Project Plan For Implementation of The Information Security Management System
Project Plan For Implementation of The Information Security Management System
Project Plan For Implementation of The Information Security Management System
[Organization name]
PROJECT PLAN
for Implementation of the Information Security Management
System
Code:
Version:
Date of version:
Created by:
Approved by:
Confidentiality level:
[organization name] [confidentiality level]
Change history
Date Version Created by Description of change
Table of contents
1. PURPOSE, SCOPE AND USERS................................................................................................................. 3
2. REFERENCE DOCUMENTS....................................................................................................................... 3
Project Plan for ISMS [BCMS] Implementation ver [version] from [date] Page 2 of 7
[organization name] [confidentiality level]
The purpose of the Project Plan is to clearly define the objective of the Information Security
Management System (ISMS) implementation project, documents to be written, deadlines, and roles
and responsibilities in the project.
The Project Plan is applied to all activities performed in the ISMS implementation project.
Users of this document are members of [top management] and members of the project team.
2. Reference documents
ISO/IEC 27001 standard
ISO 22301 standard
[decision or any similar document prescribing project launching]
[methodology for project management]
To implement the Information Security Management System in accordance with the ISO 27001
standard by [date] at the latest.
During the ISMS implementation project, the following documents (some of which contain
appendices that are not expressly stated here) will be written:
Procedure for Document and Record Control – procedure prescribing basic rules for writing,
approving, distributing and updating documents and records
Procedure for Identification of Requirements – procedure for identification of statutory,
regulatory, contractual and other obligations
Scope of the Information Security Management System – a document precisely defining
assets, locations, technology, etc. which are part of the scope
Information Security Policy – this is a key document used by management to control
information security management
Risk Assessment and Risk Treatment Methodology – describes the methodology for
managing information risks
Risk Assessment Table – the table is the result of assessment of asset values, threats and
vulnerabilities
Risk Treatment Table – a table in which appropriate security controls are selected for each
unacceptable risk
Risk Assessment and Risk Treatment Report – a document containing all key documents
made in the process of risk assessment and risk treatment
Statement of Applicability – a document which determines the objectives and applicability
of each control according to Annex A of the ISO 27001 standard
Procedure for Internal Audit – defines how auditors are selected, how audit programs are
written, how audits are conducted and how audit results are reported
Project Plan for ISMS [BCMS] Implementation ver [version] from [date] Page 3 of 7
[organization name] [confidentiality level]
Procedure for Corrective Action – describes the process of implementation for corrective
and preventive actions
Measurement Report - summarizes the objectives of the ISMS, the measurement method,
the frequency of measurement, and the results. It is used to conclude how effective
information security is in your company.
Form for Management Review Minutes – a form used to create minutes from the
management meeting held to review ISMS adequacy
Risk Treatment Plan – an implementation document specifying controls to be implemented,
who is responsible for implementation, deadlines and resources
Other documents which must be written during ISMS implementation are specified in the Risk
Treatment Plan.
During the implementation of business continuity management the following documents (some of
which contain appendices that are not expressly stated here) will be written:
Business Continuity Management Policy – sets a basic framework for the BCMS, determines
the scope and responsibilities
Business Impact Analysis (BIA) questionnaires – analysis of qualitative and quantitative
impacts on business, of necessary resources, etc.
Business Continuity Strategy – defines critical activities, interdependencies, recovery time
objectives, strategy for managing and ensuring business continuity, strategy for recovering
resources, strategy for individual critical activities
Business Continuity Plan – a detailed description of how to respond to disasters or other
business disruptions, and how to recover all critical activities
Training and Awareness Plan – a detailed overview of how employees will be trained to
execute planned tasks, and how they will be made aware of the importance of business
continuity
Business Continuity Exercising and Testing Plan – describes how plans will be exercised and
tested with the objective of identifying necessary corrective actions and improving the plan
BCMS Maintenance and Review Plan – a detailed overview of how plans and other BCMS
documents should be maintained to ensure their functioning in the case of business
disruption
Post-incident Review Form – a form used for reviewing effectiveness of plans after an
incident
*
3.3. Deadlines
Deadlines for acceptance of individual documents in the course of ISMS implementation are as
follows:
Document Deadlines for document
acceptance
Procedure for the Document and Record Control June 30, 20xx
Project Plan for ISMS [BCMS] Implementation ver [version] from [date] Page 4 of 7
[organization name] [confidentiality level]
Deadlines for acceptance of individual documents in the course of BCMS implementation are as
follows:
Each project has an assigned "sponsor" who does not actively participate in the project. The project
sponsor must be regularly briefed by the project manager about the project status, and intervene if
the project is halted.
The role of the project manager is to ensure resources necessary for project implementation, to
coordinate the project, to inform the sponsor about the progress, and to carry out administrative
work related to the project. Project manager's authority should be such as to ensure uninterrupted
project implementation within set deadlines.
The role of the project team is to assist in various aspects of project implementation, to perform
tasks as specified in the project, and to make decisions about various issues that require a
multidisciplinary approach. The project team meets each time before the final version of a document
from section 2 of this Project Plan is completed, and in all other cases when the project manager
deems it necessary.
The main risks in the implementation of the project are the following:
1. Extension of deadlines in the risk assessment phase
2. Extension of deadlines during the development of business continuity plans
3. Performing activities that incur unnecessary costs and waste time
4. Selection of too many and/or too expensive controls
A shared folder including all documents produced during the project will be created on the local
network. All members of the project team will have access to these documents. Only the project
manager [and members of the project team] will be authorized to make changes and delete files.
The project manager will prepare a project implementation report on a monthly basis and forward it
to the project sponsor.
When evaluating the effectiveness and adequacy of this document, the following criteria need to be
considered:
whether all employees engaged in the project perform their activities in line with this
document
whether all project deadlines are met
[job title]
Project Plan for ISMS [BCMS] Implementation ver [version] from [date] Page 6 of 7
[organization name] [confidentiality level]
[name]
_________________________
[signature]
Project Plan for ISMS [BCMS] Implementation ver [version] from [date] Page 7 of 7