Skip to main content

Questions tagged [iso27001]

The specification for information security management systems, developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system."

Filter by
Sorted by
Tagged with
-1 votes
1 answer
173 views

ISO 27001 - Companies processing each other's data

If there are two companies, each holding a valid ISO 27001 certification, what type of formal relationship can be established in policy to allow each other to access, process and store each other's ...
Frank Jackson's user avatar
1 vote
1 answer
220 views

Is Google Drive compliant with control A.8.15 in ISO 27001:2022? [closed]

Is Google Drive compliant with control A.8.15 in ISO 27001:2022? As ISO 27001 requirements for logging and monitoring, are Event logging, Log storage, Protection of logs, and Analysis of logs, could I ...
Jonathan Gagne's user avatar
6 votes
2 answers
2k views

How do I decide which security framework is most suited to my organization?

There are many IT security frameworks/standards/regulations/etc to chose from, each with their own pros and cons. For example, IS0 27000 series, NIST CSF, NIST RMF, PCI-DSS, etc. My question is, is ...
user1720897's user avatar
0 votes
1 answer
109 views

Saas software, cloud services and ISO assets

I'm putting a list of assets together, but I'm really struggling to figure out how to categorise them. Take for example you have the following: MailChimp (Full SaaS, holds potential PII in a database ...
Trent's user avatar
  • 143
2 votes
1 answer
1k views

Is Synology's Active Backup for Business Destination Encryption Secure or Snake Oil?

Synology's Active Backup for Business has a feature for Destination Encryption which only seems to work with BTRFS. It works so that you have to set it up when creating the BTRFS storage. At this ...
Jey DWork's user avatar
  • 230
3 votes
1 answer
536 views

Does ISO27001 require to use Github Enterprise Single Sign on?

A Company would like to get ISO 271001 certified. With 10 developers and 4 others (product, QA) having access to various Github Repositories, they managed their access rights pretty good. 3 people ...
Tim Kretschmer's user avatar
2 votes
1 answer
486 views

ISO 27001 and Subsidaries

I'm trying to write and implement an ISO 27001 compliant information security management system (ISMS) for the company I work for. Currently we have our HQ the UK (2 office locations plus a test site) ...
user282603's user avatar
4 votes
1 answer
2k views

How to maintain and enforce an approved list of software?

I work in a software-development company where we have a lot of tech-savvy people. For ISO27001 certification we need to maintain list of approved software. And I'd like to understand how in practice ...
Dmitry's user avatar
  • 143
0 votes
1 answer
273 views

Why doesn't ISO27001 mandate an acceptable use policy?

I'm going through my first ISO27001 implementation and I can't seem to find a definitive list of what policies are required. I realise Annex A is "optional". I've found lists online a few ...
mak47's user avatar
  • 113
-1 votes
1 answer
158 views

ISO 27001 2013 version not being updated

Is there any reason why an information security standard such as ISO 27001 is not getting updated as Information Security field is constantly changing and also the requirements but its latest version ...
John's user avatar
  • 21
0 votes
1 answer
353 views

What alternative standard for ISO 27001 can be used in Australia?

I am looking for alternatives, that are less strict and less time consuming, than ISO 27001. Australia is in the Commonwealth, so maybe Cyber Essentials Plus could work, but I do not know if that ...
Maria Celeste Galera Laferrere's user avatar
1 vote
0 answers
133 views

Using AWS Cognito or Firebase Auth can help to certify my app with ISO 27001?

My colleague told me that ISO 27001 require physical server running in the office to store user password. Therefore, using AWS Cognito or Firebase Auth can save us the physical server since they have ...
ykn121's user avatar
  • 111
3 votes
3 answers
1k views

Can a business with a single employee gain ISO27001 certification?

I would like to bid for contracts where ISO27001 certification is a requirement. I build cloud based bespoke software. Although I take security extremely seriously - I don't have any formal processes ...
Nick's user avatar
  • 33
0 votes
1 answer
166 views

Is reading ISO 27000 official publication sufficient to prepare for exam? [closed]

I was at the ISO/IEC 27001 official web page. I saw a the publication for the norm. It's about 23 pages. So I was wondering if studying those 23 pages would prepare me enough, lets say at 80%, to ...
steven miller's user avatar
1 vote
0 answers
118 views

Two persons-rule on MySQL databases for "manual fixes"

In order to "harden" our compliance, we wanted to enforce a two-persons rule on the MySQL production database for "manual fixes". Such "manual fixes" frequently arise due to: Bug in the application (...
user1202136's user avatar
2 votes
3 answers
1k views

Is it safe and permissive to remember devices to skip two factor authentication when dealing with sensitive information?

We're a small UK startup building a small service that allows certain special people (e.g. journalists) to access non-public court information. This information includes a ton of private and ...
Levi H's user avatar
  • 121
4 votes
2 answers
4k views

Is the ISO/IEC 27001 standard incompatible with free/open source software?

