You may already have a method of logging incidents, but are security incidents tracked correctly? The answer is, probably not, and you will need to show you have some method of logging incidents, when it comes to your external audit.
Our log allows you to track the remediation and root cause, but also includes a tracker for Subject Access Requests (SAR). Again, you may already have a method of tracking these, but if you don't, then this tool will allow you to track these also.
Importantly, these two tools together will allow you to assess if there are any trends in the incidents and requests you receive.
This document
All our documents are designed with simplicity in mind. But in their simplicty they meet the both the standards, and your needs.
Use these as a springboard towards continual improvement and see your security management system develop and thrive.
Incident & SAR Log
Hey, we're not going to go all 'legal' on you here... that's not our style. But this is our Intellectual Property, and we'd prefer it if you didn't go sharing this with other people who haven't spent the money and bought a copy.
Of course, we can't really stop you... But are you that kind of person? We don't think you are. So if you want to tell people about your new found super power of ISO27001-Awesomeness, great... just don't give it away for free!