When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
CertiKit is delighted to announce a new version of our ever popular ISO27001 Toolkit. With fifteen new documents, forms and examples (bringing the total number of resources in the toolkit to over two hundred) Version 13 represents a helpful boost to organizations implementing or maintaining an ISMS.
We’ve listened carefully to the customer feedback shared as part of support questions, from our feedback survey and from the work of our own consultants in helping clients reach certification. Common threads included a need to include content about recent developments such as artificial intelligence, a desire for simplification in some areas, and changes to a number of key processes to make them clearer and more coordinated.
Let’s explain more about the main areas in which enhancements have been made.
Recent events have transformed AI from a slow-burn background technology into a cutting-edge resource that most organizations are now scrambling to exploit. This brings its own specific security challenges, introducing new controls and changing the way in which existing ones are applied. To start to address this, we have added an AI Security Policy to the toolkit which covers relevant areas such as data security and privacy protection, intellectual property protection and compliance and ethics. We have also updated many of our policies and guidelines to do with software development to consider AI-related issues. As the use of AI and the legal framework develops we are sure this will be an area for further attention in future releases of the toolkit.
There are a few areas of the toolkit that have generated support questions and some discussion, so we have taken the time to make the relevant documents clearer. These include:
It’s always been the case that the risks and opportunities to the ISMS need to be assessed, and previously this has been achieved within the toolkit, albeit in a basic way. With this update we have emphasised this aspect of risk assessment more, with its own process and tool, and a set of relevant examples.
For information security risk assessment we have added a column to the “Reference Controls” tab of the risk assessment tools to allow for the noting of which risks make use of each of the Annex A controls. This is useful when creating the Statement of Applicability to justify why a control is applicable or not applicable.
Within the Statement of Applicability itself we have also allowed for the implementation status of a control to be “Partial” rather than simply yes or no.
For risk assessments the term “scenario-based” has been replaced with “event-based” to align with the terminology used in the ISO27005 guidance standard.
Supplier management is covered by a number of Annex A controls and documents have been available within the toolkit to cover most of them individually. However, we have recognised the need to bring these documents together into a coordinated process, resulting in the following new documents:
Together with existing toolkit documents, these take a lifecycle approach to the management of information security within the supply chain.
We now have more than forty policies in the toolkit, most of them topic-specific to address requirements in a particular area of the standard. In this release we have ensured that they all consistently contain the same key items of information such as scope, audience and definitions of terms used. We have also reduced the level of background information given in some policies to make them shorter and more focused. In a few cases content that is relevant to users has been separated out into a new policy, with a defined audience. An Incident Management Policy has also been added.
Those controls concerned with privacy have previously been largely written around the requirements of the EU GDPR (General Data Protection Regulation). In this release we have made them more generally applicable, given the range of country and state specific privacy legislation that now exists.
Of course, we have also corrected any typos and erroneous references to the 2013 version of the ISO27001 standard, as well as updating those documents, such as the Toolkit Index and Documentation Log, that refer to all documents in the toolkit.
Many other documents have been updated to keep them current and to mesh with changes to documents in other areas.
The purpose of this update to the ISO27001 Toolkit was to keep the essence of the way it works whilst fine-tuning a number of areas to make it more user friendly, more consistent and up to date with developments such as AI.
We hope the changes will be helpful to existing and new customers alike, and as always we wish you well in your work to exploit the benefits of the ISO27001 standard and to protect your organizations.
You can learn more about what’s included, and view the toolkits documents here.