Introduction to Information Security Management Systems (ISMS) (2024)

Introduction to Information Security Management Systems (ISMS) (1)

Introduction to Information Security Management Systems (ISMS) (2)

November 26, 2019

4 minute read

Muhammad Raza

Every technology-driven business process is exposed to security and privacy threats. Sophisticated technologies are capable of combating cybersecurity attacks, but these aren’t enough: organizations must ensure that business processes, policies, and workforce behavior minimize or mitigate these risks.

Because this path is neither easy nor clear, companies adopt frameworks that help guide towards information security (InfoSec) best practices. This is where information security management systems come into play—let’s take a look.

What is an ISMS?

An information security management system (ISMS) is a framework of policies and controls that manage security and risks systematically and across your entire enterprise—information security. These security controls can follow common security standards or be more focused on your industry.

Introduction to Information Security Management Systems (ISMS) (3)

For example, ISO 27001 is a set of specifications detailing how to create, manage, and implement ISMS policies and controls. The ISO doesn’t mandate specific actions; instead, it provides guideline on developing appropriate ISMS strategies.

The framework for ISMS is usually focused on risk assessment and risk management. Think of it as a structured approach to the balanced tradeoff between risk mitigation and the cost (risk) incurred.

Organizations operating in tightly regulated industry verticals, such as healthcare or finance, may require a broad scope of security activities and risk mitigation strategies.

(Consider InfoSec management within your overall IT security policy.)

Continuous improvement in information security

While ISMS is designed to establish holistic information security management capabilities, digital transformation requires organizations to adopt ongoing improvements and evolution of their security policies and controls.

The structure and boundaries defined by an ISMS may apply only for a limited time frame and the workforce may struggle to adopt them in the initial stages. The challenge for organizations is to evolve these security control mechanisms as their risks, culture, and resources change.

According to ISO 27001, ISMS implementation follows a Plan-Do-Check-Act (PCDA) model for continuous improvement in ISM processes:

  • Plan. Identify the problems and collect useful information to evaluate security risk. Define the policies and processes that can be used to address problem root causes. Develop methods to establish continuous improvement in information security management capabilities.
  • Do. Implement the devised security policies and procedures. The implementation follows the ISO standards, but actual implementation is based on the resources available to your company.
  • Check. Monitor the effectiveness of ISMS policies and controls. Evaluate tangible outcomes as well as behavioral aspects associated with the ISM processes.
  • Act. Focus on continuous improvement. Document the results, share knowledge, and use a feedback loop to address future iterations of the PCDA model implementation of ISMS policies and controls.

Popular ISMS frameworks

ISO 27001 is a leader in information security, but other frameworks offer valuable guidance as well. These other frameworks often borrow from ISO 27001 or other industry-specific guidelines.

  • ITIL, the widely adopted service management framework, has a dedicated component called Information Security Management (ISM). The goal of ISM is to align IT and business security to ensure InfoSec is effectively managed in all activities.
  • COBIT, another IT-focused framework, spends significant time on how asset management and configuration management are foundational to information security as well as nearly every other ITSM function—even those unrelated to InfoSec.

ISMS security controls

ISMS security controls span multiple domains of information security as specified in the ISO 27001 standard. The catalog contains practical guidelines with the following objectives:

  • Information security policies. An overall direction and support help establish appropriate security policies. The security policy is unique to your company, devised in context of your changing business and security needs.
  • Organization of information security. This addresses threats and risks within the corporate network, including cyberattacks from external entities, inside threats, system malfunctions, and data loss.
  • Asset management. This component covers organizational assets within and beyond the corporate IT network., which may involve the exchange of sensitive business information.
  • Human resource security. Policies and controls pertaining to your personnel, activities, and human errors, including measures to reduce risk from insider threats and workforce training to reduce unintentional security lapses.
  • Physical and environmental security. These guidelines cover security measures to protect physical IT hardware from damage, loss, or unauthorized access. While many organizations are taking advantage of digital transformation and maintaining sensitive information in secure cloud networks off-premise, security of physical devices used to access that information must be considered.
  • Communications and operations management. Systems must be operated with respect and maintenance to security policies and controls. Daily IT operations, such as service provisioning and problem management, should follow IT security policies and ISMS controls.
  • Access control. This policy domain deals with limiting access to authorized personnel and monitoring network traffic for anomalous behavior. Access permissions relate to both digital and physical mediums of technology. The roles and responsibilities of individuals should be well defined, with access to business information available only when necessary.
  • Information system acquisition, development, and maintenance. Security best practices should be maintained across the entire lifecycle of the IT system, including the phases of acquisition, development, and maintenance.
  • Information security and incident management. Identify and resolve IT issues in ways that minimize the impact to end users. In complex network infrastructure environments, advanced technology solutions may be required to identify insightful incident metrics and proactively mitigate potential issues.
  • Business continuity management. Avoid interruptions to business processes whenever possible. Ideally, any disaster situation is followed immediately by recovery and procedures to minimize damage.
  • Compliance. Security requirements must be enforced per regulatory bodies.
  • Cryptography. Among the most important and effective controls to protect sensitive information, it is not a silver bullet on its own. Therefore, ISMS govern how cryptographic controls are enforced and managed.
  • Supplier relationships. Third-party vendors and business partners may require access to the network and sensitive customer data. It may not be possible to enforce security controls on some suppliers. However, adequate controls should be adopted to mitigate potential risks through IT security policies and contractual obligations.

