0% found this document useful (0 votes)
59 views

ISMS Architecture: ISMS Repository and Configuration Management System (Security View)

The document describes the architecture of an Information Security Management System (ISMS). The ISMS includes a repository and configuration management system that oversees approved infrastructure changes from a standard or emergency change process. It also includes an identity and access management system that manages access approvals and requests. The ISMS also contains registers and records for security responsibilities, policies, deviations, corrective actions, training, work requests, incidents, risks and issues. It has workflow and reporting engines for management and a knowledge base. Finally, it provides operational work instructions.

Uploaded by

Med
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

ISMS Architecture: ISMS Repository and Configuration Management System (Security View)

The document describes the architecture of an Information Security Management System (ISMS). The ISMS includes a repository and configuration management system that oversees approved infrastructure changes from a standard or emergency change process. It also includes an identity and access management system that manages access approvals and requests. The ISMS also contains registers and records for security responsibilities, policies, deviations, corrective actions, training, work requests, incidents, risks and issues. It has workflow and reporting engines for management and a knowledge base. Finally, it provides operational work instructions.

Uploaded by

Med
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ISMS Architecture

ISMS Domain

ISMS Repository and Configuration Management System (Security View)

Approved Infrastructure
A
Change

Infrastructure
Standard Change Configuration
Management
System
Approved Emergency
Change

CI Cross Reference
Updated Access
Approvals
Identity and Access
Management
ISO Approved Access System
Request / Change

Approved Emergency
Change Software Source
Code Management
System
Updated Software
Object

ISMS Registers & Records

Info Sec Responsibility Info Sec Policies and


Statements Guidelines Deviation Register

Corrective Action Security Training Info Security Work


Requests Register Requests

Security Incident and Risks and Issues


Event Register Register Forum Reports

ISMS Workflow and Reporting Engines

Information
Work Flow Calendar
Security
Management Management
Knowledge Base

ISMS Operational Work Instructions

You might also like