Practical Workbook - IsO27001 Lead Implementor Course
Practical Workbook - IsO27001 Lead Implementor Course
1) This workbook dully filled ones shall, be used for participants continuous assessment on every day. Please ensure that
you submit this workbook to the tutor(s), for daily continuous assessment at the end of each day.
2) On the last day, please send your workbook for review to your tutor or mail at [email protected]
Exercise - A
‘
Exercise-2 Auditing Information Security Principles
Scenario – Note > Some scenarios may demonstrate correct implementation of one or Principle
#
more principle(s) OR may be violating one or more principle(s). ( Srl. # )
The Data Privacy policy of the organization focusses on giving respect to privacy of all the Interested Parties and mitigation of
1 all risks for the same
The process owners of the organization review their residual risks (as a disciplined activity) every six months and updates the
2
approved residual risks
Five delivery executives of the online shopping portal company, do not collect the identity of the person to whom delivery
3 made, as per delivery policy & process
The Housing Society declares a special Information Security awareness training to enhance the knowledge of the residents on
4 the subject and give an idea of prioritization of risks – for the benefit of the residential colony member’s benefit
The school principal investigated the incident of the Artificial Intelligence examination paper of final year vanishing from his
5 locker
The Car rental company collects the identity of the person hiring car without driver and in one case of Ms Jene, did not collect
6 the driving license
The General Manager who also happens to be in Governance Board of the automotive company, wanted the R&D manager to
7 give presentation on the new steering technology used for which the R&D Manager in the upcoming Tech. conference – the
R&D manager refused to do so as per organization’s risk assessment control of R&D department
The Passenger lost his boarding pass after security clearance – wanted to go back to check-in counter to get the duplicate
8 boarding pass – security personnel escorted to check-in counter to verify and ensure that this person is the same and boarding
pass belongs to the same person
Incident records in the DR server got corrupted… and the main server also went down. at the same time this was already
9 identified an approved residual risk (low probability) that both might go down at the same time
10 The incident details (including causes) were envisaged as new ones – updated into ISMS KEDB and Risk Assessments
The traditional way of risk assessments in Excel is replaced by locally developed tool with Risk Assessments for C, I & A done
11 separately, as part of Board decision taken
The College has introduced an online training module for giving training on Information Security Management Systems (ISO
12 27001:2022) for benefit of college staff and students
The Zonal Sales Manager recommended termination of the Sales Man as he stole the mobile of the Board Member visiting office
13 for a meeting (left mobile on table before going to washroom) – entire incident was captured in CCTV
The Business Continuity Plan includes testing of Encrypted Data Retrieval to ensure the Data Integrity reliability – risk
14
assessment shows the approved residual risk of the failure of the De-encryption (low possibility)
The organization does Gap Analysis towards GDPR compliance (as per Board Instructions) for the purpose complying to GDPR,
15 if applicable to business
Exercise -3
External and Internal Issues – list down the external and internal issues consider you company as case
study for ISO27001 implementation.
Exercise -4
List down interested parties
Exercise -5
Write Scope statement
Exercise -6
Exercise -7
Draw Organization chart as per your company structure ( only to cover information security team &
concerned team)
Exercise -8
Exercise -9
Exercise -9A
Exercise -9C
Exercise-10
INFOCUS IT Consulting Pvt. Ltd. | [email protected] | www.infocus-it.com | 91-8178210903
Issue1 November 2022 Page 5 of 24
Practical Workbook – ISO27001:2022
Exercise-11
Resource and Competence matrix
Policy / process doc for Document control
Exercise-12
Exercise-12
Exercise-13
Exercise-14
Exercise-15
Management Review Process
Exercise-16
Corrective action process Management Review Process
7 SUPPORT
7.2 Competence
7.4 Communication
7.5 Documented information
7.2.1 General
7.2.2 Creating and updating
7.2.3 Control of documented information
OPERATION
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
9 PERFORMANCE EVALUATION
9.1 Monitoring, measurement, analysis and
evaluation
9.1.1 General
9.1.2 Evaluation of Information Security procedures
9.2 Internal audit
9.3 Management review
10 IMPROVEMENT
10.1 Continual improvement
10.2 Nonconformity and corrective action
INTERNAL AUDIT
Assessment Plan Date: DD/MM/YYYY (Atleast 7 days prior)
Organization:
Scope:
Objective of Assessment:
Team
Member: Audit End Date: Closing Meeting:
Audit Schedule
Date Client Function Auditor Time (hrs)
5 Leadership
6 Planning
7 Support
8 Operation
9 Performance Evaluation
10 Improvement
Incident 1
A Bank’s back has outsourced the Archiving of its Paper Documents (Daily vouchers, etc.) to a company called
“Document Bank” [DB] . The process involves (as per contract) 1. DC shall collect the documents from the Bank
(every three months) and put them in Boxes having BAR Code takes the same for stage in their warehouse 2.In
warehouse for each BOX - they scan every document in Software, which after scanning the system puts a separate
watermark of document unique Bar Code. 3. Keeps the BOX in the located, allocate by system. 4. The scanned
documents are converted to CD’s and hand delivered to the BANK, in next cycle, when they go to pick up the same
(for access soft copy of the docs., when needed – if need be the Bank might ask for original and the Warehouse
delivery vehicle delivers the BOX – all movements tracked. This service has been going on for 10 years. In half yearly
reconciliation, it was found that the for last two visits, the CD’s were not delivered, and the Bank also have not
escalated this matter. The DB did not log this as an Incident, saying that the Delivery process is outsourced and now
they have made a change in the software for online daily reconciliation and escalating the reconciliation exceptional
report to Supervisor and Operations head on daily basis. There is no risk of such kind in the Risk Assessment
identified.
