SlideShare a Scribd company logo
1 of 60
Download to read offline
ISO 27001:2022.
How to implement an ISMS using
the ISMS Implementation Toolkit
by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
www.patreon.com/AndreyProzorov
1.0, 06.08.2023
Agenda
2
1. What is an ”ISMS Toolkit”?
2. What's important to know about ISMS toolkits?
3. TOP 5 ISMS Toolkits
4. My ISMS Implementation Toolkit
5. How to implement an ISMS using the ISMS Implementation Toolkit
(20+1 steps)
3
What is an
”ISMS Toolkit”?
Toolkit is a set of tools used for a particular purpose.
The objective of ISMS toolkits: to help implement, improve
and prepare the ISMS for certification.
An ISMS toolkit typically contains the following:
1. Diagrams and mindmaps
2. Lists (e.g., List of ISMS documents)
3. Checklists (e.g., ISMS Audit Preparation Checklist)
4. Templates and Examples (policies, procedures, records)
5. Recommendations and Guidelines
6. Presentations
…
4
What's important to
know about ISMS
toolkits?
1. Toolkits are not a silver bullet! Use them primarily for your
inspiration.
2. Toolkits usually need to be significantly modified and aligned
with your organisation's specifics and process maturity.
3. Toolkits may contain errors and outdated information
(e.g., ISO 27001:2013). It all depends on the developer's
expertise and the update date.
4. Don't buy stolen toolkits! Appreciate the authors' time and
efforts.
5. You can find lots of templates and recommendations just by
using google search. Or ask ChatGPT J
6. The rightsholder may impose limitations on the use of the
toolkit. For example, for resale or consulting purposes.
(If you want to use my toolkit for these purposes, you shall choose
the ”For companies (White-label product)” subscription)
5
TOP 5
ISMS Toolkits
(ISO 27001)
1. ISO27k Toolkit by ISO27k Forum (Free) -
https://lnkd.in/eC5Kh5d6
2. ISMS Implementation Toolkit by Andrey Prozorov
(28$ per month) - https://lnkd.in/enzZdZ9
3. ISO 27001 Documentation Toolkit by Advisera (897$) -
https://lnkd.in/euYBc-SW
4. ISO 27001 Toolkit by CertiKit (950€) -
https://lnkd.in/ePxZUjHe
5. ISO 27001 Toolkit by IT Governance (595£ per year) -
https://lnkd.in/eAwTcuE6
6
ISMS Implementation
Toolkit by Andrey
Prozorov
www.patreon.com/posts/
47806655
How to implement an ISMS using
the ISMS Implementation Toolkit
ISMS Implementation plan
8
0. Read ISO 27001 and additional materials
1. Conduct awareness trainings for the top
management
2. Conduct a Gap analysis
3. Understand the Context
4. Plan the implementation
5. Conduct the first IS Committee meeting
6. Establish Information Security Policy and Information
Security Objectives
7. Take an inventory of the assets
8. Define a method of risk assessment, identify and
assess information security risks
9. Prepare Statement of Applicability (SoA) and Risk
Treatment Plan (RTP)
10.Define requirements for documentation management
11.Develop ISMS Framework and define roles and
responsibilities
12.Develop and implement a set of ISMS policies
and procedures
13.Plan and implement additional information
security measures
14.Plan, prepare and conduct awareness trainings
15.Operate the ISMS
16.Monitor the ISMS
17.Audit the ISMS
18.Conduct ISMS Management reviews
19.Practice continual improvement
20.Prepare for the certification audit
www.patreon.com/posts/74660190
9
Step 0.
Read ISO 27001 and
additional materials
My mindmaps:
Presentations and other documents:
• My presentation “ISO Survey 2021: ISO 27001 certificates”
• My presentation “ISO 27001:2022. What has changed?”
• ISO 27001:2022. ISMS Requirements and Information security controls
• ISMS Required activities - https://www.patreon.com/posts/68742734
• Introduction to Information Security -
www.patreon.com/posts/introduction-to-76100531
• The ISO 27000 Family of Standards
• ISO 27000:2018 ISMS. Overview and
vocabulary
• ISO 27001:2022, ISMS Requirements
• ISO 27002:2022, Information security
controls
• ISO 27003:2017 ISMS Guidance
• ISO 27004:2016 Monitoring,
measurement, analysis and evaluation
• ISO 27005:2022, Guidance on managing
information security risks
• ISO 27014:2020 Governance of
information security
• ISO 27018:2014 Code of practice for
protection of PII in public clouds acting
as PII processors
• ISO 27021:2017, Competence
requirements for ISMS professionals
• ISO 27022:2021, Guidance on
information security management
system processes
