- 377
- 317 298
Stuart Barker
United Kingdom
Приєднався 5 сер 2011
Do It Yourself ISO 27001 - Training and Tutorials from the ISO 27001 Ninja.
Hello! I am Stuart Barker, the ISO 27001 Ninja and welcome to my channel.
I am specialist in ISO 27001 with over 30 years in industry.
It is my mission to provide you everything you need for ISO 27001 and ISO 27001 certification. My channel is dedicated to showing you how to do it yourself and giving you the tips, tricks and secrets they do not want you to have.
I am an author, speaker, online teacher/video creator, and creator of the award winning and fastest selling - Ultimate ISO 27001 Toolkit: hightable.io/ISO-27001-toolkit/
To date I have helped over 5,000 companies to get ISO 27001 Certified. Will you be next?
If you want to work with my company go here:
hightable.io
Hello! I am Stuart Barker, the ISO 27001 Ninja and welcome to my channel.
I am specialist in ISO 27001 with over 30 years in industry.
It is my mission to provide you everything you need for ISO 27001 and ISO 27001 certification. My channel is dedicated to showing you how to do it yourself and giving you the tips, tricks and secrets they do not want you to have.
I am an author, speaker, online teacher/video creator, and creator of the award winning and fastest selling - Ultimate ISO 27001 Toolkit: hightable.io/ISO-27001-toolkit/
To date I have helped over 5,000 companies to get ISO 27001 Certified. Will you be next?
If you want to work with my company go here:
hightable.io
How to implement ISO 27001Annex A 8.14 Redundancy of Information Processing Facilities
Discover how to implement ISO 27001 Redundancy of Information Processing Facilities and pass the audit. This step by step tutorial walks you through how to implement it, pass the audit, common mistakes people make and what an auditor will look for.
🧰 Do It Yourself ISO 27001 Certification with the Ultimate ISO 27001 Toolkit - hightable.io/ISO-27001-toolkit/
The ISO 27001 standard was updated in 2022 with changes to ISO 27001 Redundancy of Information Processing Facilities and this the ISO 27001:2022 updated changes to Annex A 8.7 and exactly what do you need to do.
🤓 Learn Redundancy of Information Processing Facilities ISO 27001- hightable.io/iso-27001-annex-a-8-14-redundancy-of-information-processing-facilities/
*What is ISO 27001 Redundancy of Information Processing Facilities?*
ISO 27001 Redundancy of Information Processing Facilities is an #iso27001 control that requires an organisation to implement information processing facilities with redundancy built in that is sufficient enough to meet availability requirements.
*How to implement ISO 27001 Redundancy of Information Processing Facilities*
The steps to implement Redundancy of Information Processing Facilities ISO 27001 for #iso27001certification are:
1. Understand and record the legal, regulatory and contractual requirements you have for data
2. Conduct a risk assessment
3. Based on the legal, regulatory, contractual requirements and the risk assessment you will implement a redundancy solution
4. Document and implement your processes and technical implementations for redundancy
5. Check that the controls are working by conducting internal audits
🧰 Do It Yourself ISO 27001 Certification with the Ultimate ISO 27001 Toolkit - hightable.io/ISO-27001-toolkit/
The ISO 27001 standard was updated in 2022 with changes to ISO 27001 Redundancy of Information Processing Facilities and this the ISO 27001:2022 updated changes to Annex A 8.7 and exactly what do you need to do.
🤓 Learn Redundancy of Information Processing Facilities ISO 27001- hightable.io/iso-27001-annex-a-8-14-redundancy-of-information-processing-facilities/
*What is ISO 27001 Redundancy of Information Processing Facilities?*
ISO 27001 Redundancy of Information Processing Facilities is an #iso27001 control that requires an organisation to implement information processing facilities with redundancy built in that is sufficient enough to meet availability requirements.
*How to implement ISO 27001 Redundancy of Information Processing Facilities*
The steps to implement Redundancy of Information Processing Facilities ISO 27001 for #iso27001certification are:
1. Understand and record the legal, regulatory and contractual requirements you have for data
2. Conduct a risk assessment
3. Based on the legal, regulatory, contractual requirements and the risk assessment you will implement a redundancy solution
4. Document and implement your processes and technical implementations for redundancy
5. Check that the controls are working by conducting internal audits
Переглядів: 62
Відео
How to implement ISO 27001 Annex A 8.13 Information Backup and pass the audit
Переглядів 71День тому
How to implement ISO 27001 Annex A 8.13 Information Backup and pass the audit
How to implement ISO 27001 Annex A 8.12 Data Leakage Prevention and pass the audit
Переглядів 11014 днів тому
How to implement ISO 27001 Annex A 8.12 Data Leakage Prevention and pass the audit
How to implement ISO 27001 Annex A 8.11 Data Masking and pass the ISO 27001 certification audit.
