Implementing business continuity management system
Answer:
Regarding your first question, generally the implementation project for a business continuity management system is not structured in process, it is structured in steps, and here you can see how to implement a business continuity management system based on ISO 22301 “17 steps for implementing ISO 22301” : https://advisera.com/27001academy/knowledgebase/17-steps-for-implementing-iso-22301/22301/iso-22301/
Regarding the process involved in auditing business continuity management system, generally it is not used, I mean, the internal audit is structured in steps, not in process, and besides the previous article, you can also use our specific toolkit for the internal audit, which have all necessary tools that you can use to perform the internal audit in your company (you can see a free version clicking “Free demo” tab) “ISO 27001/ISO 22301 Internal Audit Toolkit” : https://advisera.com/27001academy/iso-27001-22301-internal-audit-documentation-toolkit/
Creating policies and procedures: Stage of implementation
Answer:
Generally the creation of policies and procedures begins after the risk assessment & treatment, because you will need policies and procedures to implement the security controls.
Regarding your second question, the first policy that you can write is the top-level information security policy.
Finally, our online course can be also interesting for you because we give more information about how to implement policies and procedures “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Monitoring and measurement results
There are two more documents in the documentation toolkit that will be helpful regarding the measurement and monitoring:
- In the top-level Information Security Policy, in the section 4.1 you need to specify the responsibilities for measurement and monitoring.
- Risk Treatment Plan - in the column "Method for evaluation of results" you need to specify how you will evaluate whether the implementation plan of the controls has been complied with, while in the column "Status" you need to specify whether particular control is implemented or not, which you can use for monitoring the implementation plan.
Tipo de activo "Físico"
· Software: Software de aplicación, software del sistema, interfaces, herramientas de desarrollo y utilidades.
· Hardware: Equipos de cómputo, equipos de comunicaciones, medios removibles y otros equipos físicos.
· Servicio: Servicios de cómputo y comunicaciones. Ejemplo: acceso a Internet, páginas de consulta, acceso a la red, correo electrónico, redes, etc.)
· Sitio: Instalaciones de procesamiento de información. Ejemplo: Centro de cómputo principal y de respaldo, archivo documental, etc.
En una reciente auditoria interna el Auditor nos hace una observación en el sentido de incluir el tipo de activo FISICO “para activos no digitales “ que hace alusión a documentos tales como fotografías, grabaciones o personas.
Esto debe incluirse?
Respuesta:
Desde mi punto de vista un activo de tipo "Fí sico" relacionado con fotografías, grabaciones o personas no es necesario, aunque debes incluir en tu metodología otros tipos de activos como por ejemplo "Personas", o "Información" (relacionada con información digital: fotografías, grabaciones, o información física: información en formato papel).
Finalmente, nuestro curso online también te puede ser útil, dado que ofrecemos más información sobre activos (aunque de momento el curso solo está disponible en inglés) “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Aligning information security objectives with business strategy
"
Answer: Your top-level information security objectives (objectives for your whole ISMS) must support your business strategy, because information security must be part of the efforts of making your company successful.
For example, for a financial organization, an information security objective might be to decrease the number of data leakages, which directly supports an increase in trust in such organization. And building such a trust is probably a strategic objective of financial organization.
Report information about compliance and audit
Answer:
From my point of view you can report information about the execution of your process, so you can report information about the NCs (Non-Conformities), OFIs (Opportunity for Improvement), compliance with laws, corrective actions pending, number of audits, departments or areas audited, security controls audited, etc.
Balance scorecard
Answer:
ISO 27004 is a code of best practices that can help you to measure your ISMS defining metrics, which you can use to develop a balanced scorecard (although this standard does not refer directly to balanced scorecard, but you can use the standard to develop it).
Anyway, these articles about measurement can be interesting for you:
Respuesta:
Básicamente tienes que tener en cuenta 3 puntos:
1.- Cuestiones internas y externas (definido en la cláusula 4.1 de la ISO 27001:2013)
2.- Partes interesadas (definido en la cláusula 4.2)
3.- Interfaces y dependencias entre lo que sucede en el alcance del SGSI y el mundo exterior
Y nuestro curso online también te puede resultar interesante porque damos más información sobre el alcance del SGSI (aunque el curso actualmente está en inglés) “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/
Information assets
Answer:
I am sorry but ISO 27001 does not establish who determines what constitute an information asset, although the best practice is that the identification of assets is performed by all people involved in the implementation of the standard.
Anyway, one of the most relevant people involved in the implementation (and maintenance) of the ISO 27001 is the CISO (he coordinates the whole project and one of his activities is the asset management). Another important question is the asset owner, which is the employee that operates the asset. This article can be interesting for you “What is the job of Chief Information Security Officer (CISO) in ISO 27001?” : https://advisera.com/27001academy/knowledgebase/what-is-the-job-of-chief-information-security-officer-ciso-in-iso-27001/
Answer:
Generally all KPI / metrics can be measured and reported directly on ISO 27001 or ISO 22301, although ISO 27001:2013 does not require you to use KPIs.
Some examples of metrics that are established to measure the effectiveness of security controls implemented are related to the backups, incidents, asset inventory, policy review, etc.