PCI DSS v4.0 and v4.0.1 Compliance Software

The 27k1 ROC Management System has been developed for PCI SSC certified QSA companies.

ISO 27001:2022 ISMS Software

The 27k1 ISMS is the perfect ISO 27001 solution for all businesses.

27k1 ROC Management System (RMS)

The 27k1 ROC Management System (RMS) has been developed for certified QSA companies, wishing to complete the Report On Compliance for Level 1 clients.

The perfect solution for certified QSAs, streamlining the ROC assessment process, cutting costs, improving accuracy and generating efficiencies.

27k1 estimates that the software will save a minimum of 6 days from the completion of each ROC assessment, reducing QSA stress and burnout.

Load your own, corporate branded ROC template into the software to produce corporate branded assessments

Create your "Response Library" to automate responses for every ROC assessment

Use MFA or Managed Identity to control and secure QSA access to the 27k1 RMS

Manage QSA and QA access to each ROC assessment using their account name

Segment Documentation, Interview, Observation and System evidence requirements to improve workflow

Improve QSA efficiency and reduce stress - saves around six days per ROC Assessment

27k1 RMS System Training – Free of Charge

PCI DSS RMS Network diagram

QSA Company Reference

Image

Evolution Global Security is an award winning, QSA Company with offices in the UK, Channel Islands and Hong Kong. The business delivers a full range of PCI DSS services across the card processor, retail, insurance and financial sectors, including v4.0 ROC assessments.

Evolution recently started to use the 27k1 ROC Management System and this is what their Managing Director had to say:

“The 27k1 PCI DSS auditing tool offers a comprehensive and user-friendly solution for managing our PCI DSS compliance. Its intuitive interface has made the auditing process seamless and efficient”

PCI DSS - Evolution Global Security Company

27k1 ISMS Software

ISO 27001:2022 contains 93 Annex A security controls and changes to several ISMS clauses which are supported by the 27k1 ISMS.

The Annex A controls span 4 main themes:

1. Organisational controls (37 controls)
2. People controls (8 controls)
3. Physical controls (14 controls)
4. Technological controls (34 controls)

The 93 controls include 12 new controls that have been added in response to major shifts in both technology and threats since 2013. The emphasis of the control changes is on cyber-attack prevention, detection and response, as well as better protecting sensitive data.

Those using spreadsheets to manage their ISMS data face a huge challenge in mapping the 2013 controls across to the 2022 controls.

The 27k1 ISMS software allows easy transition from the 2013 Annex A Control set to the 2022 Annex A Control set for those companies that have achieved ISO 27001 certification.

The software provides gap analysis, risk management, full control of management review meetings, internal audits and nonconformities with dashboard style reporting.

A selection of clients using the 27k1 ISMS software

Image
Image
Image
Sedcom Networks Ltd
Image
Genus PLC

27k1 ISMS for Information Security Specialists

Implementers & Auditors

This software is a key system for your company's implementers and internal auditors. It allows you to move away from unwieldy and complex spreadsheets to a clear and easy to use system.

Used on an ongoing basis, the 27k1 ISMS can be readily referenced in the board room and prepares you for future audits at any time.

ISO27001 Consultants

Please contact us to discover the opportunities available to limited companies by partnering with us.

Testimonials

MIS Marine
Assure technical
Qualitation

The 27k1 ISMS is the perfect ISO 27001 solution for all businesses

The 27k1 ISMS application:

  • Is designed to be practical and intuitive to use. The software creates the ISMS, prepares the business for ISO 27001 certification and manages continuous improvements.
  • Provides total management of all Information Security asset data.
  • Lets system users run comprehensive and flexible risk management scenarios.
  • Tracks corrective actions and nonconformances from start to finish and attaches evidence to prove compliance.
  • Provides remote access to ISMS Consultants and Auditors.
  • Attractively priced for both ISO 27001 Consultants and all Companies.
  • Let's discuss your ISO 27001 project...
ISO 27001 ISMS Gap Analysis

GAP Analyses

Carry out a GAP Analysis using preconfigured ISO 27001 controls and clauses which suggest the recommended documentation.

Update GAP actions or tasks using the detailed project reports to track their progress.

27k1 ISMS Framework

ISMS Framework

This module sets the information Security policies, risk parameters and weights the impact and outcome of a risk assessment. The process is logical, intuitive and can be configured at every stage.
ISO 27001 asset management

Asset Management

All Information Security assets are managed in the Asset Manager, including personnel, hardware, software, outsourced services, etc.

Companies using spreadsheets or do not have an Asset or HR Register can choose to adopt the system’s asset management functionality, since it manages all asset details including the asset's lifecycle.

ISMS Documentation management system DMS

Documentation

The 27k1 ISMS accesses the businesses documents through URL’s or hyperlinks. This means that users can continue to use, create, access and track documents in the company’s Document Management System (DMS), rather than using third party networks to store these valuable assets.
ISO27001 controlsand soa

ISO Controls & SoA

All Annex A Controls are listed, each being subject to user selection in readiness for automatically producing a Statement of Applicability. Assign documents to each Control and manage the actions that have been assigned, demonstrating compliance and on-going improvements.

SoA’s are offered in draft format then formally issued when all the Controls and supporting documents are in place.

Cyber Security Risk Management

Risk Management

System users can run comprehensive and flexible risk management scenarios, based on asset valuation and existing controls. This leads to inherent and residual risk assessment and treatment.
Nonconformities and corretive actions

Nonconformities

The Conformance manager allows security breaches to be identified, allowing nonconformances and corrective actions to be raised, tracked and resolved. Conformance Reports highlight severity, root cause and preventive measures to be applied and actions taken.
management review meetings

Review Meetings

Using Microsoft 365 functionality, the system allows meetings to be diarised, invitations sent, agendas set and meeting notes recorded. Review meetings allow nonconformances and actions to be raised, tracked and resolved, enabling the continuous improvement of the ISMS.
27001 dashboard report

Internal Audits

The Internal Audit Manager module pulls in data that has been submitted to the 27k1 ISMS. It enables comprehensive internal audits on Clauses, Controls, Processes, Locations, Departments and Suppliers.

The system allows questions to be raised, audits to be planned in detail with auditees to be assigned and scheduled. The audits facilitate the raising of nonconformances, implementation of corrective actions and on-going improvements to the company’s information security position.

27001 dashboard report

Reports

The 27k1 ISMS provides a comprehensive range of reports in dashboard format accessible by all permitted company personnel The reports are rich in detail and accurately show the information security status of the business, demonstrating how each information security asset is performing against specific security measures and objectives.

The 27k1 ISMS Platform

ISO 27001 ISMS architecture

Retain Control of the ISMS

Your company retains control over and access to its’ ISMS data at all times.

All ISO 27001 ISMS and PCI DSS data is stored on Azure SQL Database,  Amazon Microsoft SQL Server Database or a Microsoft SQL Server database located within your company network.

All documents, images, supporting evidence and certificates are stored, accessed and amended on your own document management system or Intranet using hyperlinks.