What sets us apart
An all-new, no-nonsense method.
Get certified in just 4–5 months with the help of ISMS Connect’s unique step-by-step guide.
Get certified in just 4–5 months with the help of ISMS Connect’s unique step-by-step guide.
Ready-made templates save you time & money
Developed for ISO® 27001 requirements.
Templates contain built-in tips and instructions.
More than 60 documents — prewritten, prefilled, dead simple.
Step-by-step instruction and tips.
Discover the full list of ISMS documentation included. Click below to expand it.
1. Guidance documents | |
---|---|
Definition of Scope | |
Information Security Policy |
2. Control documents & management | |
---|---|
Training concept | |
Key performance indicators (KPI) | |
Inventory of assets | |
Document control procedure | |
Appointment information security officer |
2.1 Audits | |
---|---|
Audit program | |
Audit procedure | |
Audit protocol |
2.2 Management review | |
---|---|
Management review procedure | |
Management review |
2.3 Risk management | |
---|---|
Risk management procedure | |
Risk assessment |
2.4 Identification of requirements | |
---|---|
Legal cadastre | |
Interested parties | |
Further requirements | |
Identification of requirements |
2.5 Plan of action | |
---|---|
Action plan | |
Procedure for implementing corrective measures |
2.6 SoA (ISO 27001) | |
---|---|
Statement of applicability (SOA) | |
Evaluation of norm compliance |
3. Policies & Measures | |
---|---|
Information classification policy | |
Disposal policy | |
Clean desk policy | |
Password policy |
3.1 Incident Response | |
---|---|
List of incidents | |
Handling of incidents | |
Emergency plan |
3.2 Supplier Policy | |
---|---|
Supplier self-disclosure form | |
Supplier policy | |
Supplier policy – supplier assessment | |
Supplementary agreement with suppliers | |
Non-disclosure agreement (NDA) | |
Granted contractor accesses |
3.3 Change management | |
---|---|
List of changes | |
Change management |
3.4 Mobile device management | |
---|---|
Asset handover protocol | |
Issuing mobile devices to employees |
3.5 Human resources | |
---|---|
Personnel security policy | |
On-off-reboarding checklist | |
Contract addendum information security and confidentiality statement | |
Access rights checklist |
3.6 Project management | |
---|---|
List of projects | |
Project management |
3.7 Physical access management | |
---|---|
Physical access policy | |
Visitor handout |
3.8 IT | |
---|---|
Patch management | |
Malware protection policy | |
Logging policy | |
IT cloud provider directory | |
IT procurement policy | |
Development policy | |
Network security policy | |
Cryptography policy | |
Backup policy | |
Access policy |
3.9 Threat Intelligence | |
---|---|
Threat intelligence | |
Threat Library |
Understand, implement, proof.
Detailed, step-by-step implementation guidance.
For each chapter, we provide a full explanation on how to fulfill everything expected from you
Customer certification success is our #1 priority. That’s why we offer unlimited support in every plan.
In our Expert Round sessions, experts and consultants meet to discuss questions, new developments and best practices.
We help small and mid-sized organisations from all sectors succeed in their security strategy.
Documents created
With the help of your expertise and advice, we were able to understand and meet the requirements more quickly. ISO® 27001 could be implemented immediately and the certification body attested us excellent preparation.
Olaf Pätz
CEO at Outerscore GmbH
Thanks to ISMS Connect, we were able to build up all the relevant processes and the necessary know-how to achieve ISO® 27001 certification within a very short time. Especially the clear structure, intuitive templates and tools helped us to integrate the knowledge around information security in our own company.
Magnus Schückes
Managing Director at Elona Health GmbH
We found it very enriching to achieve our planned certification so quickly and with such a high level of quality with the help of the toolkit and the great advice. Thanks a lot for this support.
You can pay by credit card or via SEPA direct debit.
After payment, you can login with your credentials to access your user account and all content in your plan. If you pay by credit card, your access is instantly available.
Of course. We believe information security doesn’t need to be hard. Our goal is to give companies the tools they need to tackle the topic of “information security” themselves. The ISMS Toolkit is designed to help you implement ISMS yourself with step-by-step guidance and support without time and budget consuming external consulting services.
ISMS Connect company is not a part and not affiliated with any other company. Additionally, This site is NOT endorsed by any other company including those listed below.
TISAX® is a registered trademark of the ENX Association.
VDA® is a registered trademark of Verband der Automobilindustrie.
ISO® is a registered trademark of the International Organization for Standardization.
DIN® is a registered trademark of Deutsches Institut für Normung (German Institute for Standardisation).
Have you still got questions left? We are happy to assist you!