Answer:
From my point of view, in a cloud computing environment it is better ISO 27005, because it is developed for risks about information security, although you can also use ISO 31000 because this standard has the same structure that ISO 27005 but it is developed to any type of risk (information security, financial, environmental, etc).
Regarding ISO 91000, I suppose that you mean ISO 9001 because ISO 91000 does not exist, and ISO 9001 is not specifically developed to manage risks,it is developed to establish the requirements for a quality management system, although in the current version of the standard (ISO 9001:2015) there is a new requirement related to the risk analysis (the risk treatment is not mandatory), so it is not useful to use this standard for the risk management.
This quote is from our Classification Policy template, and this means that when classifying information, you should always take the lowest level of classification. This is because the higher the classification level, the more you will have to pay for the protection.
According to our Classification Policy template, the lowest level of confidentiality is "Internal use", however this is not mandatory according to ISO 27001.
Defining criteria for evaluation of environmental aspects
Answer:
Criteria used for evaluation of environmental aspects should reflect type, size and complexity of your business. Meaning that, if you have some small company that doesn't have some big impact on the environment, you can use only one criteria. On the other hand, if you are big company with great impact on the environment, you should use several criteria for determining significance of your environmental aspect.
Criteria that we use are:
- Criteria related to probabi lity (frequency) of aspects and their impact
- Criteria related to scale of impact and consequences
- Criteria related to time of recovery
- Criteria related to the reach of impact
Example of quantitative and qualitative risk assessment
Answer:
Basically quantitative is when you determine the risk with numeral values (for example based on economical values), and qualitative is when you determine the risk with nominal values.
For example, in a quantitative risk assessment, you can have this formula for the risk:
Risk = Impact x Likelihood
Being the Impact in terms of money and the likelihood in terms of %. So, if the impact in economical terms is $10.000 and the likelihood is 90%, the risk is: $10.000 x 0,9 = 9000. Here you also need to define different levels of risks (for example, 0-5000 is low, 5000-10.000 is medium, 10.000 and 50.000 is high).
Regarding the qualitative risk assessment, you can you also the same formula:
Risk = Impact x Likelihood
But in this case the values will be only nominal: Low, Medium, High (or you can also use 1, 2, 3), so in this case you will need a table with all po ssible values. For example, if the impact is low and the likelihood is low, the risk will be low. If the impact is low and the likelihood is medium, the risk will be low, etc.
Examples of quantitative risk assessment are MAGERIT, or SOMAP, and examples of qualitative risk assessment are CRAMM, or OCTAVE.
Respuesta:
De acuerdo a los requerimientos de la ISO 27001, para la definición del alcance del SGSI, necesitas:
- Tener en cuenta las cuestiones internas y externas (definido en la cláusula 4.1)
- Tener en cuenta las partes interesadas (definido en la cláusula 4.2)
- Considerar las interfaces y dependencias entre lo que está pasando dentro del alcance del SGSI y el mundo externo
Finalmente, nuestro curso online también te puede resultar interesante dado que ofrecemos más información sobre la definición del alcance del SGSI (aunque actualmente únicamente está disponible en inglés) “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
ISO 27001 certification for one division
Answer:
Sure, you can limit the scope of the implementation of ISO 27001, so you can limit the certification to one division of your business, there is no problem with this, but in the future could be recommendable to expand this scope to other divisions, and finally for the whole organization.
This is basically the question of the ISMS scope - you should include in your scope (and therefore in your risk assessment) only the assets you can control. So you should include in your scope/risk assessment the applications and your data on those virtual servers you control, however you should exclude the physical servers because you do not control them.
However, control A.15.1.1 requires you also to perform risk assessment of your suppliers, so this means that you should assess how this hosting service can affect confidentiality, integrity and availability of your data - for that purpose you can use the same Risk Assessment Table, and write as an asset "hosting service". So you won't be assessing the physical servers, but figure out what incidents can happen in general - e.g. unauthorized access to your data, loss of data, unavailability of the service, etc.
There is no specific requirement to audit entire scope of the standard and even entire organization in a one year period. However, it is recommendable to audit the system against all requirements of the standard during one year period since it is a natural time frame for every company. It is hard to find justification for auditing only part of the organization against part of the standard per year.
Quality policy should be reviewed during management review, but if the top management chooses not to make changes to the policy, it can be left as it is without changing dates or any other information.