Abstract—This paper presents knowledge about the Information security management system and its different frameworks. How to implement ISMS so that it meets the requirements of cost, time, security. It goes into more detail about what an ISMS is, types of framework their evaluation, comparison, and its benefits.

Keywords—ISMS, ISO, NIST, Cyber Security, Risk, Organization

1. Introduction to ISMS( Information Security Management System)

ISMS is used for securing sensitive information from cyber-attacks. It contains a set of procedures and policies to protect against data. ISMS’s goal is to protect against risks and minimize the attacks and also helps in business continuity planning by minimizing the impact of a breach. ISMS can be targeted towards similar types of data like customer data. It also shows behaviors of data, employee and technology. ISMS also gives suggestions about audits, improvement, documentation and preventing attacks.[1]

ISMS built on three pillars: people, process and technology. By implementing ISMS you can reduce your cost associated with information security. ISMS will secure your information by reducing the chances of cyberattacks.

ISMS focus on basically three factors:

Confidentiality: Information is not available or disclosed for unauthorized people or processes.

Integrity: Information is accurate without modification and protected from fraudulent.

Availability: Information is available and accessible only by authorized people.     

  1. ISMS Frameworks 
Information Security Management System
  ISMS Framework working [2]

International Standard Organization 27001

ISO 27001 is an international standard for maintaining and creating an Information security management system. It makes the implementation process straight forward, you only have to go with standard advice.

We can not say that it is easy. You have to take a small team to tackle all this and give them around some months or year but after that, it will be worth it.

Also, Read | Improper Access Control: A Complete Guide

As nowadays cyber threats are increasing in almost every organization so everyone is switching to ISO 27001 because it mitigates the risk factor in the organizations.

Even you have a good level of security and suppliers but your clients are not confident about it. Then you can demonstrate the standard requirement which can ease their concern and give you an advantage by increasing the client’s confidence.[3]

ISO 27001 can also help you with GDPR (General Data Protection Regulation) and NIS Directive (Directive on security of network and information system) as their many requirements overlap.

NZISM Protective Security Requirements (PSR) Framework

It is a New Zealand national technical security policy. NZISM defines standards and policies for the government departments of baseline and minimum securities. the New Zealand Security Intelligence Service’s Protective Security Requirements (PSR) framework, which aims the expectation of government for physical security and managing personal information.

It is a beneficial document for KIWI companies as it is a New Zealand document and it is publicly available to increase awareness, improve transparency and allow greater access.    

NIST (National institute of standard and technology)

These cybersecurity frameworks provide a set of policies and rules for minimizing cyber risks in the company.[4]

NIST works in three sections: Core, Profile, and Tier. The core contains the answer to the questions on cybersecurity for the organization. The profile gives the basic scenario of the requirements of the organization for cyber risk. Tiers contain the needs of the organization for the risk assessments.

Australian Signals Directorate

Australian signals directorate is not a standard as such but its a set of control or strategies and if it implemented correctly it will mitigate 85% of commons attack techniques.

Essential 8 is the greatest part of strategies that make ASD strategy to mitigate cyber-attacks. Essential 8 are so powerful that they use it for every organization for cybersecurity. ASD is so good at responding to real-world attacks and in vulnerability assessment and penetration testing of Australian government agencies.

  1. Control Objectives for Information and Related Technology (COBIT

Control Objectives for Information and Related Technology is a high-level framework used for mitigating and identifying risk with the standards of IT business. It is mostly used in a financial organization to comply with standards like Sarbanes-Oxley. If your business wants a formal risk and management framework then it is perfect for you.

Benefits of ISMS

ISMS helps to protect the information in all forms whether it is in digital format, paper-based or in the cloud.[5] By implementing  ISMS in an organization it increases the resilience of cyberattacks.

It provides caters framework which helps the organization to put all the information at the same place and keep it safe.

ISMS has a risk assessment and analysis approach which reduces the cost of the organization by effectively reducing the number of defense layers.

It offers a set of policies that offer confidentially, integrity and availability of data to make it secure.

ISMS helps the employee to understand risk and security in their every workday approach. 


  1. Irwin, Luke. “What Is an ISMS and Why Does Your Organisation Need One?” IT Governance Blog, 7 Mar. 2019, https://www.itgovernance.eu/blog/en/what-is-an-isms-and-why-does-your-organisation-need-one.
  2. Framework. https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory/rm-isms/framework. Accessed 16 Nov. 2019.
  3. Heron, Julia. “NIST Cybersecurity Framework Gets a Reboot in v1.1.” ISMS.Online, 15 May 2018, https://www.isms.online/cyber-security/nist-cybersecurity-framework-reboot-version-11/.
  4. Five Most Common Security Frameworks Explained – Origin IT. https://originit.co.nz/the-strongroom/five-most-common-security-frameworks-explained/. Accessed 16 Nov. 2019.
  5. Dutton, Julia. “What Is an ISMS? 9 Reasons Why You Should Implement One.” IT Governance Blog, 4 June 2019, .

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.