• ISO 27035 Information security incident
management
• ISO 27035 Information security incident
management
• ISO 27701:2019 Privacy Information
Management
• …
10
11
www.patreon.com/posts/58444935
12
www.patreon.com/posts/my-presentation-73750394
13
Step 1.
Conduct awareness
trainings for the top
management
www.patreon.com/posts/75055047
14
Step 2.
Conduct a Gap analysis
Important recommendations and templates:
• My presentation "ISO 27001:2022. How to conduct an ISMS
Gap Analysis"- https://www.patreon.com/posts/83039255
• Request documents for GAP analysis (ISMS and PIMS) -
https://www.patreon.com/posts/72537520
• List of documents (template) -
https://www.patreon.com/posts/72537520
• ISMS Gap Analysis Report (template) -
https://www.patreon.com/posts/isms-gap-report-73712573
• ISMS Questionary - https://www.patreon.com/posts/isms-
questionary-83587489
• GAP Analysis Report and SoA Visualization (template) -
https://www.patreon.com/posts/79093001
16
Step 3.
Understand the Context
Important recommendations and templates:
• ISMS Pain Points and Trigger Events (example) -
https://www.patreon.com/posts/34186195
• Information Security and Data Protection context, mindmap -
https://www.patreon.com/posts/41972080
• List of interested parties (example) -
https://www.patreon.com/posts/54253983
• List of Requirements (template) -
https://www.patreon.com/posts/61383934
• My presentation "ISO 27001: ISMS Scope" -
https://www.patreon.com/posts/my-presentation-86343838
• ISMS Scope (template) -
https://www.patreon.com/posts/61383934
• ISMS Communication plan (example and template) -
https://www.patreon.com/posts/62937551
17
18
www.patreon.com/posts/my-presentation-86343838
19
Step 4.
Plan the implementation
Important recommendations:
• ISO 27001 implementation steps (Approaches) -
https://www.patreon.com/posts/62373578
• ISMS Implementation Plan -
https://www.patreon.com/posts/74660190
• ISMS Implementation Schedule -
https://www.patreon.com/posts/isms-plan-and-73457506
• ISMS process reference model (ISO 27022) -
https://www.patreon.com/posts/isms-process-iso-84149715
• ISMS core processes by Knut Haufe -
https://www.patreon.com/posts/68982237
• ISMS Required activities - https://www.patreon.com/posts/68742734
• Information Security and Data Protection Integrated Approach -
https://www.patreon.com/posts/74949425
• My presentation "How to use ChatGPT for an ISMS implementation" -
https://www.patreon.com/posts/how-to-use-for-83553386
• My presentation "ISO 27001:2022 Tips and Tricks. How to accelerate
the implementation" - https://www.patreon.com/posts/iso-27001-
2022-83898406
20
www.patreon.com/posts/62373578
21
Program Evaluation Review Technique (PERT) is a project management planning tool
used to calculate the amount of time it will take to realistically finish a project
ISMS Implementation plan (example)
www.patreon.com/posts/isms-plan-and-73457506
22
23
www.patreon.com/posts/74949425
24
Step 5.
Conduct the first IS
Committee meeting
www.patreon.com/posts/75635782
25
Step 6.
Establish Information
Security Policy and
Information Security
Objectives
Important recommendations and templates:
• Checklist for Information Security Policy and
Data Protection Policy -
https://www.patreon.com/posts/30921087
• Information Security Policy (example) -
https://www.patreon.com/posts/33946586
• Information Security Principles -
https://www.patreon.com/posts/68732864
26
27
Step 7.
Take an inventory of
the assets
Important recommendations and templates:
• Information Asset Categories by SoGP 2022 -
https://www.patreon.com/posts/67132102
• Supporting assets mindmap by EBIOS RM -
https://www.patreon.com/posts/supporting-by-rm-42388590
• List of information assets (template) -
https://www.patreon.com/posts/30651642
28
www.patreon.com/posts/30651642
29
Step 8 (1).
Define a method of risk
assessment, identify
and assess information
security risks
Important recommendations:
• Risk Management Principles by ISACA -
https://www.patreon.com/posts/risk-management-78502190
• ISO 27005:2022 Guidance on managing information security risks,
mindmap - https://www.patreon.com/posts/74605979
• ISO 27005:2022 Overview - https://www.patreon.com/posts/iso-
27005-2022-73952552
• ISO 31000:2018 Risk management. Guidelines, mindmap -
https://www.patreon.com/posts/41985578
• ISO 27005:2022. Risk Assessment and Treatment processes,
mindmaps - https://www.patreon.com/posts/73950726
