Answer:
Simply you need to include in your asset register those assets that you can manage, so if you have a server and this server has software that you can manage (Virtual Machines, web server, email server, etc), you can include this information in your asset register.
Regarding the services provided by other companies (internet connection, housing, etc) you can see as service, and you are right, you can implement security controls related to suppliers (section A.15 Supplier relationships). Anyway, remember that the implementation of secu rity controls need to be performed after the results of the risk analysis.
Answer:
If I have understood your question well, you want to implement the control 11.2.3 cabling security through documenting and demonstrating the physical access controls that are in place, and from my point of view it is enough, although it can be better if you perform periodical physical inspections to review if everything is according to the documented procedures (this review will be also performed by auditors).
And of course, our online course can be also very interesting for you because we give more information about the security controls of the standard and about the implementation of ISO 27001 “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Where to start with ISO 9001 implementation
Answer:
First step is to conduct gap analysis to determine to what extent your company is already compliant with ISO 9001, once you determine what needs to be done to achieve full compliance, you should create project plan for the implementation (Here you can find free Project Plan for ISO 9001 implementation https://advisera.com/9001academy/free-downloads//).
Next step is to create all necessary documentation and implement changes in existing processes and establish new ones. Then you need to conduct internal audit and management review to ensure your QMS (Quality Management System) is compliant with the standard.
Finally, you can hire certification body to conduct certification audit and issue you the certificate.
Answer:
You can certify only one part of your organization, like you mentioned ITSM group. That will be your scope.
This article will help you regarding scope definition: "How to define the scope of the SMS in ISO 20000" https://advisera.com/20000academy/blog/2015/06/02/how-to-define-the-scope-of-the-sms-in-iso-20000/
Data Center has to fulfill all requirements of the ISO 20000 (if that would be your scope). ISO 20000 does not set any particular requirements towards any part of the organization.
Maturity models
Answer:
I am sorry but there are no evaluation ranges or range of application for ISO 27001, you can comply or not comply with ISO 27001, but not by ranges.
Anyway, you can use maturity models for the implementation of security controls, but the security controls really are from ISO 27002, not from ISO 27001 (although you can see the security control of ISO 27002 in the Annex A of ISO 27001).
Previous and current ISO 27001 and the risk management
Answer:
I am sorry but I am not sure if I have understood your question 100%, but if your question is related to combine concepts between the current version of the ISO 27001:2013, and previous versions (I suppose that when you say “BSI”, you mean BS 7799, which is the origin of ISO 27001), obviously if you want to certify ISO 27001:2013, you need to comply with the requirements of the current version of the standard, although you can use some concepts from previous version (for example and asset based risk management), but again, the important is to comply with the requirements of ISO 27001:2013.
And our online course can be also interesting for you because we give more information about the risk management and the implementation of the ISMS “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Regarding the clause A.7.1.2 Terms and conditions of employment, simply each employee must have an agreement with the organization where all conditions are established. This agreement can also include information about the roles and responsibilities related to the ISMS (for example can be good for the agreement of the CISO).
Regarding the clause A.13.2.4 Confidentiality or non-disclosure agreements, it is only necessary for information transfer (you need to establish an agreement with the other party for the information transfer, including terms rel ated to the information security), and it can be applicable to external parties or employees, but it is not directly related to the definition of roles and responsibilities.
Answer:
Regarding the first question, yes, it is necessary, because in accordance with the point 10.1 you need to eliminate the causes of a nonconformity, so if a nonconformity has been detected during an internal audit, you need to define corrective actions, and in the corrective actions you need to identify the causes of the nonconformity.
Regarding the second question, KPIs are not mandatory in ISO 27001:2013, so there is no clause directly related to KPIs in ISO 27001:2013, although in accordance with the clause 9.1 you need to establish a way to measure the ISMS, and a KPI can help you (but it is not only the unique way). This article can be interesting for you “How to perform monitoring and measurement in ISO 27001” : https://advisera.com/27001academy/blog/2015/06/08/how-to-perform-monitoring-and-measurement-in-iso-27001/
Answer:
I am not sure if I have understood 100% your question, but the CISO (Chief Information Security Officer) generally performs activities related to the implementation and maintenance of the ISO 27001 standard, and these activities should be reviewed during the ISO 27001 internal audit.
But if your question is about IT audits (ethical hacking, penetration testing, etc), from my point of view it is not necessary to review the work of the CISO, you simply need to review the configuration of systems, open ports, services running, etc.
Answer:
Our list of threats/vulnerabilities is a complete list of most common threats/vulnerabilities that covers most relevant aspects, so you can use this list for your risk management methodology. Here is our list of threats/vulnerabilities “Catalogue of threats & vulnerabilities” : https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/