Académique Documents
Professionnel Documents
Culture Documents
I. 3. ISO 19600
• High level structure: (i) Context of the organization (ii) Leadership (iii) Planning (iv) Support (v)
Operation (vi) Performance evaluation (vii) Improvement Information security activities shall be coordinated
by representatives from different parts of the organization with relevant roles and job functions. Whether
measures are taken to ensure that the security controls, service definitions and delivery levels, included in
the third party service delivery agreement, are implemented, operated and maintained by a third party.
curity roles and responsibilities. The Office 365 security policies address purpose, scope, roles,
responsibilities, compliance requirements, and required coordination among the various Microsoft
organizations providing some level of support for the security of Office 365. Office 365 security policies
contain rules and requirements that must be met in the delivery and operation of Office 365. Office 365
employees and contingent staff are accountable and responsible for complying with these guiding principles
in their designated roles.
PERFORMANCE: Establish indicators, measure / analyze performance
• SGCP REVIEW: Ensure periodic review
• CONTINUOUS IMPROVEMENT: Promote and supervise - CAPABILITIES: EVIDENCE COMMITMENT
• Absence of conflict of interest
•Integrity
Control An appropriate set of procedures for information labelling and handling shall be developed and
implemented in accordance with the classification scheme adopted by the organization.
Audit procedure
Whether an appropriate set of procedures are defined for information labelling and handling, in
accordance with the classification scheme adopted by the organization.
Management shall actively support security within the organization through clear direction,
demonstrated commitment, explicit assignment, and acknowledgment of information security
responsibilities. Ensure whether management demonstrates active support for security measures within the
organization. This can be done Information security activities shall be coordinated by representatives from
different parts of the organization with relevant roles and job functions.
ISO 37001
• It focuses on Compliance as part of the organization's culture and emphasizes that compliance is the
responsibility of the governing body rather than simply an internal function.
• Essential in jurisdictions with extraterritorial legislations (USA, United Kingdom) to be able to operate
with companies in your country.
• Establishes a specific management system, which can be included in a general compliance
management system.
II. 3. ISO 37001
II. 3. ISO 37001
• It incorporates requirements and, therefore, is certifiable.
• It is applicable to organizations of any size and sector.
• Presents the structure of High Level, common to all international ISO standards of management
systems, which is integrated in other management systems.
II. 3. ISO 37001
• Specific controls designed to prevent bribery (gifts and invitations, facilitation and extortion payments,
hiring procedures, due diligence measures, etc.)
• It contains practical annexes with concrete and specific examples and recommendations.
UNE 19601
cc: Simone Tagliaferri -
II. 4. UNE 19601
• Has a high level structure
curity roles and responsibilities. The Office 365 security policies address purpose, scope, roles,
responsibilities, compliance responsibilities, compliance requirements, requirements, and required
coordination among the various Microsoft organizations providing some level of support for the security of
Office 365. Office 365 security policies contain rules and requirements that must be met in the delivery and
operation of Office 365. Office 365 employees and contingent staff are accountable and responsible for
complying with these guiding principles in their designated roles.
Office 365 segregates duties and areas of responsibility to reduce opportunities for unauthorized use,
unintentional modification, or misuse of the organization’s assets. Office 365 teams have defined roles as
part of a comprehensive role-based access control mechanism. Additionally, each Office 365 team has
identified role pairs that, if assigned to a single person, would
However, Annex A to '27001 outlines a suite of information security controls that the management
system would typically be used to manage, provided they are in fact applicable to the organization (which
depends on its information security risks). The security controls in Annex A are explained in much more
detail in ISO/IEC 27002, and in various other standards, laws, regulations etc.
• have identified role pairs that would allow for malicious activity without collusion if assigned to a
single person Computer Emergency Readiness Team (US-CERT) to ensure appropriate action can be quickly
taken and advice obtained when necessary. Office 365 relies on Microsoft's global criminal compliance and
Corporate, External, and Legal Affairs (CELA) teams for contacts with law enforcement. Roles and
responsibilities for managing and maintaining these relationships are defined.
Office 365 establishes and institutionalizes contact with selected groups and associations within the
security community to facilitate ongoing security education and training for organizational personnel. Office
365 has partnered with the Microsoft Trustworthy Computing Team to maintain contacts with external
parties such as regulatory bodies, service providers, and industry organizations to ensure appropriate
actions can be quickly taken and advice obtained when necessary.
A management authorization process for new information processing facilities shall be defined and
implemented.
• Ease to synchronize with different standards
• Possibility of integrating management systems, eliminating duplicities
II.4. UNE 19601
• Certifiable standard
• Practical standard: commitment to the structure of the cycle DEMING P-D-C-A, it is not a project with
an end date
• Security in the legal traffic within the supply chain
16-abr-19
• Communication skills, ability to influence Whether the services, reports and records provided by third
party are regularly monitored and reviewed.
Whether audita are conducted on the above third party services, reports and records, on regular
interval.
Whether changes to provision of services, including maintaining and improving existing information
security policies, procedures and controls, are managed.
Does this take into account criticality of business systems, processes involved and re-assessment of risks
• Capacity and prestige
• Competence - GUANTE SGCP: supervision, surveillance and control + resources and personnel -
INDEPENDENCE: access to the OGD and adequate position in the organization
to. Leadership
5.1.3: 15 REQUIREMENT RELATED TO EXECUTION AND SUPPORT FUNCTIONS
-SGCP:
• Ensure implementation
• Effectively deal with criminal risks
• Guarantee the incorporation of the SGCP in the processes of the Organization - RESOURCES: -
Guarantee availability - PERSONAL:
• Comply and make them comply
• Communicate internally importance
• Direct and support
-GOOD CONTINUES:
• Promote it
• Support management roles - REPORT COMMUNICATION:
16-abr-19
Compliance policy
• Compensation systems for compliance achievements
• Evaluations to employees before hiring
•Continuous training
• Communication continues, open and adequate
• Visible recognition of the achievements of compliance management
• Ethical leadership. "Tone at the top"
• As the hierarchical responsibility of a person in an organization increases, it increases their visibility and
ability to influence the behavior of others.
b. Compliance Culture
• The way of acting (behavior) of the members of Senior Management moves the way of acting of the
rest of the individuals that make up the organization: visible, consistent and sustained commitment over
time with a standard of common behavior
b. Compliance Culture
• The business culture must be an element that positively influences the behavior and attitude of all
those who make up the organization: culture of compliance
b. Compliance Culture
b. Compliance Culture
Change perception detection and punishment
16-abr-19
behaviors could entail the criminal responsibility of the juridical person, taken care of the concrete
circumstances of the organization. Analysis: It consists in analyzing what probability exists that they are
materialized and what its consequences would be, in such case. This analysis is what finally allows us to
assess criminal risks. Valuation: Consists in the prioritization of criminal risks and, therefore, of the resources
destined to their prevention, detection and management, emphasizing those that suppose a greater than
low risk.
c. The SGCP - Planning
The SGCP: Planning and operational control
cc: fensterbme –
Saved
Community