ISO 9001

Progress: 100%

Management System (Clauses 4–7)

IDNameApplicableLevelCompleteIntegrityPolicyPracticeProofReifegradBreiteTiefeNote
Understanding the organization and its contextUnderstanding the organization and its contextMin-OK-**---
Understanding the needs and expectations of interested partiesUnderstanding the needs and expectations of interested partiesMin-OK------Dokument vorhanden, aber nicht sofort greifbar
Determining the scope of the information security management systemDetermining the scope of the information security management systemErw-OK------
ISMS - Establish, implement, maintain, continually improveISMS - Establish, implement, maintain, continually improveMin-OK------
Leadership and commitment - establish objectivesLeadership and commitment - establish objectivesMin-OK------
Leadership and commitment - ensuring integration into organization's processesLeadership and commitment - ensuring integration into organization's processesMin-OK------
L & C - ensuring needed resources are availableL & C - ensuring needed resources are availableMin-OK------
L & C - communicating importance and conforming to the ISMSL & C - communicating importance and conforming to the ISMSMin-OK------
L & C - ensuring ISMS achieves intended outcomesL & C - ensuring ISMS achieves intended outcomesMin-OK------
L & C - direction and supportL & C - direction and supportMin-OK------
L & C - promoting continual improvementL & C - promoting continual improvementMin-OK------
L &C - support other relevant management rolesL &C - support other relevant management rolesMin-OK------
Policy - appropriate to purpose of organizationPolicy - appropriate to purpose of organizationSdT-OK------
Policy - includes objectivesPolicy - includes objectivesSdT-OK------
Policy - includes commitment to satisfy applicable requirementsPolicy - includes commitment to satisfy applicable requirementsSdT-OK------
Policy - includes commitment to continual improvementPolicy - includes commitment to continual improvementErw-OK------
Policy - be available as documented informationPolicy - be available as documented informationErw-OK------
Policy - be communicated within the organizationPolicy - be communicated within the organizationMin-OK------
Policy - be available to interested parties, as appropriatePolicy - be available to interested parties, as appropriateErw-OK------
Roles - ensure that roles are assigned and communicatedRoles - ensure that roles are assigned and communicatedMin-OK------
Roles - assign responsibility and authority for ensuring ISMS conforms to standardRoles - assign responsibility and authority for ensuring ISMS conforms to standardMin-OK------
Roles - assign responsibility for reporting on the performance of the ISMS to top managementRoles - assign responsibility for reporting on the performance of the ISMS to top managementMin-OK------
General: Risk Assessment ProcessGeneral: Risk Assessment Process----------
Risk Assessment - Risk acceptance criteriaRisk Assessment - Risk acceptance criteriaMin-OK------
Risk Assessment - Criteria for performing information security risk assessmentRisk Assessment - Criteria for performing information security risk assessmentMin-OK------
Risk Assessment - Consistent, valid and comparable resultsRisk Assessment - Consistent, valid and comparable resultsErw-OK------
Risk Assessment - C-I-A evaluationRisk Assessment - C-I-A evaluationErw-OK------
Risk Assessment - identify risk ownersRisk Assessment - identify risk ownersMin-OK------
Risk Assessment - assess potential consequences of risks materializingRisk Assessment - assess potential consequences of risks materializingMin-OK------
Risk Assessment - assess realistic likelihood of occurrence of riskRisk Assessment - assess realistic likelihood of occurrence of riskMIn-OK------
Risk Assessment - determine levels of riskRisk Assessment - determine levels of riskMin-OK------
Risk Assessment - Comparison of results with criteria establishedRisk Assessment - Comparison of results with criteria establishedMin-OK------
Risk Assessment - prioritize analyzed risks for risk treatmentRisk Assessment - prioritize analyzed risks for risk treatmentMin-OK------
retain documented information about risk assessment processretain documented information about risk assessment processMin-OK------
General: Risk Treatment ProcessGeneral: Risk Treatment Process----------
Select risk treatment optionsSelect risk treatment optionsMin-OK------
Determine required controls (any source)Determine required controls (any source)Min-OK------
Compare determined controls with Annex A and verify that no necessary controls have been omitted.Compare determined controls with Annex A and verify that no necessary controls have been omitted.Min-OK------
