top of page
Fortsetzen

ISMS and ISO27001

An Information Security Management System (ISMS) is designed to focus on an organization’s business processes, ensuring the protection of both its processes and information. A well-conceived, thoroughly implemented ISMS enhances operational efficiency and delivers tangible value across the entire organization. A key component of an ISMS is a structured framework of methodologies that not only facilitates implementation but also ensures the effective management and continuous operation of the system.

Kickoff Meeting

In an initial meeting with the client’s project initiators, key organizational aspects are clarified: What are the objectives? What is the scope? Who are the stakeholders?

For most information security and cybersecurity requirements, the ISO 27001:2022 standard is a recommended foundation. It can be implemented fully or partially, depending on the client’s specific goals and requirements.

2

Project Framework

In collaboration with the project initiators and, whenever possible, the relevant stakeholders, the project framework is defined, including the planned project duration, phases/milestones, and work packages. Key performance indicators (KPIs) for project management, reporting to the client-side initiator, and an escalation process are also agreed upon.

3

ISMS Guideline

The ISMS Guideline serves as the central document for implementing an ISMS. In this document, the organization's management formally declares its commitment to information security. It defines the scope of the ISMS, establishes security objectives, and ensures that the necessary resources for implementation are provided.

4

Initial Assessment

An initial assessment, conducted in a workshop format with the organization's relevant stakeholders, provides a comprehensive overview of existing structures, processes, and gaps related to information security. This assessment is based on the ISO 27001:2022 Statement of Applicability (SoA). Depending on the objectives set during the kickoff meeting, the assessment may be conducted comprehensively or with a focus on specific areas.

The findings from this assessment form the foundation for the next steps in the project.

5

ISMS Dokuments und Structures

Documents defining the ISMS requirements, responsibilities, structures, and processes are developed in close collaboration with the organization’s stakeholders. The scope and priority of document development are tailored to the organization’s specific objectives and executed as work packages within the project framework.

These documents also establish key topics and parameters that govern the cyclical operation of the ISMS, including organizational structures, reporting mechanisms, and KPIs for measuring the system’s effectiveness.

6

Analysis of Business Processes

Based on the established ISMS documents and their defined parameters, analyses of business processes and the associated information are conducted. These analyses include the Protection Needs Assessment (SBA – operational), Business Impact Analysis (BIA – emergency scenarios), and Risk Analysis (impact assessment).

The collected data enables the evaluation of risks both in day-to-day operations and in emergency situations, allowing for the definition of appropriate mitigation measures. A Risk Treatment Plan and an Emergency Response Plan are developed in collaboration with the relevant organizational stakeholders and reported to management. The necessary measures are approved by management and implemented by the stakeholders in coordination with the Information Security Officer (ISB).

7

Awareness and Communication

Awareness and training initiatives ensure that information security is embedded in the company culture, engaging employees actively and fostering a strong security mindset.

A communication plan defines what, when, and with whom ISMS-related information is communicated. Internal and external stakeholders are identified, and communication activities are tailored accordingly to ensure transparent, clear, credible, and appropriate messaging.

8

Incident Management and Security Operations

Effectively managing cybersecurity incidents requires not only modern technology but also well-defined policies and processes. Incident management establishes roles and responsibilities for identifying, reporting, and responding to cybersecurity incidents. Each organization individually defines the distinction between an incident, an emergency, and a crisis. However, in all cases, coordination, management, feedback, and both internal and external communication are essential.

Beyond incident management, change and resource management are key components of operational information security. These ensure that an ISMS is not just a one-time project but a continuous process with defined KPIs, reporting structures, and ongoing improvement cycles.

With this step, the initial implementation of the ISMS is fundamentally complete, and the system transitions into its cyclical operational phase.

9

Audit and Certification

An internal audit or an audit involving an external auditor provides objective insights into the implemented ISMS. If certification is being pursued, this internal audit is mandatory and serves as an indicator of whether the ISMS has reached the necessary maturity for a certification audit.

As a key aspect of the ISMS’s cyclical operation, the defined KPIs must be assessed at least annually or on an event-driven basis. Additionally, regular reporting to management and the planning of improvement measures are essential components.

The certification audit in accordance with ISO 27001:2022 is conducted by an appropriately accredited organization.

bottom of page