ISMS Manual
ISMS Manual
Information Security
Management
Systems
ISMS Manual
Table of Contents
01 Purpose 01
02 Organization Overview 01
05 Leadership 06
06 Planning 06
07 Support 06
08 Operations 06
09 Performance Evaluation 06
10 ISMS Improvement 06
12 Non-Compliance 06
13 Responsibilities 06
14 Schedule 06
Document Authorization:
Name Name
Designation: Designation:
Purpose This document details the Information Security Management
System (ISMS) of <Company Long Name> (hereafter
<Company Name>). This document is the framework for
designing, implementing, exercising, and maintaining the
ISMS. The manual references the <Company Name>’s
information security initiatives.
01
2.2. Vision & Goals
02
Availability: relates to information being available when
required by the business process. It also deals with the
safeguarding of necessary resources and associated
capabilities
03
Information Security Management System (ISMS): That
part of the overall management system, based on a
business risk approach, to establish, implement, operate,
monitor, review, maintain, and improve information
security. The management system includes
Organizational structure, policies, planning activities,
responsibilities, practices, procedures, processes, and
resources
04
Security Event: An identified occurrence of a system,
service, or network state indicating a possible breach of
information security policy or failure of safeguards, or a
previously unknown situation that may be security
relevant
05
Context of the 4.1. Understanding the Organization & its Context
Organization
<Company Name> has developed an organizational
governance structure, and has defined policies, strategies
and well-defined roles and responsibilities to ensure that
strategic objectives are met. Information Security
Management System (ISMS) is designed to be a subset of
the overall organizational governance framework.
<Company Name> has taken steps to determine risks and
opportunities which could impact the goals and objectives.
Internal Issues
01
External Issues
Customer demographic
01
Interested Parties Internal/ External Requirements
Business growth
Maintenance of brand
value and reputation
Ensuring customer
satisfaction
Ensuring continued
relationships with key
partners and vendors
Adherence to contractual
requirements
Consulting/Marketing Internal
Group
Customers External
Media External
01
If you're looking for an automated compliance platform to help maximize your
cyber security budget, talk to Sprinto's experts today! Sprinto is a compliance
automation platform that helps organizations much like yours get compliance-
ready in as short a time as possible.
Get Demo
sales@sprinto.com www.sprinto.com