What's New Unreplied Topics Membership About Us Contact Us Privacy Policy
[Ad]

BRC issue 8, clause 3.11 - cyber security procedure

Started by , Jul 31 2020 03:13 PM
3 Replies

Under section 3, clause 3.11.1 it is a requirement that organizations implement procedures to document and handle cyber attacks or the failure of their internet security. Does anybody have this type of document or procedure?

 

Thank you 

 

Share this Topic
Topics you might be interested in
Looking for Management of Change Procedure and Risk Template Finding for ISO22000 Clause 6.2.2 Assessment for Production Risk Zones based on Clause 4.3.1 of BRC Issue 9 Procedure for SOP Sign Off's? Xray and HACCP Plans (CP and operating procedure)
[Ad]

Under section 3, clause 3.11.1 it is a requirement that organizations implement procedures to document and handle cyber attacks or the failure of their internet security. Does anybody have this type of document or procedure?

 

Thank you 

 

 

Under section 3, clause 3.11.1 it is a requirement that organizations implement procedures to document and handle cyber attacks or the failure of their internet security. Does anybody have this type of document or procedure?

 

Thank you 

 

 

Hi Maria,

 

JFI, note that the text is -

 

This shall include consideration of contingency plans to maintain product safety, quality and legality. Incidents may include .............

Under section 3, clause 3.11.1 it is a requirement that organizations implement procedures to document and handle cyber attacks or the failure of their internet security. Does anybody have this type of document or procedure?

 

Thank you 

 

The point Charles raises about the "shall" vs. "may" requirements in the clause is very valid - I'd start by doing a documented assessment of what IT you're actually using. If your production process is manually controlled or not linked to any sort of network, and your order processing is all on paper, then the potential significance of a cyber attack is extremely limited. Conversely, if your production equipment is all linked to your company LAN and all order and warehouse management is computerised then one case of the encryption malware that seems to be increasingly common at present will bring your entire operation to a halt...

Really the scope and significance of this type of procedure is very much dependent on exactly what you're doing, so start with an assessment of that. If you don't have in-house IT staff then it might be worth bringing a consultant in.

IMEX BRC auditors aren't necessarily expecting IT security systems to be documented as part of your "normal" quality manual - merely a few notes in your crisis management plan documenting broad details (existence of backups, existence of security controls etc) is sufficient. The scale of what you'll be able to do may depend on your company's approach, too. For example we have extremely comprehensive IT security protocols, but no-one outside of the most senior levels of IT are allowed to see the full details of these, let alone copy them into another procedure for BRC! 

The actual specifics of the plan are a difficult item to share as, understandably, it's not something that many businesses want to become public knowledge given that this could very significantly undermine the effectiveness of the plan - e.g. if an attacker knows where and how our backups are stored then they're significantly less reliable...

1 Thank

Similar Discussion Topics
Looking for Management of Change Procedure and Risk Template Finding for ISO22000 Clause 6.2.2 Assessment for Production Risk Zones based on Clause 4.3.1 of BRC Issue 9 Procedure for SOP Sign Off's? Xray and HACCP Plans (CP and operating procedure) BRC Issue 8 interpretation guidelines Courses Needed for BRCGS Issue 9 Non-Conformance Auditor Dispute: Sampling Technique Competency vs. Test Procedure Effectiveness Hair and Beard Covering Risk Analysis for Packaging Facilities (BRCGS Issue 7) FSSC 22000 Equipment Management Procedure: Template Request