Переглядів 12014 днів тому
How to implement ISO 27001 Annex A 8.11 Data Masking and pass the ISO 27001 certification audit.
How to implement ISO 27001 Annex A 8.10 Information Deletion and pass the audit
Переглядів 12414 днів тому
How to implement ISO 27001 Annex A 8.10 Information Deletion and pass the audit
ISO 27001 Configuration Management | Annex A 8.9 | Explained
Переглядів 313Місяць тому
ISO 27001 Configuration Management | Annex A 8.9 | Explained
ISO 27001 Management of Technical Vulnerabilities | Annex A 8.8 | Explained
Переглядів 2012 місяці тому
ISO 27001 Management of Technical Vulnerabilities | Annex A 8.8 | Explained
ISO 27001 Protection Against Malware | Annex A 8.7 | Explained
Переглядів 2382 місяці тому
ISO 27001 Protection Against Malware | Annex A 8.7 | Explained
ISO 27001 Capacity Management | Annex A 8.6 | Explained
Переглядів 1992 місяці тому
ISO 27001 Capacity Management | Annex A 8.6 | Explained
ISO 27001 Secure Authentication | Annex A 8.5 | Explained
Переглядів 1352 місяці тому
ISO 27001 Secure Authentication | Annex A 8.5 | Explained
ISO 27001 Access To Source Code | Annex A 8.4 | Explained
Переглядів 1392 місяці тому
ISO 27001 Access To Source Code | Annex A 8.4 | Explained
ISO 27001 Information Access Restriction | Annex A 8.3 | Explained
Переглядів 1112 місяці тому
ISO 27001 Information Access Restriction | Annex A 8.3 | Explained
ISO 27001 Privileged Access Rights | Annex A 8.2 | Explained
Переглядів 1972 місяці тому
ISO 27001 Privileged Access Rights | Annex A 8.2 | Explained
ISO 27001 User Endpoint Devices | Annex A 8.1 | Explained
Переглядів 2082 місяці тому
ISO 27001 User Endpoint Devices | Annex A 8.1 | Explained
ISO 27001 Secure Disposal or Re Use of Equipment | Annex A 7.14 | Explained
Переглядів 943 місяці тому
ISO 27001 Secure Disposal or Re Use of Equipment | Annex A 7.14 | Explained
ISO 27001 Equipment Maintenance | Annex A 7.13 | Explained
Переглядів 893 місяці тому
ISO 27001 Equipment Maintenance | Annex A 7.13 | Explained
ISO 27001 Cabling Security | Annex A 7.12 | Explained
Переглядів 883 місяці тому
ISO 27001 Cabling Security | Annex A 7.12 | Explained
ISO 27001 Supporting Utilities | Annex A 7.11 | Explained
Переглядів 983 місяці тому
ISO 27001 Supporting Utilities | Annex A 7.11 | Explained
ISO 27001 Storage Media | Annex A 7.10 | Explained
Переглядів 1013 місяці тому
ISO 27001 Storage Media | Annex A 7.10 | Explained
ISO 27001 Security of Assets Off Premises | Annex A 7.9 | Explained
Переглядів 1293 місяці тому
ISO 27001 Security of Assets Off Premises | Annex A 7.9 | Explained
ISO 27001 Equipment Siting and Protection | Annex A 7.8 | Explained
Переглядів 1033 місяці тому
ISO 27001 Equipment Siting and Protection | Annex A 7.8 | Explained
ISO 27001 Clear Desk and Clear Screen | Annex A 7.7 | Explained
Переглядів 1663 місяці тому
ISO 27001 Clear Desk and Clear Screen | Annex A 7.7 | Explained
ISO 27001 Working In Secure Areas | Annex A 7.6 | Explained
Переглядів 863 місяці тому
ISO 27001 Working In Secure Areas | Annex A 7.6 | Explained
ISO 27001 Protecting Against Physical and Environmental Threats | Annex A 7.5 | Explained
Переглядів 1223 місяці тому
ISO 27001 Protecting Against Physical and Environmental Threats | Annex A 7.5 | Explained
ISO 27001 Physical Security Monitoring | Annex A 7.4 | Explained
Переглядів 1343 місяці тому
ISO 27001 Physical Security Monitoring | Annex A 7.4 | Explained
ISO 27001 Securing Offices, Rooms and Facilities | Annex A 7.3 | Explained
Переглядів 1623 місяці тому
ISO 27001 Securing Offices, Rooms and Facilities | Annex A 7.3 | Explained
ISO 27001 Physical Entry Controls | Annex A 7.2 | Explained
Переглядів 1543 місяці тому
ISO 27001 Physical Entry Controls | Annex A 7.2 | Explained
ISO 27001 Physical Security Perimeters | Annex A 7.1 | Explained
Переглядів 2493 місяці тому
ISO 27001 Physical Security Perimeters | Annex A 7.1 | Explained
ISO 27001 Information Security Event Reporting | Annex A 6.8 | Explained
Переглядів 1073 місяці тому
ISO 27001 Information Security Event Reporting | Annex A 6.8 | Explained
This is great thank you for this.
