Answer:
ISO 27001 is the lead standard about the information security, and most of laws and regulations about information security of all the world are based on this standard.
COBIT is focused on IT governance, which also includes information security, but ISO 27001 is more specific.
Regarding COSO, this standard is also for different things: internal control, event identification, risk assessment, etc. So, again, this standard is not specifically developed for information security.
So, if you want to establish an Information Security Management System to protect your information, the best option, from my point of view, if the ISO 27001.
Answer:
There is an ISO standard specifically related to the information security control for cloud services (or cloud computing environments): ISO 27017.
This standard is a code of best practices, but there are some certification bodies that offer a certification if the company comply with a series of requirements based on the standard.
Answer:
I am not sure if I have understood your question, but if you want to obtain the support from the management to implement an Information Security Management System in your organization (based on ISO 27001),it is very important to show them the benefits of the implementation of the standard, which basically are: compliance, marketing edge, lowering the expenses, and putting your business in order. This article can be interesting for you “Four key benefits of ISO 27001 implementation” : https://advisera.com/27001academy/knowledgebase/four-key-benefits-of-iso-27001-implementation/
Answer:
To comply with the clause 9.1 basically you need to perform a monitoring, measurement, analysis and evaluation of your ISMS. How can you do this? A way is using metrics. An example:
If an objective is to reduce backups failures (10%), you can perform a periodic measurements (for example each week) with this formula: Failure backups / Total backups. And you can see how is the evolution of the measurements.
Another example can be to reduce the number of unauthorized access to a critical server (15%), so you can use this formula : Unauthorized access / Total access. And see the evolution performing periodic measurements.
Answer: ISO 27001 does not require you to separate password policies for different types of users/employees - therefore, you can create a single document for this purpose. In bigger and very complex companies it might make sense to have separate policies for this purpose.
Also, if there are 10 sites in the scope of the certification audit, so at the time of surveillance audit (how can auditor do sampling of site i.e. what to include and what not).
Answer: If you are asking about the surveillance visit that is performed by the certification auditor, then this is the decision made by the certification auditor, not the company that has the certificate. They make such decision based on the importance of particular sites, and based on the fact where did they find most of the nonconformities during the previous visit.
When determining what parts of your company should be a part of your quality management system, you need to look first into the reasons for implementing the standard. Is is the requirement of the customer, is it a condition for applying to tenders or is it a requirement of the company itself? The answer to this question will shape the scope of your QMS.
If it is a requirement of the customer and it only refers to a product produced on only of of your production lines, you might decide to include in the scope only that production line and leave others from the scope, the same can be applied in case of tenders as well. If it is a requirement of the company itself, it is most common to include the entire company in the scope.
Regardless of the reason for implementing ISO 9001, you might choose to implement it in only several processes in the company, on one ore more location where your company has branches or to cover one or more production lines and yet not to cover entire organization.
Reasons for limiting the scope to only a part of the company can be to decrease the price of implementation and certification of the system or to cut the time of implementation.
2. Who is responsible to raise a Request for Change (RfC) if changes to the plan are needed?
Answer:
1. Activation of the plan – that could be improvement manager or someone who detected improvement opportunity. If you have central place where all improvement initiatives (or, request) are communicated, than improvement manager would be one to activate the plan. Deactivation – that should be done “centralized” so improvement manager would be responsible for deactivation.
2. Thant could be anyone involved in the improvement initiative (either someone who started initiative, working on it or improvement manager as central point for coordination of all improvement initiatives)
For an example: Failure of a CNC machine is the identified risk. But the CNC doesn't failed yet. But there is a chance
In this case , we identified some mitigation plan like
a) backup another CNC machine
b) Immediate call for technician to service
c) Preventive maintenance shall perform for the CNC machine at scheduled intervals.
So in this case, the risk is not happened yet , So how we can measure the effectiveness of the risk control
Answer:
If I have understood well your question, you want to monitor the effectiveness of security controls, and for this basically you can establish metrics for each control. For example, if you have the control A.12.3.1 Information backup for a particular risk, you can define this metric:
- Effectiveness of bac kup control = Backup fails / Total backup
In your case, the metric could be:
- Effectiveness of the CNC machine backup = Preventive maintenance performed / Preventive maintenance scheduled (in a year, or in a month, etc.)
For each metric, you can also define some parameters like frequency for monitor the effectiveness (for example annually), “objective value” (in your case for example 100%), etc.