Information Security Management System (ISMS) Template
Information Security Management System (ISMS) Template
Programme
NPFIT
Sub-Prog /
Project
Information
Governance
NPFIT-FNT-TO-IG-IGCOM-0121.02
Prog. Director
Paul Jones
Status
Approved
Owner
Tim Davis
Version
1.0
Author
Danny
Solomon
Version Date
22 January 2007
Amendment History:
Version
Date
Amendment History
0.1
15 Jan 2007
1.0
22 Jan 2007
Forecast Changes:
Anticipated Change
When
Reviewers:
This document must be reviewed by the following:
Name
Signature
Title / Responsibility
Tim Davis
Head of Information
Governance
Andy Dickinson
Information Governance
Compliance Manager
Date
Version
Date
Version
Approvals:
This document must be approved by the following:
Name
Signature
Title / Responsibility
Tim Davis
Head of Information
Governance
Andy Dickinson
Information Governance
Compliance Manager
Distribution:
FileCM
ESP Supplier Portal
Document Status:
This is a controlled document.
Whilst this document may be printed, the electronic version maintained in FileCM is
the controlled copy. Any printed copies of the document are not controlled.
Related Documents:
These documents will provide additional information.
Ref no
Title
Version
NPFIT-SHR-QMS-PRP-0015
<enter latest>
Glossary of Terms:
List any new terms created in this document. Mail the NPO Quality Manager to have
these included in the master glossary above [1].
Page 2 of 10
Acronym
Page 3 of 10
Contents
1
Purpose..........................................................................................................5
1.2
Audience........................................................................................................5
1.3
Content...........................................................................................................5
Signature...............................................................................................................6
ISMS......................................................................................................................7
4.1
ISMS Strategy................................................................................................7
4.2
ISMS Topics...................................................................................................8
Page 4 of 10
1.2 Audience
This document has been written for suppliers needing to evidence their ISMS, for
example as part of the NHS CFH Common Assurance Programme (CAP).
1.3 Content
As a template, this document is expected to be completed by system suppliers and
submitted as part of the NHS CFH CAP, or as a response to other requirements
(such as Requirement 9 of NPFIT-FNT-TO-IG-IGCOM-0102.01 Information
Governance Offshore Support Requirements).
Section 2 of this document provides guidance as to the signing authority required for
responses to this template.
Section 3 asks about current compliance to the ISO27001 standard.
In the absence of current compliance to ISO27001, Section 4 provides a series of
ISMS topics for which detailed responses describing the suppliers ISMS are required,
and asks about plans for achieving ISO27001 compliance.
Note that Section 2 plus either Section 3 or Section 4 is required to be completed. If
an appropriate scope of current compliance to ISO27001 is available and described
in Section 3, then an explicit response to Section 4 is not required.
Page 5 of 10
2 Signature
This document must be signed by a senior officer of the organisation, with
responsibility for information security1.
Name of signatory
Position
Company
Contact details
Only one of section 3, or section 4, needs to be completed, depending whether the
company is currently compliant to ISO27001.
Page 6 of 10
4 ISMS
Both parts of this section should be completed if your organisation is not currently
compliant with the ISO27001 information security standard.
Page 7 of 10
Note that these topics are drawn from the ISO27001 standard.
Page 8 of 10
Communications and
Operations Management:
describe how your
organisation ensures the
correct and secure
operation of information
processing facilities,
through:
operational
procedures and
responsibilities
third-party service
delivery management
system planning and
acceptance
protection against
malicious code
backup
network security
management
media handling
exchange of
information
electronic commerce
services
monitoring
network access
control
operating system
access control
application and
information access
control
mobile computing
and teleworking
Page 9 of 10
Information systems
acquisition, development
and maintenance. Describe
how your organisation
ensures that security is an
integral part of information
systems through:
security requirements
analysis and
specification
correct processing in
applications
cryptographic
controls
security of system
files
security in
development and
support processes
technical vulnerability
management
Information Security
Incident Management:
describe how your
organisation ensures that
information security
weaknesses and events are
communicated in a timely
manner.
Business Continuity
Management: describe how
your organisation
counteracts interruptions to
business activities and
protects critical business
processes from the effects
of major failures or
disasters, and ensures their
timely resumption.
Compliance: describe how
your organisation ensures
compliance with
organisational security
policies and standards.
Page 10 of 10