You're very welcome! 🙏
What about cross borders?
There is a little more information in the blog for information transfers - hightable.io/iso-27001-annex-a-5-14-information-transfer/ but the controls are not stand alone and for this question you would also want to consider - ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements - which is in hightable.io/iso-27001-annex-a-5-31-legal-statutory-regulatory-and-contractual-requirements/ - I can explain more if you join the weekly Q and A sessions or book a 1 to 1 with me. 🙏
Hey Stuart, I have one question regarding asset inventory, If you could help me out here. If a company is aiming to achieve ISO 27001 certification and they have few people using company assets and few using BYOD option. What would be your best suggestion to make an asset inventory document. Or any other suggestions. Thanks
In the main video I go through this and for me all assets go in the asset register. Even the BYOD assets go in the asset register. It does not mean that the company controls them directly but it allows you to do things like restrict access to just those devices and put in place compensating controls that reduce the risk of BYOD. A little bigger topic than comments here allow but you can watch the main video or book onto the weekly Q and A or get a 1 to 1 with me and we can go through. 🙏
@StuartBarker thank you for the quick response. Much appreciated for your insightful input.
Are you going to start a new video series? I am looking forward to it. Thanks.
Great content as always. These videos have provided priceless ISO guidance. Can I ask, you referred to a operational security dashboard. Can you recommend any publicly available products that an organisation could consider, please? Thank you,
You will have tools that manage your infrastructure that you can export reports from. You will have anti virus, patching, end point protection - these will have built in reporting that you can export to a dashboard. Your incident management system will generate reports. The key is to pull together sources of data relevant to you and present it in a way that it can be understood. I do not know one 'tool' per se as some things could be manual things that you are reporting on. Keep it simple, reuse what you have. Speak with your tech teams to understand what data can be extracted. If you have a third party managing it then negotiate the reports that they give you based on what you need them to report and the frequency of doing so. I do a weekly Q and A and you can take 1 free 1-to-1 with me if you have questions. Hard to answer generically in comments but I think you get the idea.
@@StuartBarker Greatly appreciate your input, thank you.
I have a doubt that if an University is going for ISMS for it's ITS department then will the IPs be counted of the whole university?
What issues could there be with people, time? Etc? Thank you.
I go through in a blog and video and in my toolkit but high level the issues with people could be that you don't have anyone qualified or experienced in ISO 27001, time could be that you don't have time to implement and ISMS due to organisation pressures - projects - deliverables - understaffing. Check out the full video for a more detailed explanation. Thanks for the question though - a great question!
is it possible to pay in installments on every month for new budget employees and similarly few contents slowly slowly.
please continue and complete the rest of the Technological controls. Its very useful
Yes - on the plan :) they take up a bit of time but I am nearly there. Thank you for the feedback. I hope to do more this week! Keep watching. 🙏
@@StuartBarker Thanks for the response. Sure. Waiting for the videos.
like if Stuart Barker is your new favorite youtuber 😄
thank you :)
Thanks so much for this. Very useful information. I've just purchased the template.
That is great - the main toolkit is currently on offer and worth a look. Thank you. 🙏
Good video Stuart. A question I have relates to your comment "We have to audit everything at least once". In your experience, are you referring to 'at least once each 3-year certification period', as opposed to once each year?
Every calendar year between external audit cycles. I have seen where people do once per 3 year cycle and get an observation, minor or major non conformity. I appreciate this doesnt seem consistent but it is auditor dependant. The best practice approach would be once per calendar year minimum but I have a video on audit planning that explains in more detail - this link should take you direct to the relevant section - ua-cam.com/video/hz_hPt4DZvw/v-deo.html
Sorry the relevant section is 4 minutes and 9 seconds.
