Information Security Management (ISM)
Jump to navigation
Jump to search
An Information Security Management (ISM) is a security management task for information assets.
- See: ISM Sysgtem, Information Risk Management, ISO/IEC 27002, ISO/IEC 27001, Confidentiality, Asset, Threat (Computer), Vulnerability (Computing), IT Risk Management, Stakeholder (Corporate), Data Integrity, Availability (System).
References
2022
- (Wikipedia, 2022) ⇒ https://en.wikipedia.org/wiki/Information_security_management Retrieved:2022-7-9.
- Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The core of ISM includes information risk management, a process that involves the assessment of the risks an organization must deal with in the management and protection of assets, as well as the dissemination of the risks to all appropriate stakeholders.[1] This requires proper asset identification and valuation steps, including evaluating the value of confidentiality, integrity, availability, and replacement of assets. As part of information security management, an organization may implement an information security management system and other best practices found in the ISO/IEC 27001, ISO/IEC 27002, and ISO/IEC 27035 standards on information security. [2]