These components and domains offer general best practices towards InfoSec success. Though these may vary subtly from one framework to another, considering and aligning with these domains will provide much in the way of information security.

Related reading

  • The Chief Information Security Officer (CISO) Role Explained

ITIL 4 Best Practice e-books

These all-new ITIL e-books highlight important elements of ITIL 4 best practices so that you can quickly understand key changes and actionable concepts. Download now for free!

Download e-book ›

Download e-book ›

These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing blogs@bmc.com.

BMC Brings the A-Game

BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.
Learn more about BMC ›

You may also like

BMC Cloud Operations Uses TrueSight Cloud Security

What Are APTs? Advanced Persistent Threats Explained

IT Security vs IT Compliance: What’s The Difference?

Introduction to SOX Compliance

About the author

Introduction to Information Security Management Systems (ISMS) (11)

Muhammad Raza

Muhammad Raza is a Stockholm-based technology consultant working with leading startups and Fortune 500 firms on thought leadership branding projects across DevOps, Cloud, Security and IoT.

View all posts

Introduction to Information Security Management Systems (ISMS) (2024)

FAQs

What is ISMS management system? ›

An information security management system (ISMS) is a framework of policies and controls that manage security and risks systematically and across your entire enterprise—information security. These security controls can follow common security standards or be more focused on your industry.

What is an ISMS ISO 27001? ›

An ISO 27001 ISMS consists of policies, procedures and other controls involving people, processes, and technology. Informed by regular information security risk assessments, an ISMS is an efficient, risk-based, and technology-neutral approach to keeping your information assets secure.

What is the difference between ISO 27001 and ISMS? ›

ISO 27001 is the central framework of the ISO 27000 series, which is a series of documents relating to various parts of information security management. The Standard contains the implementation requirements for an ISMS. These are essentially an overview of everything you must do achieve compliance.

What are the basic components of ISMS? ›

Typically, an ISMS framework addresses five key elements: Control: You should establish management framework for managing information security, preparing and implementing an Information Security Policy, allocating responsibilities, and establishing and controlling documentation.

What is the purpose of ISMS? ›

An ISMS (information security management system) provides a systematic approach for managing an organisation's information security. It's a centrally managed framework that enables you to manage, monitor, review and improve your information security practices in one place.

What are the benefits of ISMS? ›

An ISMS helps protect all forms of information, including digital, paper-based, intellectual property, company secrets, data on devices and in the Cloud, hard copies and personal information.

What are the three pillars of ISMS? ›

Effective and robust cyber security requires an information security management system (ISMS) built on three pillars: people, processes and technology.

What are the 3 key elements information security in ISO 27001? ›

The basic goal of ISO 27001 is to protect three aspects of information: Confidentiality: only the authorized persons have the right to access information. Integrity: only the authorized persons can change the information. Availability: the information must be accessible to authorized persons whenever it is needed.

What is the most commonly used ISMS standard? ›

ISO/IEC 27001 is is the world's best-known standard for information security management systems (ISMS) and their requirements. Additional best practice in data protection and cyber resilience are covered by more than a dozen standards in the ISO/IEC 27000 family.

How many controls are there in ISMS? ›

There are 114 Annex A Controls, divided into 14 categories. How you respond to the requirements against them as you build your ISMS depends on the specifics of your organisation. A useful way to understand Annex A is to think of it as a catalogue of security controls.

What are the 6 stages of the ISO 27001 certification process? ›

The ISO 27001 certification process phases
  • Phase one: create a project plan. ...
  • Phase two: define the scope of your ISMS. ...
  • Phase three: perform a risk assessment and gap analysis. ...
  • Phase four: design and implement policies and controls. ...
  • Phase five: complete employee training. ...
  • Phase six: document and collect evidence.
16 Dec 2021

› ISMS.online › ISO 27001 ›

We make it easy to implement & maintain the ISO/IEC 27001 Information Security Management Standard. Contact ISMS.online for a free consultation!
ISO framework is a combination of policies and processes for organizations to use. ISO 27001 provides a framework to help organizations, of any size or any indu...
Everything you need to know about ISO 27001, the international standard for an information security management system (ISMS).

What are the 3 ISMS security objectives? ›

Thereby, objectives in an ISMS are the knowledge security objectives for confidentiality, integrity and availability of data.

What are the three pillars of ISMS? ›

Effective and robust cyber security requires an information security management system (ISMS) built on three pillars: people, processes and technology.

What are the ISMS tools? ›

  • By Platform. Information Security Management System. Privacy Information Management System. Business Continuity Management System. Integrated Management System.
  • By Area. ISO 27001. ISO 27002. ISO 27701. ISO 22301. GDPR.
  • By Experience. Focusing your expertise.

Is ISO 9001 and ISMS are same? ›

Similarly to ISO 9001, ISO 27001 is the internationally recognized standard for information security management. It is the most widely used ISMS standard in the world, with over 35k certificates issued to organizations in 178 countries.

Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6456

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.