The Challenge

Security polices, standards and procedures that comprise an Information Security Management System (ISMS) are an absolutely critical cornerstone in developing a strong approach to security within your organisation, and to  meeting any security-related compliance obligations you may have.

However, the task of developing an ISMS tailored to your organisation's needs whilst also achieving compliance with external standards and regulations has the potential to be a particularly onerous, time consuming and expensive task.

Thankfully, the Security Colony can help to alleviate many of the cost, time and effort overheads that implementing a robust set of security policies can otherwise create.

Resources Available to Free Users

Through your free Security Colony account you have access to a range of resources that you can use to improve your ISMS.

A high level starter guide to help with the development of an Information Security Policy that delivers an appropriate balance of security controls to manage risk, and freedom to operate the business in a safe manner.

Two approaches to a modern ICT Acceptable Use Policy – one lightweight, and the other more comprehensive – that consist of key principles which govern use of company ICT assets and services, and requirements for all staff.

This spreadsheet includes the list of the mandatory documents and records that need to be in place as part of an organisation's implementation of the ISO 27001:2013 information security management system (ISMS). It also includes a list of other non-mandatory documents that are commonly in use.

Example Resource Available to Startup, Core and Enterprise Users

This spreadsheet provides a methodology for applying the NIST Cybersecurity Framework to evaluate both the current and target states for your organisation's cyber security program across the five core security Functions - Identify, Protect, Detect, Respond and Recover.

Example Resource Available to Core and Enterprise Users

One of our flagship resources, this toolkit is designed to provide the fundamental building blocks for developing an ISO 27001:2013 compliant information security management system (ISMS) within an organisation. It consists of two fundamental components: (1) A set of ‘core’ ISMS documents, consisting of a Cyber Security Strategy, Policy, Standards and Risk Assessment and Treatment Methodologies; (2) A series of supporting documents to assist with the process of implementing an ISO 27001:2013 compliant ISMS.

Other Security Colony Features That Can Help

If you have any further questions about updating your security policies / establishing an ISMS, you can get in touch with us via the "Ask Hivint"  function.

Paid subscribers also have their own Private Forum dedicated to their organisation.

Questions from free users will be answered when we can fit them in (but it generally won't take long).