What we do |
Plan
- Understand the core and supporting business functions
- Understand and discuss the information security requirements of the organization
- Finalize on the ISMS Scope
- Review the network and security architecture
- Review the physical and environmental security controls
- Review the existing documents like policies, procedures, forms etc. related to ISMS, certifications achieved by the organization like ISO9000, etc.
- Perform ‘As-Is’ analysis of the security schema (Current State Assessment)
Execute
- Conduct the ISMS Implementation Training for key implementation personnel
- Assist in performing audits on Asset Inventory (based on Confidentiality, Integrity, Availability)
- Assist in preparing the Information Risk Management report (including Risk identification, analysis, rating and working on mitigation options)
- Perform Vulnerability Assessment and Penetration Testing (on selected devices, IPs, as per mutual agreement)
- Drafting necessary Information Security Policies
- Assist in drafting information security procedures, as required, including listing out the relevant formats
- Prepare the ISMS Implementation plan with ISMS Coordinator
- Assist in implementation of various policies and technical controls
- Conduct Information Security Trainings for different level of personnel in the organization (like Senior management and Business Managers, IT Teams, End-users and Auditors)
Check
- Perform ISMS Internal Audit
- Discuss Internal Audit Findings with ISMS Coordinator and other personnel, as required
- Assist in preparing Audit Response Plan (Corrective and Preventive Action Reports)
Act
- Assist in implementation of Audit Response Plan (Corrective and Preventive Action Reports)
|