@@StuartBarker Yes, I agree that the internal audit program should be implemented regularly between external CAB audits. Perhaps I should have put my question more clearly - would you suggest that the entire ISMS (processes and controls) are to be audited every year, or a sampled approach is taken over the 3-year certification cycle on the basis of process criticality or risk exposure?
@dbellconsulting - the video that I link goes into the nuances of it but ISO 27001 is a risk based system so the audit program is based on risk. A good starting point is to audit the entire ISMS every year as I have seen that the ISMS itself often gets overlooked and I have seen auditors raise that as a non conformity. Start on the basis of once a year for the entire ISMS and with the knowledge that certain parts of the ISMS may require auditing more than once in that one year cycle. The video on audit planning sets out the exact way I would go about it and the variations / exceptions and considerations to take. For me, once per year would be the minimum to ensure an effective management system - if I was talking broad brush. If it is right for you to do a sampled approached over the 3 year certification cycle based on your risk and you are comfortable you can justify the approach then that should be fine but I would treat this more as an exception than the rule. 🙏
thank you for your sharing.
Is the incident and corrective action log used to also capture/record nonconformities identified during audits?
yes. It is one way to do it and the way I do it. 🙏
@ thank you so much
Hey, Could you please make a video on control: 8.10 Information deletion, specially when the organization has already implemented a retention schedule to comply with the process. Need to know few ideas to implement this. Thankyou
Working through them and it coming soon but you can jump on a free weekly clinic to ask me questions and run through. Website menu / learn / iso 27001 clinic - to book
Just uploaded today - 9 dec 2024 - ua-cam.com/video/u_Kgm9Ucl-o/v-deo.htmlsi=kU5scRkGlHMlLkm7
Excellent job, dear sir. May God bless you from Pakistan.
Hi, I'm curious, you say that the 2022 update requires the 'Context of the Organisation' document to explicitly show how the organisation is 'satisfying the requirement', but in the template this column is only used from the 'Interested Parties' table. It is not included in the 'Internal' and 'External issues' tables - do we not also need to show this in these sections? Or is it that this is expanded upon in the Risk Register enough?
This was included in the 2022 update to the template and is in the latest toolkit to make it explicit. I even pre fill it with examples. The previous assumption was people would know how the ISMS meets requirements but you cannot assume anything so I updated it to make it more explicit. Thanks for watching and good spot that many would not. Latest template and toolkit = it is included.
@@StuartBarker thank you. I must be working from the old version. You've reminded me to look at the updates. thank you. Your product is great. I'm getting through it!
So I have a question: When you say software register, as an MSSP we resell software to clients do we need to keep this as part of our software register? i.e. licenses for clients? software for clients?
@jack_b_za6415 You can jump on a free weekly clinic or grab a 1 to 1 as hard to answer in small comments but I would expect that you have a register of all your clients, what software they have purchased, the licenses that go with that. THEY will have a requirement under the intellectual property control to evidence licensing and software and if they rely on you they will expect that you can evidence it. Which alludes to what this control is about. Do you know, in total, what you have in place for your ISO 27001 scope ( I narrow it here but really you would want to know EVERYTHING you have ). The control wants what YOU have but it clearly makes sense, based on what you tell me and the requirements your clients have that you have this for clients and what you sell also. Hope makes sense - jump on a clinic or call to chat through if you need more.
going to start applying the audit compliance report on my completed tasks/audit so i can keep track on what has been applied. Thank you.
writing my ISO27001:20222 Practitioner exam in 3days and I came through your ISO27001 series- I'm hooked and everything is explain clearly.
Thank you and good luck with the exam. Let me know how you found it. 🙏
What is the difference between 5.29 and 5.30. Because these two seems to be same, could you please provide the clarification.
5.29 - hightable.io/iso-27001-annex-a-5-29-information-security-during-disruption/ 5.30 - hightable.io/iso-27001-annex-a-5-30-ict-readiness-for-business-continuity/ 5.29 - what are your information security requirements during a disruption and how do they differ from production 5.30 - what ICT disaster recovery do you have in place
excellent explanation thank you!
We are a very small company with 10 employees total. Would the same 3 leadership people be assigned to all these roles or do I remove some of roles? For instance, I'm the CEO and probably the Information Security Manager.