• ISO 27005:2022. Information security risk assessment and
treatment processes - https://www.patreon.com/posts/74014713
• Information Risk Assessment Methodology 2 (IRAM2), mindmap -
https://www.patreon.com/posts/54781453
• COBIT Focus Area. Information and Technology Risk, mindmap -
https://www.patreon.com/posts/51438110
• EU Risk Management (ENISA): Threat Catalogue -
https://www.patreon.com/posts/79044370
• …
30
www.patreon.com/posts/iso-27005-2022-73952552
31
www.patreon.com/posts/73950726
32
Step 8 (2).
Define a method of risk
assessment, identify
and assess information
security risks
Important templates:
• My list of information security threat events -
https://www.patreon.com/posts/my-list-of-73288336
• Information Security Risk Register and Risk Treatment Plan -
https://www.patreon.com/posts/75666341
• Risk Register Template by ISACA -
https://www.patreon.com/posts/51394220
• Risk Register Template by NIST -
https://www.patreon.com/posts/51913376
• IS Risk Management: Examples of Scales -
https://www.patreon.com/posts/is-risk-examples-78499773
33
34
Step 9.
Prepare Statement of
Applicability (SoA) and
Risk Treatment Plan
(RTP)
Important templates:
• Information Security Risk Register and Risk Treatment Plan -
https://www.patreon.com/posts/75666341
• ISMS Maturity Levels and Statement of Applicability (SoA),
2013 and 2022 - https://www.patreon.com/posts/62806755
• My presentation "All about a Statement of Applicability (SoA)" -
https://www.patreon.com/posts/79852780
35
www.patreon.com/posts/79852780
36
My SoA template 2022
1. General requirements (cl.4-10) + Maturity Level
2. SoA: 2 lists of controls, 2013 and 2022
3. Additional columns: Description, Documents and Records,
Responsible (Owners), #Attributes, Comments and Links
www.patreon.com/posts/62806755
37
Step 10.
Define requirements for
documentation
management
Important recommendations and templates:
• Requirements for documented information in ISO 27001 and
ISO 27701 - https://www.patreon.com/posts/53206865
• ISMS Interested Parties and IS-Related Information (example)
- https://www.patreon.com/posts/78943054
• ISMS Documented Information Policy (template) -
https://www.patreon.com/posts/74435974
• Simple Policy Template -
https://www.patreon.com/posts/simple-policy-59082061
• Sanity checklist for ISMS/PIMS documentation -
https://www.patreon.com/posts/58143837
• The principles of good records management -
https://www.patreon.com/posts/81411410
38
39
40
Step 11.
Develop ISMS
Framework and define
roles and responsibilities
Important recommendations and templates:
• ISMS Framework (mindmap) -
https://www.patreon.com/posts/33936319
• ISMS RACI Chart (example) -
https://www.patreon.com/posts/38011597
• Chief Information Security Officer (CISO) by ACSC
- https://www.patreon.com/posts/67891632
41
ISMS RACI (template) - www.patreon.com/posts/38011597
42
Step 12.
Develop and implement
a set of ISMS policies
and procedures
Important recommendations and templates:
• My ISMS documentation pyramid -
https://www.patreon.com/posts/50033405
• The shortest list of ISMS Documents (ISO 27001) -
https://www.patreon.com/posts/79682225
• An extended list of ISMS Documents -
https://www.patreon.com/posts/65000774
• All about Information Security Policies -
https://www.patreon.com/posts/65000693
• Information Security Policies. Templates and resources for
inspiration - https://www.patreon.com/posts/59048655
• Information Security Policies generated by ChatGPT -
https://www.patreon.com/posts/information-by-76101772
• NIST Cybersecurity Policies - https://www.patreon.com/posts/nist-
policies-84499657
• Clear Desk and Clear Screen Policy (template) -
https://www.patreon.com/posts/74474660
• …
43
www.patreon.com/posts/65000774
44
Step 13.
Plan and implement
additional information
security measures
Recommendations:
• Information Security Controls. People Controls by ISO
27002:2022 - https://www.patreon.com/posts/information-
by-73708490
• Good Practices for Supply Chain Cybersecurity -
https://www.patreon.com/posts/good-practices-86573309
• Information Security and Data Protection requirements in
supplier agreements -
https://www.patreon.com/posts/information-and-77104690
• Standard information request from suppliers -
https://www.patreon.com/posts/standard-request-84152754
• Security Levels of Shredders -
https://www.patreon.com/posts/66955928
• Preparing for a personal data breach -
