Information Security Management System (ISMS)
Level 0 → 1
Conduct an inventory, propose a scope, document the current state in writing.
You know where you stand. A document describes the current state and includes an initial scope proposal.
Level 1 → 2
Formally define the scope and assign responsibilities – done together.
Your ISMS has a formal basic structure. Scope and roles are documented.
Level 2 → 3
Introduce standard controls: access management, patching, logging, backup testing, MFA. Facilitate management review.
Standard controls are in place and demonstrable. Management is involved.
Level 3 → 4
Develop metrics, support internal audits, build deviation handling, test controls for effectiveness.
Your ISMS is actively managed. Metrics show whether controls are working. Deviations are handled systematically.
Level 5
Threat modelling workshop. Risk and controls tailored to your critical core processes.
Your critical core processes have tailored controls that go beyond the standard.