@lecompt - A person can hold more than one role. This video is the explanation and help - > ua-cam.com/video/_CP7vr-8MYk/v-deo.html
audio bad
Appreciate the feedback. It is taken directly from a Teams recording of a real life session so yeah, not great but the content hopefully is on point. Appreciate the feedback though - check out the other actual training and implementation videos that are in 4k with dolby surround. 🙏
@@StuartBarker thank you The content is good. But i haven't Completed all the parts yet
Your content is fantastic. A great help get a good perspective on the ISO 27001 implementation.
I appreciate that. Thank you. Makes doing them worth while if they are helping people. 🙏
Hi Stuart, thank you so much for all your great content and easy to follow examples. Just to be sure: i think you might have missed a "2" in your policy in chapter 3.3 when referencing 27002:2022 Clause 5.3. Shouldn't it be "Clause 5.23" since 5.3 deals with the segregation of duties?
I think you are probably correct. I get caught up in the moment but hopefully it helped. You certainly know your onions! :) 🙏
Very useful information. Thank you very much!
thank u so much, that all i need 🎉
Hey, happy to help! thanks for the feedback 🙏
US DOD 5220.22-m (3 passes or 7 passes).
Short, informative, to the point. I really enjoy your videos. :)
This stuff is a headache for more technical and not so risk/management oriented people like me, this is very well put and has good examples.
thank you so much, exactly what i was looking for
@stuart barker - if I watch all these videos, can I claim I'm ISO 27001 lead auditor/implementer?
I watched George Clooney back in the day in Batman. It did not make me Batman nor sadly George Clooney but inside, you know, and I know, I really am Batman. So maybe ....
Hi Stuart Can you please share the link to this deployment guide? Thank you
Of course: hightable.io/how-to-write-deploy-and-implement-iso-27001-policies/
i'm enjoying these daily hits on the various controls...very good stuff
Great! Thanks for sharing. Appreciated.
Hi Stuart, how difficult is it to get this kind of work? I have been working in different areas of IT for years. I have a Msc in Cyber, CISSP. I worked as an information security manager for a large organisation for 2+ years. Now recently moved to a Cybersecurity GRC role for group of universities. I am at the early stages of the ISMS and it a great learning experience, I am getting to build it out and right in the mix of it. Lots of cloud infra. I would love to at some point have my own company and do this type of work.
@paul4561 - you can book a free 1 to 1 with me on hightable.io - I have previously built and sold a company doing this although now I give knowledge away for free. Also this video is from a consultant coaching programme I do - ua-cam.com/video/HojVRKC6FPU/v-deo.html - it is doable.
@@StuartBarker Thank you, must get chatting to you :)
Is it possible to only buy "The ISO 27001:2022 ISMS - audit worksheet"? it is accessible just in ISO 27001 Gap Analysis and Audit Tool whole package :(
Linkin with me and I can share with you... 👍
@@StuartBarker Thank you so much. How can I contact you? email, LinkedIn chat, or other ways?
Short and simple, great work! Thank you for sharing.
Is this a good series to learn to land a job?
Depends what kind of job you want there Florida Investor ! I would say it is information that you would pay someone to train you on and is based on 30+ years experience but only you can judge its value. As for landing a job ... I wanted to be a stripper but I don't think it's going to help me with that... I guess it all about context 🙏
I've just bought it. Finally a reasonable risk register. Good Job!
Great Discussion, love your presentation style and love your ISO pack!
Hi Stuart, this document example focuses on Cloud Supplier, just wondering would we not need to talk about the actually Cloud security we have in place, firewalls, anti-virus and so on?
Yes Ryan. This is part of the overall puzzle. This policy meets the requirements for having a cloud services policy and the requirements for cloud providers but remember that the standard is made up of many policies and Annex A controls that address specifics such as access control, network security, physical security, anti malware and much much more. The points you raise are addressed, but not here. Which out of context may seem strange but we are creating building blocks to create a house. What ever house you need and want. You can join the Q and A or drop me a 1 to 1 and I can cover for you in more detail than the comments allow. 🙏
One of many additional videos that support this area that will add some context to this 'how to' video - ua-cam.com/video/pD9xeH-NlM8/v-deo.html
👍
This is an excellent foundation. Thank you! I'm learning a ton. Context is everything!
I never thought I'd get fuckin iso27001 shorts....
Your / You're welcome ☺️
@@StuartBarker Hahaha, so fair man, so fair.
Great breakdown on implementing ISO 27001 Annex A 5.7 for threat intelligence! What are some common pitfalls to avoid during the audit?
Thank you - I cover what you need in the blog that goes with the video - it is here for reference - hightable.io/iso-27001-annex-a-5-7-threat-intelligence/ 🙏
Obrigado!
Muito obrigado!
Muito obrigado!