ISO 27001 CERTIFICATION (INDIVIDUAL VS. ORGANIZATION)

ISO 27001ISO 27001 is a standard that is folloVendord for the Information Security Management System (ISMS) of an organization in which, the said company’s compliance status is checked, based on which new policies are created and applied. It’s a mandate in many sectors such as companies involved in the Cyber Security domain.ISMS includes the 3 major elements of cyber security: Confidentiality, Integrity, Availability (CIA).

To ensure compliance to the CIA in terms of ISO 27k1 the companies need to

  • Audit
  • Assess the risks
  • Formulate policies
  • Implement policies
  • Continuous monitoring & Updates

The departments/processes that go through the above mentioned process are both, IT & Non IT Infrastructure of a company, but the audit of ISO 27k1 is mainly focused on the IT Infrastructure of a company.

ISO 27001 CERTIFICATION:

Being ISO 27001 Certified means, the certification body that you choose for this process (PECB or IRCA), gives you an attested confirmation that your organization is compliant to all the guidelines of ISO 27k1.

Now there are two types of certifications in ISO: Individual / Organization

The process for an Individual certified professional is completely different from that of a Certified Organization, these certified professionals then move on to performing the process of certifying the organization.

INDIVIDUAL

Types of ISO certified Professionals

  • Lead Auditor
  • Lead Implementer

lead auditor is the one who is responsible for leading the audit team in an organization. He or she prepares the audit plan, delivers meetings and submits audit report at the end of quarter or year. Conducting audits is the main responsibility of a lead auditor and that needs to be done on a daily basis.

Lead implementer is the one responsible for bringing the Lead auditor plan into action and makes sure all the policies are implemented and properly controlled.

Process of getting certified

According to PECB, the process for getting ISO 27k1 LA/LI certified is nearly not as lengthy for individuals as it is for the organizations.

Previous experience: minimum 4 years of job experience in IT is crucial, out of which at least 2 years has to be in cyber security.

Training & Examination: After attending 5 days of training in ISO 27k1 LA/LI, in the course outline guided by the certification body of your choice/requirement, you have to submitted a certain examination fee to the certification body, after which, an invoice in your name along with your exam question papers are prepared & sent to the authorized training center for you to attempt the exam.

Certification process: After attempting the certification exam, the candidate fills the certification forms in which they put in the required information, In the back-end the certification body verifies the information given by the candidates and if the compliance is there, the certificate is issued.

ORGANIZATION

“A typical certification audit (A.k.a. 3rd party audit) generally follows the general process of IT Audit:

  • REQUESTING DOCUMENTS
  • PREPARING AN AUDIT PLAN
  • SCHEDULING AN OPEN MEETING
  • CONDUCTING FIELDWORK
  • DRAFTING A REPORT
  • SETTING UP A CLOSING MEETING

Based on the process above, a company either qualifies or disqualifies for certification, which is why organizations hire audit organizations (A.k.a. Accredited organizations) to consult them through the certification process and do the 3rd party Audits.

That has a whole other process altogether, but it again differs from company to company. A generally followed process is as follows:

Pre-Proposal checklist: Vendor will send you a questionnaire/checklist to be filled by your business/technical team. This checklist consists of basic information Vendor would need in order to send you a techno-commercial proposal

Proposal: Vendor will give you a proposal enclosing the Scope of Work, timeline & cost involved in execution of the project.

Audit & Compliance team: Vendor will assign you an account manager who will be your point-of-contact/consultant & coordinator in the whole process.

Pre-assessment: (optional) Pre-assessment audit is done before the actual assessment is done, another term for this step is Opinion Audit. This step is carried out as a precautionary step to identify any weakness/nonconformity that may need resolving.

Assessment: This step is the actual performance of audit, the process of the same depends on the standard chosen by the auditee.

Certification: Vendor will issue a certificate of registration , clearly outlining the scope of your certification.

Compliance: Your account manager will carry out ongoing assessments to support your continual improvement activities.

Training: Vendor will have an awareness training for the employees of the organization after the completion of the the process & certification courses & training to bring the professionals involved to bring them upto the certification level during/before the certification.

 

Related Posts

HOW ORGANISATIONS CAN ENSURE CYBER SECURITY DURING REMOTE WORKING

HOW ORGANISATIONS CAN ENSURE CYBER SECURITY DURING REMOTE WORKING Global pandemic has entirely changed the work culture of the organisation, while over 75 percentage  of the private sector…

Cyber Security Compliance for Startups

CYBER SECURITY COMPLIANCE FOR START-UPS Start-ups are integral to  economic success of any country, generating  millions new jobs in recent years and experiencing significant market growth as…

VIRTUAL CISO-A Logical method to manage Cyber security compliance in Start-ups

VIRTUAL CISO-A Logical method to manage Cyber security compliance in Start-ups   During the current era, both big companies and small start-ups, are using Information Technology for…

INFORMATION TECHNOLOGY (IT) RISK MANAGEMENT

INFORMATION TECHNOLOGY (IT) RISK MANAGEMENT  What is Risk? Risk is any unwanted event which impact organisation’s objectives to attain business goal. There are various type of business…

CYBER CRISIS MANAGEMENT (SO WHAT EXACTLY CYBER CRISIS IS?)

CYBER CRISIS MANAGEMENT A click on a malicious link, any unwanted services open, using any obsolete OS can be much more catastrophic for the organisation beyond one’s…

CYBER SECURITY WORKSHOPS AN EFFECTIVE WAY TO UNDERSTAND CYBER RISKS FOR BEGINNERS AND PROFESSIONALS

CYBER SECURITY WORKSHOPS: AN EFFECTIVE WAY TO UNDERSTAND CYBER RISKS FOR BEGINNERS AND PROFESSIONALS

CYBER SECURITY WORKSHOPS: AN EFFECTIVE WAY TO UNDERSTAND CYBER RISKS FOR BEGINNERS AND PROFESSIONALS Workshops has always been a great source of knowledge about the subject. Cyber…