ISMS Manager
The Getting Started section enables the system implementer to establish their company’s information security criteria and risk appetite. This means submitting data to the system that covers all the company’s information security assets, such as buildings and personnel, as well as setting the business and security objectives and system scope.
This groundwork lays the foundation for how the 27k1 system allows the user to assess risks, threats and vulnerabilities to which information security assets are exposed. The process is logical, intuitive and can be configured at every stage.