https://www.patreon.com/posts/71917299
• ...
45
www.patreon.com/posts/good-practices-86573309
46
Step 14.
Plan, prepare and
conduct awareness
trainings
Important recommendations:
• ISO 27021 Competence requirements for ISMS professionals,
mindmap - https://www.patreon.com/posts/iso-27021-for-85866320
• Interview questions for CISOs and DPOs -
https://www.patreon.com/posts/68684462
• Information Security and Data Protection awareness -
https://www.patreon.com/posts/58225833
• Information Security and Data Protection Awareness Topics -
https://www.patreon.com/posts/66540078
• How to develop an IS awareness program, mindmap -
https://www.patreon.com/posts/74335469
• Information Security awareness in practice (presentation) -
https://www.patreon.com/posts/30781079
• How to be the best DPO/CISO? -
https://www.patreon.com/posts/how-to-be-best-76120620
• Information Security Beneficial Behaviors -
https://www.patreon.com/posts/78943692
• …
47
www.patreon.com/posts/58225833
48
Step 15.
Operate the ISMS
Recommendations and templates:
• Emergency Contact List: Information Security Incident
Response - https://www.patreon.com/posts/75625598
• Incident management: Severity Matrix (example) -
https://www.patreon.com/posts/53061488
• Data Breach Notification (template) -
https://www.patreon.com/posts/65708038
• Data Breach Register, mindmap -
https://www.patreon.com/posts/40996027
• Personal Data Breach Notification (requirements) -
https://www.patreon.com/posts/40925948
• …
49
Step 16.
Monitor the ISMS
Important recommendations and templates:
• Objective and Key Results (OKRs), mindmap -
https://www.patreon.com/posts/67122757
• ISMS Key Objectives and Metrics (example) -
https://www.patreon.com/posts/75659116
• ISNPS: Information Security Net Promoter Score -
https://www.patreon.com/posts/isnps-security-77277952
50
Step 17 (1).
Audit the ISMS
Recommendations:
• Guidelines for ISMS auditing (mindmap) -
https://www.patreon.com/posts/44005904
• Internal ISMS Audit. Mapping to ISO 19011 and ISO 27007 -
https://www.patreon.com/posts/68726274
• ISO 19011:2018 Guidelines for auditing management systems,
Mindmap - https://www.patreon.com/posts/32391752
• Desired personal behaviour of the auditor (ISO 19011 and
ISO/IEC 17021) - https://www.patreon.com/posts/44214248
51
Step 17 (2).
Audit the ISMS
Important templates:
• ISMS Audit Preparation Checklist (short template) -
https://www.patreon.com/posts/31763395
• High-Level Office Summary. Template for audits -
https://www.patreon.com/posts/high-level-for-78125619
• Internal Audit Plan (template) -
https://www.patreon.com/posts/42735025
• Internal Audit Report (template) -
https://www.patreon.com/posts/43742470
• Nonconformity Report (template) -
https://www.patreon.com/posts/44068349
• List of Nonconformities (NCs) -
https://www.patreon.com/posts/list-of-ncs-75824665
• Audit Meetings Checklist -
https://www.patreon.com/posts/44212807
52
www.patreon.com/posts/44215838
53
Step 18.
Conduct ISMS
Management reviews
Important template:
• ISMS Management Review Report (template)
- https://www.patreon.com/posts/44877830
54
Step 19.
Practice continual
improvement
Template:
• ISMS issues and feedback register -
https://www.patreon.com/posts/74634496
55
Step 20.
Prepare for the
certification audit
Important recommendations and templates:
• My presentation "ISO 27001:2022 How to prepare for a
certification audit" -
https://www.patreon.com/posts/75354838
• Reminder for employees before the audit (example) -
https://www.patreon.com/posts/reminder-for-77504388
• ISMS Audit Preparation Checklist (short template) -
https://www.patreon.com/posts/31763395
56
www.patreon.com/posts/iso-27001-2022-75354838
57
www.patreon.com/posts/reminder-for-77504388
58
If you like my approach (and templates),
you can support my nonprofit project by
subscribing to my Patreon:
• Just thanks! (€6 per month)
• Only ISMS Toolkit (28$ per month)
• All Toolkits for Experts (+Privacy toolkits,
Project Management Toolkit and all
mindmaps) (50$ per month)
You can cancel your subscription at any time
without any restrictions.
Your support is helping this project to grow.
My ISMS Implementation Toolkit -
https://www.patreon.com/posts/47806655
Thanks, and good luck!
www.linkedin.com/in/andreyprozorov
www.patreon.com/AndreyProzorov
59
My other ISMS-related presentations - www.patreon.com/posts/quick-links-75788060

