The transition process is the same for both standards. First, you need to conduct GAP analysis to determine to what extent your existing system is compliant with new requirements of the standards. Once you have this information, you can create a project plan with defined activities, responsibilities, resources and deadlines for the transition to new version of the standards.
At the moment we do not see a practical way to combine risk assessment according to ISO 27001 and ISO 9001 - the methodologies are different, types of risks are quite different, and also the treatment is different. So we think it is better to do a separate risk assessment for ISMS and for QMS.
However, risk assessment in ISO 9001 is quite a new topic, and we're watching closely how the best practice will develop - if some methodology appears that will cover both standards, we will certainly recommend it.
Respuesta:
Si tu pregunta es sobre entidades certificadoras que puedan certificar tu organización en ISO 27001, existen muchas empresas en Perú ofreciendo este servicio, y es muy fácil encontrarlas (quizás a través de la entidad local INDECOPI sea más sencillo).
En cualquier caso, aquí lo importante es seleccionar la mejor entidad certificadora para tu organzación, y para ello, debes tener en consideración algunos puntos como por ejemplo la reputación, acreditación, especialización, experiencia, etc. Este artículo te puede resultar interesante “How to choose a certification body” : https://advisera.com/blog/2021/01/11/how-to-choose-an-iso-certification-body/
Answer:
Some certification bodies requires you to check all security controls during the first internal audit, so our recommendation is that you review all the security controls during the initial internal audit.
There is no global accepted way, but you can distribute the 114 controls (133 control was in the previous version of the standard, not in the current) in the way that you want. For example, maybe you can review 1/3 of security controls each year.
Answer:
ISO 27001 is not specifically developed for health organizations, but there is also another ISO standard that can help you: ISO 27799.
So, you can implement an Information Security Management System based on ISO 27001, and complement it with the ISO 27799, which basically is a guide of best practices about security controls related to health organizations.
From my point of view, these standard are the best option to protect information in health organizations.
Its a relative question, depending upon if it has its own data on this cloud service it uses, because:
- When you talk about your own data on the cloud service you use, you are the PII principal. You define by your own how the data can be used.
- When you deal with your customer data on the cloud service you use, you are the PII controller. You receive personal data from customers (the PII principals) and use a third party (the PII processor) to perform operations previously agreed with customers.
In case someone decides to use ISO 27001 to implement PII controls in a certifiable manner, either principal, controller and processor can be part of the certified scope, but with different purposes:
- For the PII principal, the certification purpose would be to ensure the PII principal can demand and verify actions from those who collect, store and process his/her PII
- For the PII controller and PII processor, the certification purpose would be to ensure they protect properly the PII they collect, store and process from their users
Practical example of ISO 27018 PII processor, principal and controller
Answer:
Consider the following scenario: John wants to make a bank transfer, and asks Mark, his account manager, to arrange this operation. Mark receives the bank transfer information (account number, value to be transfered and transfer date) from John and authorizes Bill, his assistant, to do the bank transfer.
- John are the PII principal. The PII required for the bank transfer, the account data, is related to him.
- Mark, the account manager, is the PII controller. He is the one, besides John, who can authorize the use of John's PII to perform the bank transfer.
- Bill, Mark's assistant, is the PII processor. It is him who uses John's PII to perform the bank transfer in accordance with Mark's instructions (value to be transfered and transfer date, sent by John).