Answer:
The main difference between a normal incident and an information security incident is that the second is related to information security and can affect the confidentiality, integrity and availability of information, so for example, a virus can be an information security incident (because for example information can be disclosed), and a norm al incident can be that the printer is failing (it is not related to the information security).
Many companies define in their information security incident management procedure, what is an information security incident (virus, access problem to information, etc.). So, this can be a good recommendation for you.
FEMA (Federal Emergency Management Agency) and FISMA (Federal Information Security Management Act) are basically regulations that are applicable only in USA.
Most of cases the risk assessment methodology chosen is an asset based, because it is the most easy, and common methodologies are CRAMM, OCTAVE, MAGERIT, but as you know, you can write your own methodology.
Answer:
It is the most easy way, I mean, matching threats and vulnerabilities for each asset although if you want to reduce the work, the best recommendation is to reduce the number of assets, for example grouping similar assets with the same threats/vulnerabilities. For example: laptops (for all laptops), workstations (for all workstations), printers (for all printers), etc.
Anyway, it is not mandatory to have an asset based risk management, although is very recommendable to work with the asset based risk management, because is more easy that other methods.
Answer:
I am sorry but there is no specific ISO directly related to the knowledge sharing, although you can use ISO 27001 (related to the protection of the information), because it can help you to share information (from my point of view, the knowledge is also information).
And our online course can be also interesting for you, because we give more information about the ISO 27001 and the protection of information “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
ITIL and ISO 27001
Answer:
Length of the ISO 20000 implementation depends on many parameters, e.g.
- size of the organization
- whether you have an ITSM tool in place
- whether you have some other ISO standard in place
- level of knowledge and experience
- complexity of the services and related infrastructure, etc.
But, according to provided information, I assume that you'll need 6 months (and plus).
And, if you have ISO 27001 in place, yes you can reuse some of the parts. Please see the article which can help you: "How to implement ISO 27001 and ISO 20000 together" How to implement ISO 27001 and ISO 20000 together
And, yes, you can implement both standards at the same time.
NCR of nonconformity record is a way of documenting nonconformity that occurred in the Quality Management System. Its purpose is to describe the nonconformity and give an input for further actions regarding nonconformity. The standard does not prescribe what information NCR should include but it usually contain information about the process where the nonconformity is identified and who identified it.
CAR or corrective action record is used to document actions taken for removing nonconformity, this includes analysis of nonconformity, determining the causes, defining actions to remove the cause and providing evidence of corrective action effectiveness.
Updating internal audit checklist to ISO 9001:2015
Due to clauses have changed, I will need to change Internal Audit questions . Can you direct me or guide me ,how to create new questions for internal audits for every clause in ISO 9001:2015 .
Answer:
The clause numbers are not the only thing that changed, basically every clause and every requirements suffered at least some small change, so the internal audit checklist should be updated to reflect all these changes.
Depending on the way of how your existing checklist looks like, you will need to take ISO 9001:2015 text and identify all requirements in it and then to insert them in the checklist. A lot of existing questions in the checklist will remain but also a lot of them will need to be changed and added. You will need to exclude some of the questions, for example regarding some no longer mandatory documents, management representative, etc. and to add some new ones regarding context of the organization, risks and opportunities, etc.
All these ca n be a big effort and time-consuming, just to make a checklist. I would suggest you to take a look at free preview of our ISO 9001:2015 Internal Audit Checklist because it can really save you a lot of time and effort, you can find it on this link https://advisera.com/9001academy/documentation/internal-audit-checklist/
Answer: If I understood the question correctly, you're asking if Asset register is required - the answer is no, ISO 27001 does not require you to have such register.
ISO 27001 covers this topic under the control A.8.1.1 Inventory of assets - since this is a non-mandatory control, you can choose whether to apply it or not. The most common reasons for applying this control are the following:
a) You want to use the asset register for performing the risk assessment - see this article for details: How to write ISO 27001 risk assessment methodology https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/
b) You want to decrease some risks that you identified during the risk assessment - see this article: The basic logic of ISO 27001: How does information security work? https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
c) There is a legal or regulatory requirement for you to have such register.
Yes, it is acceptable, but you need to have a really good reason - shifting the dates without any justification will bring you trouble with the certification auditor.
How to treat suppliers that are ISO 27001 certified
My second question is that as we are a new and small company we do not have any IT department so we (personally) managed our IT equipment, will this cause us problems in our certification?
Answer: No, your size and the fact that you are managing your IT equ ipment won't cause any problems at the certification, as long as you comply with your policies and procedures.
Is it better to have a dedicated IT department or have someone who manages our IT?
Answer: I'm not sure if I understood your question correctly - if you meant whether it is better to have your own IT department or to outsource the IT function, this is primarily a business issue (what is more profitable) and a skill issue (does your IT equipment require some special skills that might not be easy to find in the market).
Or can we just put encryption / passwords / administration rights to particular systems to get round this??
Answer: Managing security is not only about encryption, passwords and administration rights - the best thing for you would be to go through this free online training to learn all that is important for security management: ISO 27001 Foundations Course https://advisera.com/training/iso-27001-foundations-course/