More Related Content

What's hot

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaFahmi Albaheth
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...Hernan Huwyler, MBA CPA
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxforam74
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 

What's hot (20)

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 

Similar to ISO 27001 How to use the ISMS Implementation Toolkit.pdf

541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdfSharudinBoriak1
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
 
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreAllison Wong
 
KH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson
 
ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018Wervyan Shalannanda
 
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...Antoine Vigneron
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
1. table of contents
1. table of contents1. table of contents
1. table of contentsBeben Sutara
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 
20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)Peter GEELEN ✔
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Stratos Lazaridis
 

Similar to ISO 27001 How to use the ISMS Implementation Toolkit.pdf (20)

ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 BaltimoreKym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
Kym Henderson - ISO EVM Presentation IPMW 2019 Baltimore
 
KH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 BaltimoreKH ISO EVM Presentation IPMW 2019 Baltimore
KH ISO EVM Presentation IPMW 2019 Baltimore
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018
 
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
 
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
1. table of contents
1. table of contents1. table of contents
1. table of contents
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
 
Data protection RU vs EU
Data protection RU vs EUData protection RU vs EU
Data protection RU vs EU
 
IS Awareness in practice, isaca moscow 2019 10
IS Awareness in practice, isaca moscow 2019 10IS Awareness in practice, isaca moscow 2019 10
IS Awareness in practice, isaca moscow 2019 10
 
Про работу на Западе (Прозоров)
Про работу на Западе (Прозоров)Про работу на Западе (Прозоров)
Про работу на Западе (Прозоров)
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

