-party audit (when your organization audits itself), second-party audit (when the client, or another organization accepted by it, audits your organization), and third-party audit (when an organization independent from your organization and from the client audits your organization).
If a first-party audit is sufficient for the client, and you al ready have an internal audit process running, you should include in your internal audit program an audit covering this web service considering the network and security questionnaire sent by the client. If you do not have an internal audit process, please consider the answer for third-party audit, presented at the end of this answer. This is the cheapest audit process, but the low degree of independence may not be sufficient for some organizations.
If a second-party audit is required, you should contact the client to identify who will be responsible for the audit (the client itself or another accepted organization), and define with this responsible the arrangements for the audit. Depending upon who will pay for the audit, this kind of audit may become onerous for you or your client, specially for you if you have many clients demanding this type of audit and each one requires different organization to perform it. In such cases, aiming for a third-party audit may prove a better option.
If a third-party audit is required, the best course of action is to consider the certification of a management system, in this case certification on ISO 27001, related to information security, since certification bodies, those who issue a certification, are accepted as highly trusted independent parties to ensure security is being properly managed by an organization.
As complement for the first part of this answer, implementing internal audit process is mandatory for certification, so if you get certified, besides being capable to provide results of a third-party audit, you also ensure you are capable to perform a first-party audit if demanded by a client.
In cases where a second-party audit is required, you can offer your certification's, or maintenance's, audit report as an option for your client.
This article will provide you further explanation about certification (third-party audit):
Thank you very much for your help, really appreciate it.
Filling asset inventory
But in the Inventory of Assets table we mention each Asset just once (as I understand). So, what level of Consequence to specify in such cases?
Answer: When an asset has different levels of consequence identified in the Risk Assessment table, you should consider for the entry in the Inventory of Assets the highest value identified as a consequence in the Risk Assessment table. Considering the "Laptop" asset example (with consequence values of 1, 1, and 2), you should en try the consequence value of 2 in the Inventory of assets. This way your Inventory of Assets will always present the highest consequence an asset have to your organization.
Using Conformio for ISO 27002
You can use Conformio for any ISO standard, because the following Conformio features are designed to be compliant with any ISO system: document management, project management (through Tasks feature), corrective actions, and nonconformities. In addition to that, Conformio has module for incident management, which can be used specifically for ISO 27001/ISO 27002.
In other words, you'll find Conformio very useful for ISO 27002 implementation and maintenance.
Context of the organization and risks in ISO 14001
Answer:
Internal and external issues represents any kind of impact on your environmental management system. For example, internal issues are company's organizational structure, culture, processes, type of the technology or raw materials used in the production or service delivery process, etc. External issues are the ones coming from outside the company, e.g. environmental conditions in the region where your company is, environmental legislation, requirements of the local community, environmentalists, etc. For more information about context of the organization, see: Determining the context of the organization in ISO 14001 https://advisera.com/14001academy/knowledgebase/determining-the-context-of-the-organization-in-iso-14001/
Regarding clause 6.1.1, ISO 14001 requires organization to determine risks and opportunities related to environmental aspects, compliance obligations and internal and external issues. Such risks and opportunities need to be identified on global level of the organization which means that the top management must be included in the process. The standard does not require organizations to use some methodology so the most simple way to address this clause is to arrange a brainstorming session involving all relevant people in the company and discuss risks and opportunities and the risks and opportunities identified need to be documented and some actions to address them should be proposed. For more information, see: Risks and opportunities in ISO 14001:2015 – What they are and why they are important https://advisera.com/14001academy/blog/2016/03/07/risks-and-opportunities-in-iso-140012015-what-they-are-and-why-they-are-important/
Assets to consider in an inventory
Great, this helps a lot!
Change Management and Configuration Management
Answer:
Configuration Items (CIs) that are within the scope of the plan are used by the Change Management process to evaluate and authorize changes. The Change Management process authorizes all changes on CIs which are within the scope of the SACM Plan.
So, while planning how to populate CMBD (which is in jurisdiction of Configuration management, or Service Asset and Configuration Management) you need to think about scope ("width" and "depth" of the implementation i.e. affected CI's), location, naming nomenclature, tools..etc. Once you define that i.e. have your plan ready, you can start the implementation. In scope of the planning you need to consider how (i.e. who, in which tool and with what authority) people involved in change Management will use information stored in CMDB.