The ISO/IEC 27000-series of standards lay out how to create and manage an information security management system (ISMS). The ISO/IEC 27001 document provides the main body of the standard and is ...
08915bfe02's user avatar
-3 votes
1 answer
138 views

My IT manager says rMBP is not satisfied ISO27001 [closed]

My company computer is using MS Windows and I myself as a software engineer I would recommend my developer team to use OSX since it is hassle least than Linux/Unix based OS. When I propose the ...
Sarit's user avatar
  • 95
3 votes
1 answer
701 views

ISO 27001 compliance for application or hosting?

I received a question as follows: Does the vendor solution need to have the ISO 27001 certification for the application itself, or just for the hosting of the platform? In my understanding, ISO 27001 ...
Elom ETSE's user avatar
1 vote
1 answer
200 views

Does a customer who uses a cloud service provider with ISO27017 compliance, need their own certificate to be compliant themselves?

ISO 27017 advises both cloud service customers and providers. Microsoft Azure is compliant with ISO27017. Let us say that a cloud service customer who uses Microsoft Azure wants to be compliant with ...
gordon613's user avatar
  • 291
3 votes
1 answer
164 views

Is there a default assets grouping in order to perform Information Security Risk Assessment?

I am working on the implementation of an ISMS and aiming to get 27001 certification. While i was conducting the Risk Assessment, I found it difficult to match all those assets/asset components with ...
dropdown's user avatar
1 vote
1 answer
2k views

How does a merger formally impact an ISO 27001 certification?

Organization A has a service that is ISO 27001 certified. It is acquired by Organization B which does not have any certification. What are the formal impacts of the acquisition on the ISO 27001 ...
WoJ's user avatar
  • 9,096
1 vote
1 answer
348 views

Email under GDPR [closed]

I am aware that email is considered as PII and should be used and stored under strict security guidelines as per GDPR. If we use email in any our communications and in what cases it might not be ...
user211383's user avatar
2 votes
0 answers
856 views

SSAE 16 SOC II vs ISO/IEC 27001 - Any reason to do both?

I manage risks for a small SaaS provider based in Europe and have always had the understanding that an ISO/IEC 27001 certification covers just about every aspect of information security management and ...
Roy's user avatar
  • 200
0 votes
0 answers
112 views

standards reference to perimeter security

I have the following problematic that I am currently dealing with. I have two zones/perimeters that need to be interconnected, some standards protocols have to be whitelisted such as HTTP, FTP, SSH ...
Ants0's user avatar
  • 1
0 votes
1 answer
179 views

Do you need to validate compensating controls of a certified organization?

Our web application uses Google's G Suite Single Sign-on for authentication into our application. As part of writing documentation around compensating controls, the PCI DSS requires "Validation of ...
Thomas Yang's user avatar
2 votes
0 answers
253 views

Can ISO 27001 auditors audit their own work?

It may seem that the question in the title is stupid, but it is not. There is a known case of deletion of "Auditors shall not audit their own work" rule in 2015 version of ISO 9001 and the remaining ...
Grzegorz Adam Kowalski's user avatar
4 votes
1 answer
2k views

Starting with ISO 27001 - what to buy?

We want to start implementing the ISMS according to ISO 27001. Now I know that the ISO 2700x familiy consists of a lot of standards, a lot of them beeing industry-specific standard documents. My ...
Tobias's user avatar
  • 153
0 votes
1 answer
198 views

What a information security help desk looks like

ISO 27001 A.16 is talking about handling information security incidents and events and about the point of contact to which such events should be reported. I'm wondering how in real life and real ...
Mamba3388's user avatar
-1 votes
2 answers
361 views

Potential risks per ISO 27002 clauses 5-18

I have a study project related to establishing of ISO 27001. I will do GAP analyses on "fictional" company over all ISO 27001 Annex A controls using ISO 27002. After I do that, I will detect the ...
OrangeSpider's user avatar
2 votes
2 answers
736 views

Are there currently any standards for Homomorphic encryption?

I am curious if there are any released standards for homomorphic encryption, or computing on encrypted data. Perhaps by NIST, ANSI, or ISO. If not, are there any that are under development right now? ...
jburcham's user avatar
  • 158
1 vote
2 answers
206 views

Is there a security standard/framework which interpret the CISO role as independent position

It is more or less an open secret that the CISO should act independently in the company. In my opinion, a supposed reporting line to the CIO is a conflict of interest (budget vs. security). The CISO ...
wundidajah's user avatar
0 votes
1 answer
410 views

ISO 27001 and copying code from stackoverflow

So ever since we got certified, every time some code from stackoverflow is shown the ISO 27001 argument comes up "we can't copy code". As a dev, I have to say not allowing code form stackoverflow is ...
Squirrelkiller's user avatar
1 vote
1 answer
3k views