ISO 27001 How to use the ISMS Implementation Toolkit.pdf

  • 1. ISO 27001:2022. How to implement an ISMS using the ISMS Implementation Toolkit by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 www.patreon.com/AndreyProzorov 1.0, 06.08.2023
  • 2. Agenda 2 1. What is an ”ISMS Toolkit”? 2. What's important to know about ISMS toolkits? 3. TOP 5 ISMS Toolkits 4. My ISMS Implementation Toolkit 5. How to implement an ISMS using the ISMS Implementation Toolkit (20+1 steps)
  • 3. 3 What is an ”ISMS Toolkit”? Toolkit is a set of tools used for a particular purpose. The objective of ISMS toolkits: to help implement, improve and prepare the ISMS for certification. An ISMS toolkit typically contains the following: 1. Diagrams and mindmaps 2. Lists (e.g., List of ISMS documents) 3. Checklists (e.g., ISMS Audit Preparation Checklist) 4. Templates and Examples (policies, procedures, records) 5. Recommendations and Guidelines 6. Presentations …
  • 4. 4 What's important to know about ISMS toolkits? 1. Toolkits are not a silver bullet! Use them primarily for your inspiration. 2. Toolkits usually need to be significantly modified and aligned with your organisation's specifics and process maturity. 3. Toolkits may contain errors and outdated information (e.g., ISO 27001:2013). It all depends on the developer's expertise and the update date. 4. Don't buy stolen toolkits! Appreciate the authors' time and efforts. 5. You can find lots of templates and recommendations just by using google search. Or ask ChatGPT J 6. The rightsholder may impose limitations on the use of the toolkit. For example, for resale or consulting purposes. (If you want to use my toolkit for these purposes, you shall choose the ”For companies (White-label product)” subscription)
  • 5. 5 TOP 5 ISMS Toolkits (ISO 27001) 1. ISO27k Toolkit by ISO27k Forum (Free) - https://lnkd.in/eC5Kh5d6 2. ISMS Implementation Toolkit by Andrey Prozorov (28$ per month) - https://lnkd.in/enzZdZ9 3. ISO 27001 Documentation Toolkit by Advisera (897$) - https://lnkd.in/euYBc-SW 4. ISO 27001 Toolkit by CertiKit (950€) - https://lnkd.in/ePxZUjHe 5. ISO 27001 Toolkit by IT Governance (595£ per year) - https://lnkd.in/eAwTcuE6
  • 6. 6 ISMS Implementation Toolkit by Andrey Prozorov www.patreon.com/posts/ 47806655
  • 7. How to implement an ISMS using the ISMS Implementation Toolkit
  • 8. ISMS Implementation plan 8 0. Read ISO 27001 and additional materials 1. Conduct awareness trainings for the top management 2. Conduct a Gap analysis 3. Understand the Context 4. Plan the implementation 5. Conduct the first IS Committee meeting 6. Establish Information Security Policy and Information Security Objectives 7. Take an inventory of the assets 8. Define a method of risk assessment, identify and assess information security risks 9. Prepare Statement of Applicability (SoA) and Risk Treatment Plan (RTP) 10.Define requirements for documentation management 11.Develop ISMS Framework and define roles and responsibilities 12.Develop and implement a set of ISMS policies and procedures 13.Plan and implement additional information security measures 14.Plan, prepare and conduct awareness trainings 15.Operate the ISMS 16.Monitor the ISMS 17.Audit the ISMS 18.Conduct ISMS Management reviews 19.Practice continual improvement 20.Prepare for the certification audit www.patreon.com/posts/74660190
  • 9. 9 Step 0. Read ISO 27001 and additional materials My mindmaps: Presentations and other documents: • My presentation “ISO Survey 2021: ISO 27001 certificates” • My presentation “ISO 27001:2022. What has changed?” • ISO 27001:2022. ISMS Requirements and Information security controls • ISMS Required activities - https://www.patreon.com/posts/68742734 • Introduction to Information Security - www.patreon.com/posts/introduction-to-76100531 • The ISO 27000 Family of Standards • ISO 27000:2018 ISMS. Overview and vocabulary • ISO 27001:2022, ISMS Requirements • ISO 27002:2022, Information security controls • ISO 27003:2017 ISMS Guidance • ISO 27004:2016 Monitoring, measurement, analysis and evaluation • ISO 27005:2022, Guidance on managing information security risks • ISO 27014:2020 Governance of information security • ISO 27018:2014 Code of practice for protection of PII in public clouds acting as PII processors • ISO 27021:2017, Competence requirements for ISMS professionals • ISO 27022:2021, Guidance on information security management system processes • ISO 27035 Information security incident management • ISO 27035 Information security incident management • ISO 27701:2019 Privacy Information Management • …
  • 10. 10
  • 13. 13 Step 1. Conduct awareness trainings for the top management www.patreon.com/posts/75055047
  • 14. 14 Step 2. Conduct a Gap analysis Important recommendations and templates: • My presentation "ISO 27001:2022. How to conduct an ISMS Gap Analysis"- https://www.patreon.com/posts/83039255 • Request documents for GAP analysis (ISMS and PIMS) - https://www.patreon.com/posts/72537520 • List of documents (template) - https://www.patreon.com/posts/72537520 • ISMS Gap Analysis Report (template) - https://www.patreon.com/posts/isms-gap-report-73712573 • ISMS Questionary - https://www.patreon.com/posts/isms- questionary-83587489 • GAP Analysis Report and SoA Visualization (template) - https://www.patreon.com/posts/79093001
  • 15.
  • 16. 16 Step 3. Understand the Context Important recommendations and templates: • ISMS Pain Points and Trigger Events (example) - https://www.patreon.com/posts/34186195 • Information Security and Data Protection context, mindmap - https://www.patreon.com/posts/41972080 • List of interested parties (example) - https://www.patreon.com/posts/54253983 • List of Requirements (template) - https://www.patreon.com/posts/61383934 • My presentation "ISO 27001: ISMS Scope" - https://www.patreon.com/posts/my-presentation-86343838 • ISMS Scope (template) - https://www.patreon.com/posts/61383934 • ISMS Communication plan (example and template) - https://www.patreon.com/posts/62937551
