Information Security Management System (ISMS)

An Information Security Management System (ISMS) is designed to establish, control, and continuously enhance information security within an organization. Implementing and maintaining an ISMS can be challenging, and external support often proves invaluable. We are here to assist you at any stage—whether you are beginning to implement an ISMS, seeking to improve existing processes, conducting internal audits, or preparing for certification.

Who is Required to Operate an ISMS?

Under German law, Critical Infrastructure (KRITIS) operators are obligated by the Federal Office for Information Security Act (BSIG) to implement “appropriate organizational and technical measures” to prevent disruptions to the availability, integrity, authenticity, and confidentiality of their IT systems, components, and processes (§ 8a Abs. 1 BSIG). KRITIS operators must also verify compliance with these requirements at least every two years, reporting to the Federal Office (§ 8a Abs. 3 BSIG).

KRITIS sectors include energy, telecommunications, transportation, water, food, and healthcare. These sectors are vital to societal functions, which is why they are subject to specific legal reporting and compliance obligations regarding information security.
 

Current Update: Changes with NIS 2 (Network and Information Security)

The NIS 2 Directive (EU 2022/2555) must be implemented into national law by EU member states by October 17, 2024. In Germany, this will be accomplished through the “NIS-2 Implementation and Cybersecurity Strengthening Act” (NIS2UmsuCG). This legislation will significantly expand the number of regulated organizations.
Organizations and institutions affected by this expansion will find that an ISMS, paired with a Business Continuity Management System (BCMS), provides optimal preparedness to meet the new requirements with minimal additional effort. Visit our FAQ page for further details on NIS2UmsuCG.

What Are the Benefits of Implementing an ISMS?

An ISMS effectively identifies weaknesses in information security and mitigates risks to IT systems. Additionally, obtaining ISMS certification demonstrates to clients and partners that your organization meets a recognized standard of information security. We consider implementing an ISMS a clear asset to your IT and information security strategy. However, achieving success with an ISMS requires dedicated support from leadership at all stages of implementation.

Standards and Guidelines for an ISMS

With over 20 years of experience advising diverse companies and organizations, we base our ISMS approach on the following well-established standards and norms, ensuring a reliable framework tailored to meet your industry’s unique requirements:

ISMS According to ISO Standards – Universal and Certifiable

The ISO/IEC 27001:2022 standard, titled “Information Security, Cybersecurity and Privacy Protection – Information Security Management Systems – Requirements”, is designed for organizations of all sizes and industries.

First introduced by ISO in 2005, the standard has been continuously updated to reflect evolving needs. The latest version highlights not only the growing importance of information security and cybersecurity but also the increasing focus on data protection. In today’s landscape, personal data has become a frequent target of cyberattacks, underscoring the need for robust safeguards.

The purpose of an Information Security Management System (ISMS), as defined by ISO, is to ensure the confidentiality, integrity, and availability of information. Using the ISO standard, businesses can develop a tailored information security strategy that aligns with their unique needs. This framework incorporates the Plan-Do-Check-Act (PDCA) cycle, enabling ongoing improvement and adaptation.

How We Can Help

We provide expert support in implementing an ISMS based on ISO/IEC 27001 and preparing your organization for ISO certification. Take the first step towards securing your information assets and achieving ISO certification—contact us today!

 

IT-Grundschutz for Businesses (Including SMEs) and Public Institutions

The IT-Grundschutz framework developed by Germany’s Federal Office for Information Security (BSI) is a well-established standard for implementing an Information Security Management System (ISMS). Its primary goal is to help organizations establish and maintain a defined level of information security, ensuring the availability, confidentiality, and integrity of their data.

Core Elements of IT-Grundschutz
The IT-Grundschutz Compendium outlines specific requirements, while the BSI Standards provide proven methods, processes, and measures for implementation. Together, these form the foundation of IT-Grundschutz:

BSI Standard 200-1: General requirements for ISMS, compatible with ISO/IEC 27001.
BSI Standard 200-2: IT-Grundschutz Methodology.
BSI Standard 200-3: Risk Analysis.
BSI Standard 200-4: Business Continuity Management (BCM) and Emergency Planning (optional or standalone).

For building an ISMS, BSI Standards 200-1 to 200-3 are essential, while BCM (200-4) can complement your strategy.

Tailored Approaches for Diverse Needs

Unlike the ISO standard, IT-Grundschutz takes a deeper dive into specific information security topics and offers industry-specific guidance through IT-Grundschutz Profiles, which serve as ready-to-use security concepts. It also provides adaptable ISMS approaches tailored to the actual security needs of an organization:

Basic, Standard, and Core Protection levels make it accessible for all, including SMEs and beginners.

Certification and ISO Alignment

IT-Grundschutz enables organizations to achieve ISO 27001 certification based on its framework. This approach combines the strengths of IT-Grundschutz with the global recognition of ISO Standards. Get in touch to learn how IT-Grundschutz can strengthen your information security while aligning with international standards!

