Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001

An Information Security Management System, according with the ISO/IEC 27001 is the set of “that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security”. ISO/IEC 27001 defines the requirements and process for implementing an Information Security Management System. However, implementing this standard without a detailed plan can become a burden on organizations. This paper presents a maturity model for the planning, implementation, monitoring and improvement of an Information Security Management System based on ISO/IEC 27001. The purpose of this model is to provide an assessment tool for organizations to use in order to get their current Information Security Management System maturity level. The results can then be used to create an improvement plan which will guide organizations to reach their target maturity level. This maturity model allows organizations to assess their current state of affairs according to the best practices defined in ISO/IEC 27001. The maturity model proposed in this paper is evaluated through a multi-step perspective that is used to confirm that the maturity model makes a useful and novel contribution to the Information Security Management domain by taking in consideration the best practice of the domain.

[1]  Michael Rosemann,et al.  Understanding the Main Phases of Developing a Maturity Assessment Model , 2005 .

[2]  Ron Weber,et al.  On the ontological expressiveness of information systems analysis and design grammars , 1993, Inf. Syst. J..

[3]  Eric Dubois,et al.  A Systematic Approach to Define the Domain of Information System Security Risk Management , 2010, Intentional Perspectives on Information Systems Engineering.

[4]  Björn Niehaves,et al.  Maturity Models in Information Systems Research: Literature Search and Analysis , 2011, Commun. Assoc. Inf. Syst..

[5]  Alan R. Hevner,et al.  Design Research in Information Systems , 2010 .

[6]  Alan R. Hevner,et al.  Design Research in Information Systems: Theory and Practice , 2010 .

[7]  H. Gilbert Miller,et al.  Secure Cyberspace: Answering the Call for Intelligent Action , 2009, IT Professional.

[8]  Jörg Becker,et al.  Developing Maturity Models for IT Management , 2009, Bus. Inf. Syst. Eng..

[9]  Tobias Mettler,et al.  A Design Science Research Perspective on Maturity Models in Information Systems , 2009 .

[10]  日本規格協会 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .

[11]  Robert Winter,et al.  Towards a Classification of Maturity Models in Information Systems , 2010 .

[12]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..