Difference between ISO/IEC 27001 and CISSP CBK

Sorry to ask this, I am quite new to Security area. Recently I am trying to introduce some security standards. After some searching I found this out in this doc Among them, ISO is the best-known ...
Hearen's user avatar
  • 121
2 votes
1 answer
210 views

Controlling windows server on Amazon Web Services

Our site is ISO-27001 compliant. As part of the compliance we were advised not to use RDP to connect to the server, but rather to choose a cloud server which provides a web-interface. Our current ...
gordon613's user avatar
  • 291
2 votes
5 answers
5k views

Expressing the risk of not having a security policy (e.g. ISO 27002, chapter 5)

How do I express non-compliance to ISO 27002 chapter 5 as a risk? The basic principle of an ISMS according to ISO 27001 is a risk-based approach. Following this, every control of Annex A (ISO 27002) ...
Tom's user avatar
  • 10.7k
2 votes
2 answers
898 views

ISO 27001 scoping for small company using all cloud-based services

I'm in the process of defining the scope definition according to ISO 27001 for a company whose core business process is based on the analysis of health-related data. The IT infrastructure is entirely ...
Santhosh's user avatar
1 vote
0 answers
443 views

What are the similarities and differences between CISSP CBK, ISO/IEC, and the NIST NICE Framework? [closed]

There are a ton of different information security/cyber security frameworks but I was wondering if someone can give a quick rundown of some major similarities and differences. It'll really help me ...
Keith Axelrod's user avatar
25 votes
6 answers
5k views

How to start with an Information Security Program?

I am a software tester, InfoSec is mostly tangential to my job, and people only ask me questions about InfoSec because I am not afraid to use Google or Stack Exchange when I don't know something. (...
Amedee Van Gasse's user avatar
0 votes
3 answers
1k views

About SSD secure disposal for conforming to iso27001

To be compliant with ISO27001 secure disposal controls with a magnetic HDD we could degauss it before disposal. In SSD scenario, what is the best way for secure disposal which is compliant to ISO27001 ...
MemoryLeak's user avatar
-1 votes
2 answers
398 views

ISO 27001 structure and granularity of the content

I'm new to ISO 27001 and my goal is to come up with an ISMS policy for an mid-size organisation. As I did not purchase the standards, I went to read up advisera's articles and went through their free ...
ysj's user avatar
  • 429
10 votes
2 answers
17k views

Password expiration and compliance (ISO, NIST, PCI, etc)

I'm quite confused about what is the current state in 2017 for the idea of password expiration/rotation especially related to security certifications as ISO, PCI, etc. I keep reading that password ...
Jacob's user avatar
  • 233
1 vote
1 answer
122 views

Will granting access to data without owner approval set a bad precedent?

I work for a small company that does contract work that involves storing customer data on our servers for the duration of a project. We recently adopted more strict folder security in which each team ...
Bad Neighbor's user avatar
-3 votes
1 answer
243 views

ISO 27001: salary changes to employees without notification [closed]

Recently our management team started changing the salaries of employees without having them sign a new contact or statement saying they acknowledge the change in wage. I thought that there was a ...
user2762594's user avatar
1 vote
1 answer
450 views

Documentation for risk assessment in ISO 27001 structure

We are currently implementing the ISO27001, I have a question regarding the documentation of the risk assessement. We choose EBIOS to be our risk assessement method, and I found some templates of the ...
Farid-tsl's user avatar
124 votes
10 answers
21k views

Does an ISO27001 audit require users to reveal their passwords?

My company's system administrator is asking for our passwords for an ISO audit and my VP IT operations support says it's mandatory for ISMS (ISO27001). Can someone confirm if this is true?
v_sukt's user avatar
  • 1,312
11 votes
4 answers
7k views

What is a similar security standard to ISO 27001 with more focus on IT security? [closed]

*Edit - Replies so far are re-stating what ISO 27K is and is not. We are aware of this, however the perception of ISO 27K is different. We do not have infosec professionals so we just want to know ...
user2514224's user avatar
2 votes
1 answer
176 views

Asset management tracking [closed]

I was tasked with getting all of our ISMS Assets documented to prepare for an ISO 27k audit. Right now I am using a spreadsheet and I would like to use something more... professional. It has way to ...
Cole Mietzner's user avatar
4 votes
5 answers
5k views

What standard alternative to ISO 27001 can be used for a small business?

The business in question has high requirements for information security due to the sensitive nature of their work. The company has 5 people on staff and work with consultants from time to time. Is ...
Bestdeb's user avatar
  • 41
0 votes
3 answers
492 views

How to achieve other security compliances/certifications on AWS after satisfying HIPAA? [closed]

Our infrastructure is built entirely on AWS and we went through the HIPAA process to ensure that our system is HIPAA-compliant. Where should we look or what next steps can we take to obtain other ...
Paul Lam's user avatar
  • 101