Reference no: EM133179830
Governance - Risk - Compliance
Instruction
Complete the attached document only for the following tabs:
Question 1. Under the Statement of Applicability tab
A.5 Security Policy
A5.1 Information security policy
A.5.1.1 Policies for information security A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties.
A.5.1.2 Review of the policies for information security The policies for information security shall be reviewed at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness
A.6 Organization of information security
A.6.1 Internal Organization To manage information security within the organization.
A.6.1.1 Information security roles and responsibilities All information security responsibilities shall be defined and allocated.
A.6.1.2 Segregation of duties Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assets.
A.6.1.3 Contact with authorities Appropriate contacts with relevant authorities shall be maintained.
A.6.1.4 Contact with special interest groups Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
A.6.1.5 Information security in project management Information security shall be addressed in project management, regardless of the type of the project.
A6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
A.6.2.2 Teleworking A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites.
2. All of Section 9 tab - Info Sec PolicySecurity Policy [ISP]
"Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)"
Question
"[ISP 1.01] Does the Information Security Policy address the following:
- Access control
- Asset Management
- Business Continuity Management
- Communications and Operations Management
- Compliance
- Human Resource Security
- Information Security Incident Management
- Information Systems Acquisition, Development, and Maintenance
- Physical and Environmental Security"
[ISP 1.02] Do you maintain an information security policy that is , approved by top management, communicated to all vendor resources, and reviewed at least annually?
[ISP 1.03] Do data classification requirements define rules for managing, handling, and labeling of data for each data class?
[ISP 1.04] Is there a documented, approved, and communicated formal disciplinary or sanction policy?
3. All of Section 10 tab - Organization of Information Security
Organization of Information Security [OIS]
"Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)" "Please provide your response and any requested evidence for each question within the domain. All questions and fields marked with a * are mandatory.
o All questions need to be answered by selecting an appropriate response (Yes, Partial, No, Not Applicable)
o In case a question is not relevant to the service(s) being provided to KP, select ‘Not Applicable' and provide the explanation / reason in the Comment section
o In case a question is partially addressed or is partially relevant to the service(s) being provided to KP, select ‘Partial' and provide the explanation/components partially addressed in the Comment section
o For Yes/No responses, feel free to provide clarifying information where deemed appropriate or ""None"" in the Comments section
o All requested attachments (evidence) can be attached by selecting the Attachment icon (Note: .exe and .dll files are restricted)"
Question
[OIS 1.01] Is there an independent Information Security Organization with defined and documented roles and is upper management represented in the Information Security Organization?
[OIS 1.02] Are processes in place to ensure that risks are identified and managed appropriately?
[OIS 1.03] Is there a formal risk assessment performed at least annually or upon significant changes to the environment?
[OIS 1.04] Are processes in place to address and remediate issues identified during a risk assessment?
[OIS 1.05] Is a risk register maintained in which identified risks are recorded (including owner and remediation plan)?
[OIS 2.01] Are subcontractors subject to same requirements regarding workforce security (i.e., background check, security awareness training, and signing of NDA) as FTE's?
[OIS 2.02] Do agreements with third parties include requirements regarding the information security and compliance framework of the third party?
Attachment:- Audit_and_Assessment.rar