Answer:
No I am sorry, a BCMS is not composed by security controls as an ISMS. Remember that ISO 27002 is a code of best practices with 114 security controls that you can use together with ISO 27001 to implement an ISMS. For BCMS you can use ISO 22313 together ISO 22301 to implement a BCMS, but ISO 22313 is not composed by controls, is composed by guidelines to implement the standard.
Anyway, you can also use control from ISO 27002 to mitigate most of business continuity risks, although this is not mentioned in ISO 22301.
In the "Existing controls" column you should list all the controls that are currently implemented related to the risk - sometimes the asset itself will be the control, like in case of a firewall.
However, if the asset is managed by an entity that is not part of the scope, then likely this asset is also not going to be included in the ISMS scope.
Next, once you perform the risk assessment you will define which controls you need, and then you have to decide which of these controls need to be documented. Finally, in the Risk treatment plan you need to decide which controls are to be implemented before the certification, and which will be implemented after.
In the certification audit, t he auditor will check if all the published documents are fully implemented.
So, to summarize: each document you write needs to be fully implemented; the only documents that you can leave for after the certification are those that are not mandatory.
How essential is a 'Scope Diagram' in the Scope Document?
That cleared the query! Thank you @ajsegovia
RARTP vs NCPA
Thanks for the help! It cleared the doubt :-)
Risk assessment of vendor who is ISO 27001 certified
Answer:
When assessing the risk of third-party services you have to assess the ability of those vendors to protect confidentiality, integrity and availability of your data that they are handling. Of course, if they are ISO 27001 certified, this will mean that the risks are probably lower; however this is not the only criteria, you should also check out what does your agreement with them say, what is their reputation, what are other customers saying, check if they have some other certificates, etc.
How to account for mobile devices that are not company owned
Answer: BYOD physical devices are typically excluded from the ISMS scope because you cannot control them completely, but you should include in the ISMS scope the company data on those devices - in that case, you simply list those data in your asset list and in your risk assessment.
We have interfaces setup with our clients. W ould we consider those interfaces to be a separate asset, or would we only account for the data when it is stored in a database?
Answer: I'm not sure what do you mean by interfaces - if you refer to some devices or software, then you should include those assets in your asset list. In some cases you will view data separately from the devices - e.g. you will list a database separately from a physical server, in other cases you can view server as a both physical server and data on this server - you are free to do it any way you feel more appropriate.
Milestones in the project plan
Answer:
Actually you can divide your project in 4 phases according to the Plan-Do-Check-Act cycle:
- Plan phase: documents from the ISO 27001 & ISO 22301 Premium Toolkit in folders 0 to 7
- Do phase: documents in folders 8 and 9
- Check phase: documents in folders 10 and 11
- Act phase: documents in folder 12
Problem in describing risks
Thank you, but it is written in italian language. I should translate it.