Documented evidence is crucial in demonstrating that processes within an Information Security Management System (ISMS) have been carried out as planned. For ISO 27001: 2022 compliance, the following types of documented evidence can be used:
1. Policies and Procedures
Information Security Policy
Document detailing the organization's commitment to information security.
Procedure Documents
Detailed step-by-step instructions on how to perform specific processes.
2. Records of Activities
Audit Logs
Logs that capture the details of security events, user activities, and system changes.
Access Control Records
Records showing who accessed what information and when.
3. Risk Management Documentation
Risk Assessment Reports
Documents identifying potential risks and their impact.
Risk Treatment Plans
Plans detailing the measures taken to mitigate identified risks.
4. Training and Awareness Records
Training Attendance Sheets
Lists showing which employees attended training sessions.
Training Materials
Copies of materials used during training sessions.
Awareness Campaign Records
Evidence of communication efforts (emails, posters, intranet announcements).
5. Implementation Records
Change Management Logs
Records of changes made to systems and processes.
Configuration Management Records
Details of system configurations and changes.
6. Monitoring and Measurement Records
Performance Monitoring Reports
Regular reports showing the performance of security controls.
Incident Reports
Documentation of security incidents and the response actions taken.
7. Audit and Review Documentation
Internal Audit Reports
Findings from internal audits.
External Audit Reports
Findings from external audits.
Management Review Minutes
Minutes from management review meetings discussing ISMS performance.
8. Corrective and Preventive Action Records
Corrective Action Reports
Documentation of actions taken to correct non-conformities.
Preventive Action Plans
Plans detailing preventive measures to avoid future non-conformities.
9. Supplier and Third-Party Management Records
Contracts and SLAs
Agreements with suppliers and third parties detailing security requirements.
Supplier Audit Reports
Reports from audits of third-party service providers.
10. Communication Records
Meeting Minutes
Documentation of meetings discussing ISMS-related topics.
Email Communications
Emails related to ISMS activities, decisions, and updates.
11. Compliance and Legal Records
Legal and Regulatory Compliance Reports
Documentation demonstrating compliance with applicable laws and regulations.
Data Protection Impact Assessments (DPIAs)
Assessments detailing how data protection risks are managed.
Example Evidence for Specific ISMS Processes:
A. Risk Assessment Process
· Risk Assessment Report
· Details of identified risks, their impact, and likelihood.
· Risk Treatment Plan
· Actions planned or taken to mitigate risks.
· Meeting Minutes
· Discussions about risk assessment outcomes and decisions made.
B. Access Control Process
· Access Control Policy
· Guidelines for granting and revoking access rights.
· Access Logs
· Records of who accessed what information and when.
· User Access Reviews
· Periodic reviews of user access rights.
C. Incident Management Process
· Incident Response Plan
· Steps to follow in case of a security incident.
· Incident Reports
· Detailed reports of each security incident and the response actions taken.
· Post-Incident Review
· Analysis of the incident to prevent future occurrences.
D. Training and Awareness Program
· Training Attendance Sheets
· Records of employees who attended the training.
· Training Materials
· Slides, handouts, and other materials used during training sessions.
· Feedback Forms
· Employee feedback on the training sessions.
By maintaining comprehensive and accurate documented evidence for each process, an organization can effectively demonstrate that its ISMS processes have been carried out as planned, ensuring compliance with ISO 27001:2022 standards.
WE ARE HERE TO HELP!
CLICK HERE for a Dogma C3X free trial!
Dogma C3X is an Intelligent Business Consulting Platform inspired by the 3Cs industry model, which offers a strategic look at the pillars that every company needs for success: Customers – Company – Competitors. "Intelligent" because by using artificial intelligence (AI) and machine learning (ML) it can collect, process, and analyze the growing tsunami of data (structured and unstructured) related to the 3Cs, which is incredibly valuable. Only by strengthening, positioning, and integrating these three pillars (Customers - Company - Competitors) you will be able to build a sustainable competitive advantage.
- Written by:Innovation Team
- Posted on:August 8, 2024
- Tags: