ISO 18788 - Clause 8.1.1 General
- Andy Systems
- SOMS Guides
8.1.1 General Requirements:
-
Process Planning and Control: The organization must plan, implement, and control its processes to meet its requirements and objectives, as outlined in Clause 6.1 of the ISO 18788 standard.
-
Establishing Criteria: Criteria must be established for these processes to ensure they meet the organization's standards and requirements.
-
Process Control: The organization should implement controls for its processes based on the established criteria.
-
Documented Information: Documented information should be maintained to ensure confidence that the processes have been carried out as planned.
-
Identifying Associated Activities: The organization must identify activities associated with significant risks and align them with its security operations management policy, risk assessment, objectives, and targets.
-
Compliance: These activities should help the organization comply with legal and regulatory requirements, protect the client's reputation, adhere to local and international laws (including humanitarian and human rights laws), ensure the well-being of personnel, respect local communities, and implement risk management controls.
-
Documented Procedures: The organization should establish, implement, and maintain documented procedures to control situations where the absence of such procedures could lead to deviations from the SOMS policy, objectives, and targets.
-
Change Control: Planned changes must be controlled, and unintended changes should be reviewed to assess their consequences. Necessary actions should be taken to mitigate adverse effects.
-
Outsourced Processes: The organization is responsible for ensuring that outsourced processes are also controlled to meet its security and management objectives.
This above provides a foundation for organizations to establish, document, and maintain processes that align with ISO 18788 requirements and promote effective security operations management. It emphasizes the importance of planning, control, compliance, risk management, and documentation in achieving security objectives.