Produce SoAProduce SoAErw-OK------
formulate risk treatment planformulate risk treatment planMin-OK------
obtain risk owner approval of risk treatment plan and acceptance of residual risksobtain risk owner approval of risk treatment plan and acceptance of residual risksMin-OK------
retain documented information about risk treatment processretain documented information about risk treatment processErw-OK------
General: InfoSec objectives at relevant functions and levelsGeneral: InfoSec objectives at relevant functions and levelsErw-OK------
objectives to be consistent with information security policyobjectives to be consistent with information security policyErw-OK------
objectives to be measurable, if practicableobjectives to be measurable, if practicableErw-OK------
objective to take into account applicable IS requirements and results from risk assessmentobjective to take into account applicable IS requirements and results from risk assessmentErw-OK------
objectives - communication of objectivesobjectives - communication of objectivesErw-OK------
update of objectives as appropriateupdate of objectives as appropriateErw-OK------
retain documented information on objectivesretain documented information on objectivesErw-OK------
achvieving objectives - determine tasksachvieving objectives - determine tasksErw-OK------
achvieving objectives - determine resources requiredachvieving objectives - determine resources requiredErw-OK------
achvieving objectives - determine responsibilitiesachvieving objectives - determine responsibilitiesErw-OK------
achvieving objectives - determine planned completionachvieving objectives - determine planned completionErw-OK------
achvieving objectives - determine method of evaluation of resultsachvieving objectives - determine method of evaluation of resultsErw-OK------
Planning of changesPlanning of changes----------
Changes to ISMS shall be carried out in a planned manner.Changes to ISMS shall be carried out in a planned manner.-Erw-OK-**---
Support - Resources - determine and provide resources needed for establishment, implementation, maintenance and continual improvement of the ISMSSupport - Resources - determine and provide resources needed for establishment, implementation, maintenance and continual improvement of the ISMSMin-OK-~*---2 fehlende Planstellen sowie keine Security-Rollen vorhanden
Competence - determine necessary competence of persons under its control affecting IS performanceCompetence - determine necessary competence of persons under its control affecting IS performanceMin-OK-**---teilweise kein Problem, weil Schulungen durchgängig genehmigt werden.
Competence - ensure that persons are competent on the basis of education, training, or experienceCompetence - ensure that persons are competent on the basis of education, training, or experienceMin-OK-**---
Competence - where applicable, take action to acquire necessary competence and evaluate actions takenCompetence - where applicable, take action to acquire necessary competence and evaluate actions takenMin-OK-**---
retain appropriate documented information as evidence of competenceretain appropriate documented information as evidence of competenceMin-OK-**---
Awareness - Awareness of information security policyAwareness - Awareness of information security policyMin-OK-**---Schulungen werden durchgeführt, es gibt aber keinen Nachweis der Anwesenheit. - 2x/Jahr Derzeit werden nur neue Mitarbeiter geschult.
Awareness - General awareness of staffAwareness - General awareness of staffMin-OK-**---
Awareness - of implications of not conforming with IS requirementsAwareness - of implications of not conforming with IS requirementsErw-OK-**---
Communication - determine need for internal and external communicationsCommunication - determine need for internal and external communicationsSdT-OK-~~---
determination - include what to communicatedetermination - include what to communicateSdT-OK-~~---
determination - when to communicatedetermination - when to communicateSdT-OK-~~---
determination - with whom to communicatedetermination - with whom to communicateSdT-OK-~~---
determination - who to communicatedetermination - who to communicateSdT-OK-~~---
determination - processes by which communication shall be effecteddetermination - processes by which communication shall be effectedSdT-OK-~~---
Documented Information - as required by StandardDocumented Information - as required by StandardErw-OK------
Documented information - as identified necessaryDocumented information - as identified necessaryErw-OK------
Creating and updating - ensure identification and descriptionCreating and updating - ensure identification and descriptionErw-OK-**---Confluence wird eingesetzt.
