You are on page 1of 2

Information Security

Management System (ISMS)

What is an ISMS, and why should you have one? Risk-based approach and recognized standards
An information security management system is an Existing risks are identified, evaluated, and handled in
integrated collection of methods, rules, and regula- the context of their relation to the selected values.
tions within a company for continuous control and Risk management creates a valid and, above all,
improvement of information security. transparent and reproducible foundation for drawing
The primary goal of an ISMS is to identify risks related up and implementing suitable measures. In addition,
to the information it processes and manage those risks you have the option of targeted risk acceptance, risk
in a targeted manner. avoidance, or risk transfer.

Establishing an ISMS has numerous benefits: As part of our risk management process, the actions to
be taken are generally derived from recognized
ƒ Compliance with regulatory and contractual standards. In particular, they are based on the ISO/IEC
requirements
27002 standard, the IT-Grundschutz standards for
ƒ Proof of information security for third parties basic protection established by Germany‘s Bundesamt
ƒ Identification, evaluation, and handling of für Sicherheit in der Informationstechnik (BSI), or
existing risks common industry standards. These standards
supplement risk management processes and serve as a
ƒ Improved cost-effectiveness through planning of
solid foun-dation for achieving your desired level of
risk-based measures
information security.
Focus on information
The key to success
The key focus of an ISMS is the information, plus all
An integrated approach is the key to success for an
the resources required for it, that is essential to the
ISMS since it focuses on protecting essential informa-
company and the achievement of its goals. In many
tion across every link in the value chain. To achieve
cases that means IT, since IT is generally the primary
the desired level of security, an ISMS interacts heavily
support process. However, other areas such as docu-
with existing organizations and their processes. In
mented information, personnel, and building security
addition to IT, an ISMS mainly addresses issues such
also need to be taken into account.
as the following:
Based on your company’s goals and value creation,
ƒ Corporate organization
your company’s essential information and values are
identified and evaluated with respect to your confi- ƒ Personnel security
dentiality, availability, and integrity requirements. ƒ Physical security

www.tuv.com/informationssicherheit
ƒƒ Access control Integrated management systems operation
ƒƒ Incident management An ISMS does not have to be developed and imple-
ƒƒ Business continuity planning mented as an isolated system. Instead, it can be
integrated or based on existing management systems
Continuous improvement process (e.g. QMS, BCMS). This approach leverages syner-
Setting up and running an ISMS is not just a one- gies, avoids redundancies, and sustainably increases
time process. Instead, it is a process that is conti- acceptance among your employees.
nuously repeated. It involves performing all regular
Proof of certification
activities such as risk management, internal audits,
and management reviews. Moreover, the ISMS pro- An ISMS that conforms to national or international
cesses, rules, and results undergo continual critical standards (e.g. ISO/IEC 27001 and the IT-
evaluation and, if need be, are adapted to produce Grundschutz standards) can be certified by an
needed improvement. accredited organization.

A certificate enables you to provide third parties such


Appropriate and cost-effective as government authorities, auditors, customers, and

01.2023
Thanks to the structured coordination in an ISMS, partners with proof of information security.
complex and generally expensive measures in par-
ticular are not implemented in an isolated manner. TÜV Rheinland Services

TÜV, TUEV and TUV are registered trademarks. They may not be used without prior consent.
Instead, they are carried out in an appropriate con- ƒ Gap analyses to determine current situation
text of existing risks and economic feasibility. This ƒ Analysis of existing ISMS
creates synergies and helps to sustainably lower the
ƒ Planning and implementation of ISMS
costs of planning, execution, and ongoing operation.
ƒ Continuous operation of ISMS (external CISO)
In practice, it has been shown that centralized solu-
tions can generally be operated with fewer resources, ƒ Performance of risk assessments
greater security, and higher reliability than compe- ƒ Design and conducting of awareness campaigns
ting and, in many cases, overlapping custom solu-
ƒ Coaching of information security managers
tions.

TÜV Rheinland i-sec GmbH


Am Grauen Stein
51105 Cologne, Germany
Phone +49 221 806-0
Fax +49 221 806-2295
service@i-sec.tuv.com

www.tuv.com/informationssicherheit

You might also like