SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

ISO 27001 templates content

  Quote
Guest
Guest user Created:   Mar 25, 2019 Last commented:   Mar 25, 2019

ISO 27001 templates content

1. Not all the unacceptable risks must be documented in the SoA (selection of controls option), besides selection of controls you can also choose to accept risks, avoid risks or share risks with third parties. If I choose one of the other 3 options, what do I have to write in my Statement of Applicability?
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Mar 25, 2019

Answer: If you choose the option "accept risk", you should document such risks in section 4 of our Statement of Applicability template (in section 3 you list all applicable and non-applicable controls).

2. Regarding chapter A.14: A webhosting company which doesn't develop software at all might be applicable to some of the controls in chapter A.14 if they are buying a 3rd party CRM, the previous time that I've asked you, you have responded the following to me: "mainly those related tor definition of security requirements and system acceptance.", which other controls besides A.14.1.1 are we talking about in case of buying a 3rd party CRM system?

Answer: Another controls to be considered are 14.2.3 Technical review of applications a fter operating platform changes, and 14.2.9 System acceptance testing.

3. If an asset isn't used by anyone, do I still have to add it in the 'Inventory of assets' ?

Answer: If an inventory of assets is applicable to your context, you only have to include assets that are involved with the information you want to protect. So, if an asset isn't used by anyone, there is no need to include it in the inventory.

4. Security Procedures for IT Department 6.5.1 Describe the technology used for erasing data from media in the equipment: We don't have any specific tool for the removal of data. Let us say a customer wants to end his services at our company then all we have to do is press the "Delete client" button on the tool(s) that we use for the administration (both facturation and webhosting). Is this okay or do we really need a tool which we are specifically using for the removal of data?

Answer: If this "Delete client" functionality can ensure the data cannot be recovered by any means, then you can use it to fulfill the requirement from section 6.5.1 from the Security Procedures for IT .

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Mar 25, 2019

Mar 25, 2019