Creating and updating - ensure appropriate formatCreating and updating - ensure appropriate formatErw-OK-**---
Creating and updating - review and approval for suitability and adequacyCreating and updating - review and approval for suitability and adequacyErw-OK-**---
Control of documented information - ensure availability and suitability for use, where and when neededControl of documented information - ensure availability and suitability for use, where and when neededErw-OK-**---
Control of documented information - ensure adequate protection (loss of confidentiality, availability, integrity)Control of documented information - ensure adequate protection (loss of confidentiality, availability, integrity)Erw-OK-**---
Control of documented information - address distribution, access, retrieval and useControl of documented information - address distribution, access, retrieval and useErw-OK-**---
Control of documented information - address storage and preservation, including preservation of legibilityControl of documented information - address storage and preservation, including preservation of legibilityErw-OK-**---
Control of documented information - address control of changes (version control)Control of documented information - address control of changes (version control)Erw-OK-**---
Control of documented information - address retention and dispositionControl of documented information - address retention and dispositionErw-OK-**---
Operational planning and control - Plan, implement, control processes needed to implement ISMS and implement actions from risk assessmentOperational planning and control - Plan, implement, control processes needed to implement ISMS and implement actions from risk assessmentErw-OK-**---
Operational planning and control - Implement plans to achieve IS objectivesOperational planning and control - Implement plans to achieve IS objectivesMin-OK-**---
Operational planning and control - Keep documented information to the extent necessary to have confidence that processes are carried out as planned.Operational planning and control - Keep documented information to the extent necessary to have confidence that processes are carried out as planned.Erw-OK-**---
Operational planning and control - organization to control planned changes and review consequences of unintended changes, take action to mitigate any adverse effects.Operational planning and control - organization to control planned changes and review consequences of unintended changes, take action to mitigate any adverse effects.Erw-OK-**---
Operational planning and control - organization to ensure that outsourced processes are determined and controlled.Operational planning and control - organization to ensure that outsourced processes are determined and controlled.SdT-OK-**---
IS risk assessment - perform at planned intervals or when significant changes are proposed or occur, based on risk criteria establishedIS risk assessment - perform at planned intervals or when significant changes are proposed or occur, based on risk criteria establishedMin-OK------
IS risk assessment - retain documented informationIS risk assessment - retain documented informationMin-OK------
IS risk treatment - implement risk treatment planIS risk treatment - implement risk treatment planMin-OK-~~---Derzeit werden Security-Themen im Backlog geführt.
IS risk treatment - retain documented information of results of IS risk treatmentIS risk treatment - retain documented information of results of IS risk treatmentMin-OK-~~---
Monitoring, measurement, analysis and evaluation - Evaluate information security performance and effectiveness of the ISMS (general process)Monitoring, measurement, analysis and evaluation - Evaluate information security performance and effectiveness of the ISMS (general process)Erw-OK------
Determine what needs to be monitored & measured, including processes and controlsDetermine what needs to be monitored & measured, including processes and controlsErw-OK------
Determine methods for monitoring, measurement, analysis and evaluation to ensure valid results (valid = comparable and reproducible)Determine methods for monitoring, measurement, analysis and evaluation to ensure valid results (valid = comparable and reproducible)Erw-OK------
Determine when monitoring and measuring shall be performedDetermine when monitoring and measuring shall be performedErw-OK------
Determine who shall monitor and measureDetermine who shall monitor and measureErw-OK------
Determine when the results from monitoring and measurement shall be analysed and evaluatedDetermine when the results from monitoring and measurement shall be analysed and evaluatedErw-OK------
Determine who shall analyse and evaluate these resultsDetermine who shall analyse and evaluate these resultsErw-OK------
Internal Audit - conduct at planned intervalsInternal Audit - conduct at planned intervalsSdT-OK-~~---
ISMS conforms to org's own requirementsISMS conforms to org's own requirementsSdT-OK-~~---