  • 17. 17
  • 19. 19 Step 4. Plan the implementation Important recommendations: • ISO 27001 implementation steps (Approaches) - https://www.patreon.com/posts/62373578 • ISMS Implementation Plan - https://www.patreon.com/posts/74660190 • ISMS Implementation Schedule - https://www.patreon.com/posts/isms-plan-and-73457506 • ISMS process reference model (ISO 27022) - https://www.patreon.com/posts/isms-process-iso-84149715 • ISMS core processes by Knut Haufe - https://www.patreon.com/posts/68982237 • ISMS Required activities - https://www.patreon.com/posts/68742734 • Information Security and Data Protection Integrated Approach - https://www.patreon.com/posts/74949425 • My presentation "How to use ChatGPT for an ISMS implementation" - https://www.patreon.com/posts/how-to-use-for-83553386 • My presentation "ISO 27001:2022 Tips and Tricks. How to accelerate the implementation" - https://www.patreon.com/posts/iso-27001- 2022-83898406
  • 21. 21 Program Evaluation Review Technique (PERT) is a project management planning tool used to calculate the amount of time it will take to realistically finish a project ISMS Implementation plan (example) www.patreon.com/posts/isms-plan-and-73457506
  • 22. 22
  • 24. 24 Step 5. Conduct the first IS Committee meeting www.patreon.com/posts/75635782
  • 25. 25 Step 6. Establish Information Security Policy and Information Security Objectives Important recommendations and templates: • Checklist for Information Security Policy and Data Protection Policy - https://www.patreon.com/posts/30921087 • Information Security Policy (example) - https://www.patreon.com/posts/33946586 • Information Security Principles - https://www.patreon.com/posts/68732864
  • 26. 26
  • 27. 27 Step 7. Take an inventory of the assets Important recommendations and templates: • Information Asset Categories by SoGP 2022 - https://www.patreon.com/posts/67132102 • Supporting assets mindmap by EBIOS RM - https://www.patreon.com/posts/supporting-by-rm-42388590 • List of information assets (template) - https://www.patreon.com/posts/30651642
  • 29. 29 Step 8 (1). Define a method of risk assessment, identify and assess information security risks Important recommendations: • Risk Management Principles by ISACA - https://www.patreon.com/posts/risk-management-78502190 • ISO 27005:2022 Guidance on managing information security risks, mindmap - https://www.patreon.com/posts/74605979 • ISO 27005:2022 Overview - https://www.patreon.com/posts/iso- 27005-2022-73952552 • ISO 31000:2018 Risk management. Guidelines, mindmap - https://www.patreon.com/posts/41985578 • ISO 27005:2022. Risk Assessment and Treatment processes, mindmaps - https://www.patreon.com/posts/73950726 • ISO 27005:2022. Information security risk assessment and treatment processes - https://www.patreon.com/posts/74014713 • Information Risk Assessment Methodology 2 (IRAM2), mindmap - https://www.patreon.com/posts/54781453 • COBIT Focus Area. Information and Technology Risk, mindmap - https://www.patreon.com/posts/51438110 • EU Risk Management (ENISA): Threat Catalogue - https://www.patreon.com/posts/79044370 • …
  • 32. 32 Step 8 (2). Define a method of risk assessment, identify and assess information security risks Important templates: • My list of information security threat events - https://www.patreon.com/posts/my-list-of-73288336 • Information Security Risk Register and Risk Treatment Plan - https://www.patreon.com/posts/75666341 • Risk Register Template by ISACA - https://www.patreon.com/posts/51394220 • Risk Register Template by NIST - https://www.patreon.com/posts/51913376 • IS Risk Management: Examples of Scales - https://www.patreon.com/posts/is-risk-examples-78499773
  • 33. 33
  • 34. 34 Step 9. Prepare Statement of Applicability (SoA) and Risk Treatment Plan (RTP) Important templates: • Information Security Risk Register and Risk Treatment Plan - https://www.patreon.com/posts/75666341 • ISMS Maturity Levels and Statement of Applicability (SoA), 2013 and 2022 - https://www.patreon.com/posts/62806755 • My presentation "All about a Statement of Applicability (SoA)" - https://www.patreon.com/posts/79852780
  • 36. 36 My SoA template 2022 1. General requirements (cl.4-10) + Maturity Level 2. SoA: 2 lists of controls, 2013 and 2022 3. Additional columns: Description, Documents and Records, Responsible (Owners), #Attributes, Comments and Links www.patreon.com/posts/62806755
  • 37. 37 Step 10. Define requirements for documentation management Important recommendations and templates: • Requirements for documented information in ISO 27001 and ISO 27701 - https://www.patreon.com/posts/53206865 • ISMS Interested Parties and IS-Related Information (example) - https://www.patreon.com/posts/78943054 • ISMS Documented Information Policy (template) - https://www.patreon.com/posts/74435974 • Simple Policy Template - https://www.patreon.com/posts/simple-policy-59082061 • Sanity checklist for ISMS/PIMS documentation - https://www.patreon.com/posts/58143837 • The principles of good records management - https://www.patreon.com/posts/81411410
  • 38. 38
  • 39. 39
  • 40. 40 Step 11. Develop ISMS Framework and define roles and responsibilities Important recommendations and templates: • ISMS Framework (mindmap) - https://www.patreon.com/posts/33936319 • ISMS RACI Chart (example) - https://www.patreon.com/posts/38011597 • Chief Information Security Officer (CISO) by ACSC - https://www.patreon.com/posts/67891632
  • 41. 41 ISMS RACI (template) - www.patreon.com/posts/38011597