NON-CONFORMITY NOTE: 01
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Incident 2
The commercial DATA Centre (TIER 3) operations applied for ISMS Certification. During Stage 1 review of ISMS
documentation review, you observed that there exists a list of IT Assets SPOF (Single point of failures – without
redundancies) which includes Routers which are very important for continuity of Networks. Further analysis shows,
the Asset list of SPOF comprises of 30% of total IT Network assets and also includes 2 of total 10 Firewalls. On enquiry,
the IT Manager says, now a days business is down and require lot of budgets….once business grows due to
certification, all the redundancies would be procured and used. The list of Single point of failures have been approved
by Management in Risk Assessment.
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Incident 3
A Pen drive containing formula of a medicine (for enhance the eye site) with Quality Testing Software was given to
the Quality Head (QH) given by Managing Director (who has gone to USA for research in University), with encryption
and opens with VPN connectivity & operates with special password only. This is used during every batch of product
testing by QH ONLY. One evening, the QH when entered the laboratory for performing that day’s last batch testing,
was surprised to see the Pen Drive was missing from the Lap Top (which was in the USP port, used in previous
testing). An incident report was made and started to search for the same… never to be found again. The MD informed
from US “Stop production, I am coming back and sorry – I do not have backup and very disappointed by this
negligence of QH & Laboratory functioning”.
NON-CONFORMITY NOTE: 03
Requirement:
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Incident 4
An employee was to attend a conference abroad and forgot her Pouch (containing Passport, Ticket, $ & local
currency, Debit & Credit Cards) in the taxi, after reaching the airport and paying off the fare (distracted due to a call
on mobile) and at the check-in counter realizes that she does not have the Pouch – all she has is her luggage, ladies
purse and boarding pass. She tries call the cab (multiple times) but no response. She comes out of Airport, call her
BOSS, who directs her to come to office. She leaves for office in another cab, but blocks her cards by calling bank (to
prevent further losses) and also uses her mobile for recording FIR with local police. In the evening, she goes home
but surprised to see Police in the house. The police shows her Passport and informs that this passport was found
near a dead body of a person. On observing her Passport, she points out that this was her Passport but the
Photograph in the Passport is not hers and Police was also surprised. Further she shows all evidences to Policy (FIR,
all cab payment receipts, calls she made to Bank to block her cards etc. The police leaves the premises saying “They
would be investigating and she might be required for clarifications, if need be.
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Incident 5
In an Audit of a Public Sector Bank, you observed in Incident # 202 that in activity EOD (End of Day) as on 4 th April,
in daily P & L Statement, the reminder value of the balance is credited into an account of a person every day, who
happens to ex-employee in IT department, who developed the software (grandson of Ex-Board of Director, on whose
recommendation he was employed). Further observing revealed that, there were no debit entry to this credit entry,
as per Accounting Principle# 1 of Bank’s operating manual Ver.2.0 Dt. 5 th March 2017, which says there has to be
corresponding debit entry for each credit entry. All stake holders involved in doing EOD, have declared that they
don’t have this manual & were not aware of this thing has been happening since last 10 years. No other action taken
rather than releasing a new version of the software with this flaw removed – no incident was recorded,
subsequently.
NON-CONFORMITY NOTE: 05
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Failure (Nonconformity):
NC Impact(s):
Confidentiality Integrity Availability
□ YES / □ NO □ YES / □ NO □ YES / □ NO
Exercise – 27
Address:
Management Standard:
Assessment Type:
Mandays :
Nonconformities raised during Assessment
Areas Assessed:
**Disclaimer - Auditing & its conclusion is based on a sampling process of the available information**
Leadership
Planning
Support
Operation
Performance Evaluation
Improvement
ASSESSMENT COMMENTARY
Positive Issues:
Observations:
NCR Management
Reference Details of nonconformity Standard Reference
Exercise-3 External and Internal Issues – list down the external and internal issues consider you company as c
Exercise-7 Draw Organization chart as per your company structure ( only to cover information security team
Exercise-8 Define Roles and responsibilities as per the organization chart in exercise -7