Answer: Unfortunately we do not have this kind of material in our toolbox, but RiskIT framework material provided by ISACA, in Appendix 2 has a high-level comparison with other risk management standards and frameworks, including ISO 27005. To download this material you only have to have a site login, you can obtain one free of charge. What I can inform you without incur in Intellectual Property Rights violation is that ISO 27005 processes (Risk analysis, identification, estimation, and evaluation) are covered by RiskIT process RE2 (Analyse Risk), but since RiskIT is a more specific framework, it has a deeper level of detail than ISO 27005.
Certification audit findings
I am confusing about that, I have seen many report samples on google but every one is different from the other. Should I submit the stage 1 report with the mention of all non-conformists and it's corrective actions or I should just submit a list of what I find whatever it was negative or positive.
Answer:
During both stages of certification audit, the auditor can find minor and major nonconformities and observations. If you found any nonconformity during the 1st stage audit, you should write them in your report, but you shouldn't write corrective actions because it is up to organization to decide what kind of corrective action will it take to address the nonconformity.
Answer: External audit phase 1 verifies if your documentation (e.g., policies and procedures) complies with ISO 27001:2013 mandatory requirements (e.g., is there an information security policy?), so you have to verify if you attend all "must" statements presented in the standard. The phase 2 looks for evidences that support the procedures are implemented and achieving the expected results. The main checklists you have are the Statement of Applicability, where all the controls considered relevant are listed, and the Risk Treatment Plan, which lists how they are implemented. From there you will find which documents and records you have to present to the auditor.
I mean company just develop and deploy our software in cloud and give access to our different customers. We are NOT a cloud hosting company like xxx or xxx.
Answer: As you said, you provide the SaaS service to your customers, it does not matter if you use a third party infrastructure to do that. If their contractual relationship is with you, any problem your customers have caused by the cloud service provider you selected, they will charge from you. So, I would recommend you to implement both ISO 27017 and ISO 27018, so you have means to ensure that cloud service provider you use to provide your SaaS service properly protects both its cloud infrastructure and your customers data.
Answer: An interesting question. In Article 4, definitions, in any moment the regulation mentions the type of media that contains the information. The definitions covers what is done with the information. So, in a broader sense, EU GDPR is applicable to physical data. You may note that when data is not on transit it is stored in some physical place, e.g., a server or a back up media, that must be protected properly.
2 - What eugdpr saya about channels like cloud, mobile??
Answer: EU GDPR does not make reference to specific technologies (when they are referred, the term used is only technology or technologies). Thus, for EU GDPR, it does not matter where information travels or by what means it is processed. If you deal with personal information from EU citizens, the EU GDPR applies.
This article will provide you further explanation about EU GDPR:
- What is the EU GDPR and why is it applicable to the whole world? https://advisera.com/articles/what-is-the-eu-gdpr-and-why-is-it-applicable-to-the-whole-world/
- Does ISO 27001 implementation satisfy EU GDPR requirements? https://advisera.com/27001academy/blog/2016/10/17/does-iso-27001-implementation-satisfy-eu-gdpr-requirements/
Management Representative in ISO 27001:2013
There is no universal rule about which role should be in a higher position (e.g., both can answer to top management, CISO may answer to MR, both can answer to other different roles in the organization, etc.), so you have to evaluate your organizational context to define which case is more adequate to your organization.
Regarding policies and procedures elaboration, both roles are required to have competency in elaborating policies and procedures, with CISO specialized in information security requirements and the MR specialized in management system requirements (in an ISMS with no MR, the CISO has to cover both information security and management system requirements).
As for documentation approval, generally policies and procedures which have overall impact on the organization are approved by top management (e.g., quality policy, information security policy, procedure for control of documents and records, etc.), specific information security related policies and procedures are approved by CISO, and other policies and procedures are approved by the MR.
The standard requires the documents to be available on place of application, so the approved versions of procedures, work instructions and records must be available where they are needed. Original or approved version of document can be kept in the library but the copies must be distributed to the place of application.
This requirement raises many other issues as availability of right version of the documents, withdrawal, update and distribution of the documents and records. For that reason, the standard defines all these activities and for every document there should be information about the valid version as well as distribution list so when the document is updated the company knows where are the documents that need to be withdrawn and replaced with new ones.
ISO 27001 Internal auditor course vs Lead auditor course
Answer: Certainly, if you finish the Internal auditor course, it will be easier for your to finish the Lead auditor course because Internal auditor course is a "mini" version of Lead auditor course. Other than this I don't think you need any other preparation.
The standard requires organizations to determine knowledge necessary for operating processes and achieving conformity of products and services. This includes necessary work instructions and other documents needed for operating processes but also the competence level of employees. Another requirement is to make the knowledge available where necessary and this can be addressed by providing those work instruction on place of application.
Since the requirement regarding this clause are very vague, the auditor cannot require documented procedure or anything of that sort, the company itself can decide how the knowledge will be defined, maintained and updated. The best the auditor can do is to do an interview with Quality Manager and talk about the clause and how it is met.