  • 42. 42 Step 12. Develop and implement a set of ISMS policies and procedures Important recommendations and templates: • My ISMS documentation pyramid - https://www.patreon.com/posts/50033405 • The shortest list of ISMS Documents (ISO 27001) - https://www.patreon.com/posts/79682225 • An extended list of ISMS Documents - https://www.patreon.com/posts/65000774 • All about Information Security Policies - https://www.patreon.com/posts/65000693 • Information Security Policies. Templates and resources for inspiration - https://www.patreon.com/posts/59048655 • Information Security Policies generated by ChatGPT - https://www.patreon.com/posts/information-by-76101772 • NIST Cybersecurity Policies - https://www.patreon.com/posts/nist- policies-84499657 • Clear Desk and Clear Screen Policy (template) - https://www.patreon.com/posts/74474660 • …
  • 44. 44 Step 13. Plan and implement additional information security measures Recommendations: • Information Security Controls. People Controls by ISO 27002:2022 - https://www.patreon.com/posts/information- by-73708490 • Good Practices for Supply Chain Cybersecurity - https://www.patreon.com/posts/good-practices-86573309 • Information Security and Data Protection requirements in supplier agreements - https://www.patreon.com/posts/information-and-77104690 • Standard information request from suppliers - https://www.patreon.com/posts/standard-request-84152754 • Security Levels of Shredders - https://www.patreon.com/posts/66955928 • Preparing for a personal data breach - https://www.patreon.com/posts/71917299 • ...
  • 46. 46 Step 14. Plan, prepare and conduct awareness trainings Important recommendations: • ISO 27021 Competence requirements for ISMS professionals, mindmap - https://www.patreon.com/posts/iso-27021-for-85866320 • Interview questions for CISOs and DPOs - https://www.patreon.com/posts/68684462 • Information Security and Data Protection awareness - https://www.patreon.com/posts/58225833 • Information Security and Data Protection Awareness Topics - https://www.patreon.com/posts/66540078 • How to develop an IS awareness program, mindmap - https://www.patreon.com/posts/74335469 • Information Security awareness in practice (presentation) - https://www.patreon.com/posts/30781079 • How to be the best DPO/CISO? - https://www.patreon.com/posts/how-to-be-best-76120620 • Information Security Beneficial Behaviors - https://www.patreon.com/posts/78943692 • …
  • 48. 48 Step 15. Operate the ISMS Recommendations and templates: • Emergency Contact List: Information Security Incident Response - https://www.patreon.com/posts/75625598 • Incident management: Severity Matrix (example) - https://www.patreon.com/posts/53061488 • Data Breach Notification (template) - https://www.patreon.com/posts/65708038 • Data Breach Register, mindmap - https://www.patreon.com/posts/40996027 • Personal Data Breach Notification (requirements) - https://www.patreon.com/posts/40925948 • …
  • 49. 49 Step 16. Monitor the ISMS Important recommendations and templates: • Objective and Key Results (OKRs), mindmap - https://www.patreon.com/posts/67122757 • ISMS Key Objectives and Metrics (example) - https://www.patreon.com/posts/75659116 • ISNPS: Information Security Net Promoter Score - https://www.patreon.com/posts/isnps-security-77277952
  • 50. 50 Step 17 (1). Audit the ISMS Recommendations: • Guidelines for ISMS auditing (mindmap) - https://www.patreon.com/posts/44005904 • Internal ISMS Audit. Mapping to ISO 19011 and ISO 27007 - https://www.patreon.com/posts/68726274 • ISO 19011:2018 Guidelines for auditing management systems, Mindmap - https://www.patreon.com/posts/32391752 • Desired personal behaviour of the auditor (ISO 19011 and ISO/IEC 17021) - https://www.patreon.com/posts/44214248
  • 51. 51 Step 17 (2). Audit the ISMS Important templates: • ISMS Audit Preparation Checklist (short template) - https://www.patreon.com/posts/31763395 • High-Level Office Summary. Template for audits - https://www.patreon.com/posts/high-level-for-78125619 • Internal Audit Plan (template) - https://www.patreon.com/posts/42735025 • Internal Audit Report (template) - https://www.patreon.com/posts/43742470 • Nonconformity Report (template) - https://www.patreon.com/posts/44068349 • List of Nonconformities (NCs) - https://www.patreon.com/posts/list-of-ncs-75824665 • Audit Meetings Checklist - https://www.patreon.com/posts/44212807
  • 53. 53 Step 18. Conduct ISMS Management reviews Important template: • ISMS Management Review Report (template) - https://www.patreon.com/posts/44877830
  • 54. 54 Step 19. Practice continual improvement Template: • ISMS issues and feedback register - https://www.patreon.com/posts/74634496
  • 55. 55 Step 20. Prepare for the certification audit Important recommendations and templates: • My presentation "ISO 27001:2022 How to prepare for a certification audit" - https://www.patreon.com/posts/75354838 • Reminder for employees before the audit (example) - https://www.patreon.com/posts/reminder-for-77504388 • ISMS Audit Preparation Checklist (short template) - https://www.patreon.com/posts/31763395
  • 58. 58 If you like my approach (and templates), you can support my nonprofit project by subscribing to my Patreon: • Just thanks! (€6 per month) • Only ISMS Toolkit (28$ per month) • All Toolkits for Experts (+Privacy toolkits, Project Management Toolkit and all mindmaps) (50$ per month) You can cancel your subscription at any time without any restrictions. Your support is helping this project to grow. My ISMS Implementation Toolkit - https://www.patreon.com/posts/47806655
  • 59. Thanks, and good luck! www.linkedin.com/in/andreyprozorov www.patreon.com/AndreyProzorov 59
  • 60. My other ISMS-related presentations - www.patreon.com/posts/quick-links-75788060