Information Security Requirements in the Automotive Industry

The German Association of the Automotive Industry (VDA) has developed a comprehensive framework to safeguard data and protect prototypes within the automotive sector. This framework is outlined in the Information Security Assessment (ISA) Catalog, which is based on the ISO/IEC 27001 standard for Information Security Management Systems (ISMS).

The VDA ISA Catalog serves multiple purposes:

  • Assessing the current state of information security within an organization.
  • Providing the foundation for internal audits conducted by specialized departments.
  • Serving as a basis for external TISAX® assessments, which certify compliance with industry-specific security requirements.

What is TISAX®?

TISAX® (Trusted Information Security Assessment Exchange) is a recognized certification system tailored to the automotive industry. It ensures that organizations meet the stringent security demands of manufacturers and suppliers, particularly regarding sensitive data and prototype handling.

Why Choose the VDA ISA Framework?

The VDA ISA Catalog and TISAX® certification help businesses:

  • Demonstrate security compliance to automotive partners and stakeholders.
  • Mitigate risks related to data breaches or intellectual property theft.
  • Enhance trust and credibility in the highly competitive automotive supply chain.

Learn more

ISMS for SMEs, Institutions, and Public Authorities

The VdS 10000 Guideline offers a practical framework for implementing an Information Security Management System (ISMS) tailored to SMEs and smaller organizations. Developed by VdS Schadenverhütung GmbH, it ensures robust IT security with minimal financial and organizational effort.

Key Features:

  • Simplified, cost-effective implementation for limited-resource organizations.
  • Based on ISO/IEC 27001 and BSI IT-Grundschutz, ensuring scalability.
  • Option for VdS certification to enhance credibility and trust.

How We Support You

Every consultation is tailored to your needs. In a free initial meeting, we work with you to identify the best way to assist, focusing on practical, actionable solutions. Our approach typically includes the following steps:

Conducting a Gap Analysis

In a dedicated workshop, we assess your existing information security measures through structured interviews and evaluate their compliance with relevant standards.

Key Outcomes:

  • Current State Assessment: Documentation of your organization’s alignment with required standards.
  • Compliance Evaluation: Analysis of the degree of implementation.
  • Gap Identification: Highlighting deviations from the desired state.

This process provides a clear roadmap for achieving full compliance. Contact us to get started!

ISMS Implementation

After the Gap Analysis, we guide you in establishing and implementing an Information Security Management System (ISMS) to address identified gaps and achieve compliance.

Key Steps in ISMS Implementation:

  • Organizational Structure: Support in defining roles (e.g., Information Security Officer) and establishing necessary processes.
  • Documentation: Assistance in creating required policies and records.
  • Risk Analysis & Security Concept: Development of a tailored security strategy based on identified risks.
  • Implementation of Measures: Guidance through the execution of security measures.
  • Internal Audits & Reviews: Conducting audits and preparing reports for management.

We also provide training to help you manage the ISMS independently or offer ongoing support as your external Information Security Officer (ISB).

Support as an External Information Security Officer (ISB)

After or during the implementation of your ISMS, it’s crucial to ensure the smooth operation of core processes and the ongoing implementation of security measures.

We can:

  • Act as your external Information Security Officer (ISB).
  • Provide targeted support for your internal Information Security Officer.

Learn more
 

We also assist with additional information security projects, including:

  • eLearning & Awareness Programs: Training to enhance information security awareness.
  • Policy Deployment Tools: Tool-based rollout of guidelines, including documentation of recipient acknowledgment.
  • Vendor Audits: Comprehensive assessments of third-party service providers.
  • Penetration testing (Pentest): Identifying vulnerabilities in your IT systems.

Let us know your needs, and we’ll provide tailored solutions—contact us today!


Contact us

Do you have questions about implementing an ISMS or want to assess potential improvements in your existing system?

Cihan Parlar

Cihan Parlar, LL.M. (Tilburg), Lawyer

Managing Director

Email: cparlar@re-move-this.first-privacy.com

Phone: +31 20 211 7116

FIRST PRIVACY B.V.

Peter Suhren

Peter Suhren, Lawyer

Managing Director

Email: psuhren@re-move-this.first-privacy.com

Phone: +49 421 69 66 32-822

FIRST PRIVACY GmbH

If your inquiry concerns an organization based in Germany, these contacts will help you

Thomas Wennemann

Thomas Wennemann

ppa | Head of Information Security

Email: twennemann@re-move-this.datenschutz-nord.de

Phone: +49 421 69 66 32-346

datenschutz nord GmbH, Bremen

Annika Woitke

Annika Woitke, M.Sc.

Senior Information Security Counsel

Email: awoitke@re-move-this.datenschutz-nord.de

Phone: +49 30 308 77 49-24

datenschutz nord GmbH, Bremen

FAQ: What Are the Industry-Specific Requirements for an ISMS?

Also Of Interest:

Discover additional services by clicking the buttons below. If you have any questions, we are here to help – contact us anytime!

Risk Analysis ISMS Audit Emergency management (BCMS)