ISMS conforms to requirements of StandardISMS conforms to requirements of StandardErw-OK-~~---
ISMS is effectively implemented and maintainedISMS is effectively implemented and maintainedSdT-OK-~~---
ISMS - plan, establish, and maintain audit program including frequency, methods, responsibilities planning requirements, and reporting.ISMS - plan, establish, and maintain audit program including frequency, methods, responsibilities planning requirements, and reporting.SdT-OK-~~---
Audit program to consider importance of processes concernedAudit program to consider importance of processes concernedSdT-OK-~~---
Audit program to consider results of previous auditsAudit program to consider results of previous auditsSdT-OK-~~---
Define audit criteria and scope for each auditDefine audit criteria and scope for each auditSdT-OK-~~---
select auditors and conduct audits that ensure objectivity and impartialityselect auditors and conduct audits that ensure objectivity and impartialitySdT-OK-~~---
ensure audit results are reported to relevant managementensure audit results are reported to relevant managementSdT-OK-~~---
retain documented information as evidence of the audit programme and audit resultsretain documented information as evidence of the audit programme and audit resultsErw-OK-~~---
Management Review - Review ISMS at planned intervals to ensure continued suitability, adequacy, and effectivenessManagement Review - Review ISMS at planned intervals to ensure continued suitability, adequacy, and effectivenessMin-OK-~~---
review status of actions from previous management reviewsreview status of actions from previous management reviewsMin-OK-~~---
changes to internal and external issues relevant to the ISMSchanges to internal and external issues relevant to the ISMSMin-OK-~~---
feedback on performance including trends infeedback on performance including trends inMin-OK-~~---
nonconformities and corrective actionsnonconformities and corrective actionsMin-OK-~~---
monitoring and measurement resultsmonitoring and measurement resultsMin-OK-~~---
audit resultsaudit resultsMin-OK-~~---
fulfillment of information security objectivesfulfillment of information security objectivesMin-OK-~~---
feedback from interested partiesfeedback from interested partiesMin-OK-~~---
results of risk assessment and status of risk treatment planresults of risk assessment and status of risk treatment planMin-OK-~~---
opportunities for continual improvementopportunities for continual improvementMin-OK-~~---
Outputs shall include decisions related to continual improvement opportunities and needs for changes to the ISMS.Outputs shall include decisions related to continual improvement opportunities and needs for changes to the ISMS.Min-OK-~~---
retain documented information as evidence of the results of management reviewsretain documented information as evidence of the results of management reviewsMin-OK-~~---
Nonconformity and corrective action - react to nonconformity and correct itNonconformity and corrective action - react to nonconformity and correct itMin-OK-~~---
Nonconformity and corrective action - deal with consequences of nonconformityNonconformity and corrective action - deal with consequences of nonconformityMin-OK-~~---
Nonconformity and corrective action - Evaluate need for action to eliminate causes (root cause) of nonconformity in order to prohibit recurrence or occurrence elsewhere by:Nonconformity and corrective action - Evaluate need for action to eliminate causes (root cause) of nonconformity in order to prohibit recurrence or occurrence elsewhere by:Min-OK-~~---
- reviewing the nonconformity- reviewing the nonconformityMin-OK-~~---
- determining the causes of the nonconformity- determining the causes of the nonconformityMin-OK-~~---
- determining, if similar nonconformities exist, or could potentially occur- determining, if similar nonconformities exist, or could potentially occurMin-OK-~~---
Nonconformity and corrective action - implement any action neededNonconformity and corrective action - implement any action neededMin-OK-~~---
Nonconformity and corrective action - review effectiveness of corrective actionNonconformity and corrective action - review effectiveness of corrective actionMin-OK-~~---
Nonconformity and corrective action - make changes to the ISMS, if necessaryNonconformity and corrective action - make changes to the ISMS, if necessaryMin-OK-~~---
Retain documented information as evidence of nature of nonconformities and subsequent actions takenRetain documented information as evidence of nature of nonconformities and subsequent actions takenMin-OK-~~---
Retain documented information as evidence of the results of corrective actionRetain documented information as evidence of the results of corrective actionMin-OK-~~---
Continuous improval of suitability, adequacy and effectiveness of the ISMSContinuous improval of suitability, adequacy and effectiveness of the ISMSMin-OK-**---