What is ISO 18788:2015 - PSO?

ISO 18788 specifies the requirements and provides guidance for organizations that conduct or contract security operations. Moreover, it provides a framework for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a Security Operations Management System. It enables the constant development of security services while ensuring customer safety and respect for human rights. This standard demonstrates compliance with laws and regulations, respect for human rights, and the establishment of professional security operations to better meet the customer’s and stakeholder’s needs.

Benefits of ISO 18788:2015 - PSO Certification

Ability to win more business

Procurement specifications often require certification as a condition to supply, so certification opens doors.

Customer Satisfaction

Deliver products that consistently meet customer requirements and a service that is dependable and can be relied on.

Improved stakeholder relationships

Improve the perception of your organization with staff, customers, and suppliers.

Legal Compliance

Understand how statutory and regulatory requirements impact your organization and its customers.

Improved Risk Management

Greater consistency and traceability of products and services means problems are easier to avoid and rectify.

Proven Business Credentials

Independent verification against a globally recognized industry standard speaks volumes.

Check out the ISO 18788 Video

Who can be certified ISO 18788?

Manned Guarding

Housekeeping

Bodyguard

Investigation

Corporate Intelligence

Consultancy Services

Document required for ISO 18788:2015

  • System Manual
  • System Procedure
  • Policy
  • Objectives
  • Mission & Vision
  • Standard Operating Procedure (SOP)
  • Checklist
  • Forms
  • Formats
  • Records

The extent of Documented Information differs as per:

  • Organization’s size
  • Activities performed by the organization
  • Processes undertaken by the Organization
  • Products and services offered by the organization
  • The complexity of processes undertaken
  • Competence of persons involved

Role of Shamkris and Process of ISO 18788 Certification

Shamkris adopts a results-oriented approach to effective system implementation in the organization. A simple and practical method of system implementation helps organizations increase business efficiency and sustainability. Shamkris supports 100% documentation to obtain a certificate of success in addition to enhanced performance.

The implementation process is described below:

Day 1

GAP Analysis, Certification Body, Selection, Cost Estimates

• Finding the GAP between existing system related to ISO requirements
• Selecting the appropriate certification body
• Based on the scope of your business & certification body you choose

Week 1

Developing Documents

• Management System Manual, Management System Procedures, Policy, Objectives, Forms etc.
• Review of Standard Operating Procedures (SOP)

Week 4

Implementing Management System

• ISO Awareness training for the top management and staff
• Implementing a well-documented management system throughout the organization

Week 8

Internal Audit
MRM
CAPA

• Internal audits identifying nonconformities related to ISO requirements
• Management Review Meetings
• Corrective and Preventive Action plan for nonconformities

Week 10

Certification Body
Audit
N-C Closing

• Shamkris acts on your behalf and assists you in the third-party audit
• Closing of any nonconformities identified by the certification body

Week 12

Certificate Issued

• ISO certificates issued for 3 years
• Surveillance Audits yearly

Year on Year

Yearly Compliance

• Support of Yearly documentation for audit

z

Understand the International Organization for Standardization (ISO) guidelines is where the TQM process can become a bit overwhelming. These standards are guidelines on how to document the processes in specific industries. The goal is consistency and a set of complete, easy-to-follow instructions.

With the increase in the number of cyberattacks, the security teams of organizations must be vigilant at all times. Security operations management integrates various automation tools with human analysts to monitor and detect threats efficiently.

The OPSEC process includes the following five steps: (1) identify critical information, (2) identify the threat, (3) assess vulnerabilities, (4) analyze the risk, (5) develop and apply countermeasures.