SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

ISO 27001 documents

  Quote
Guest
Guest user Created:   Jun 23, 2021 Last commented:   Jun 29, 2021

ISO 27001 documents

hese controls are listed in ISO27002. How do you decide whether they are mandatory or not?  Because different companies will require different controls.  For example, software developers will definitely require A12.6 – Technical Vulnerability Assessment. The following are not in the toolkit.  Please furnish: A7.3 A9.3 A9.4 A12.4 A12.5 A12.6 A12.7 A13.2 A14.2 A14.3 A17.2 A.18.1 Compliance with legal and contractual requirement A18.2
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Jun 23, 2021

Advisera's ISO 27001 Documentation Toolkit does not have a document for each and every control from ISO 27001 because of the following reasons:

  1. ISO 27001 does not require each and every control to be documented
  2. If the toolkit had a document for each control, there would be too many documents, and this would be an overkill for smaller and mid-size companies.
    Since our target are SMEs, we have decided to include an optimum amount of documents for companies of this size - the toolkit includes:

All the mandatory documents - e.g., Information Security Policy, Statement of Applicability, Risk Assessment Methodology, Access Control Policy, etc.
Documents that are not mandatory, but are commonly used - e.g., BYOD Policy, Classification Policy, Password Policy, Backup Policy, etc.
Regarding the controls you mentioned:
A7.3 (Termination and change of employment): the implementation of this control usually only requires some adjustments to practices that are normally performed by Human Resources.
A9.3 (User responsibilities): This control is documented in the template IT Security Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management
A9.4 (System and application access control): Controls from this section are documented in the templates Information Classification Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management, and Access Control Policy, located in folder 08 Annex A Security Controls >> A.9 Access Control Policy
A12.4 (Logging and monitoring): Controls from this section are documented in the Security Procedures for IT Department, located in folder 08 Annex A Security Controls >> A.12 Operations Security
A12.5 (Control of operational software): This control is documented in the IT Security Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management
A12.6 (Technical vulnerability management): Controls from this section are documented in the IT Security Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management
A12.7 (Information systems audit considerations): This is not a commonly implemented control.  
A13.2 (Information transfer): Controls from this section are documented in the Bring Your Own Device (BYOD) Policy, located in folder 08 Annex A Security Controls >> A.6 Organization of Information Security, Confidentiality Statement, located in folder 08 Annex A Security Controls >> A.7 Human Resource Security, IT Security Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management, Information Classification Policy, located in folder 08 Annex A Security Controls >> A.8 Asset Management, Security Procedures for IT Department, located in folder 08 Annex A Security Controls >> A.12 Operations Security

A14.2 (Security in development and support processes): Controls from this section are documented in the Security Procedures for IT Department, located in folder 08 Annex A Security Controls >> A.12 Operations Security, Secure Development Policy, located in folder 08 Annex A Security Controls >> A.14 System acquisition, development, and maintenance, Supplier Security Policy, located in folder 08 Annex A Security Controls >> A.15 Supplier relationships

A14.3 (Test data): This control is documented in the Secure Development Policy, located in folder 08 Annex A Security Controls >> A.14 System acquisition, development, and maintenance
A17.2 (Redundancies): This is not a commonly implemented control.
A18.1 (Compliance with legal and contractual requirements): Controls from this section are documented in the Procedure for Identification of Requirements, located in folder 02 Identification of Requirements

A18.2 (Information security reviews): This is not a commonly implemented control.

By the way, included in your toolkit you ha a List of documents file that can show you which clauses and controls are covered by each template.

Quote
0 0
Guest
Guest user Jun 23, 2021

Many thanks for the response.   I do have an immediate question and would greatly appreciate if you could advise the following:

Industry: software developer. 

A12.6 (Technical vulnerability management): Does the company need to conduct VAPT for every software that they develop?  If so, how often?  If not, how do they decide which software needs VAPT?

Quote
0 0
Expert
Rhand Leal Jun 24, 2021

ISO 27001 does not prescribe that you need to perform a Vulnerability Assessment and Penetration Test on every developed software.

The decision about which developed software should undergo Vulnerability Assessment and Penetration Test, and how often perform VAPT is based on the results of risk assessment and applicable legal requirements (e.g., laws, regulations, or contracts).

These articles will provide you a further explanation about penetration test and vulnerability assessment:

Quote
0 0
Guest
Guest user Jun 28, 2021

In order to show evidence that ISMS has been implemented, must we show a minimum period of implementation?  For example, 3 months?  What will the external auditor look out for in terms of actual implementation of the ISMS for ISO27001 certification?  Please advise.

Quote
0 0
Expert
Rhand Leal Jun 29, 2021

1 - In order to show evidence that ISMS has been implemented, must we show a minimum period of implementation?  For example, 3 months?

This is different from one certification body to the other - some require you to have ISMS in full operation for at least 3 months, while others do not have such criteria. The best would be if you ask for proposals from a couple of certification bodies, and ask them this specific question.

These articles may also help you:

2 - What will the external auditor look out for in terms of actual implementation of the ISMS for ISO27001 certification?  Please advise.

The certification auditor will look for all documents and records stated as mandatory by the standard, and those considered applicable by the organization (e.g., policies and procedures related to applied controls).

In the ISO world, mandatory requirements/documents are related to the words “must” or “shall”, while non-mandatory requirements/documents are related to the words “may” or “should”.

Documents and records mandatory to fulfill clauses from the main sections of the standard (sections 4 to 10) are:

  • Scope of the ISMS (clause 4.3)
  • Information security policy and objectives (clauses 5.2 and 6.2)
  • Risk assessment and risk treatment methodology (clause 6.1.2)
  • Statement of Applicability (clause 6.1.3 d)
  • Risk treatment plan (clauses 6.1.3 e and 6.2)
  • Risk assessment report (clause 8.2)
  • Records of training, skills, experience, and qualifications (clause 7.2)
  • Monitoring and measurement results (clause 9.1)
  • Internal audit program (clause 9.2)
  • Results of internal audits (clause 9.2)
  • Results of the management review (clause 9.3)
  • Results of corrective actions (clause 10.1)

These articles will provide you a further explanation about documents required for certification and the certification audit:

These materials will also help you regarding the certification process:

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jun 23, 2021

Jun 29, 2021