12-Month ISM| **5** | **Training & Access Control:**
• Conduct the first company-wide Security Awareness Training campaign.
• Conduct the first `Quarterly User Access Review` for critical systems.
• Begin hardening critical systems based on defined baselines. | • **95%+** of workforce completes security awareness training.
• **100%** of mandated access reviews are completed and signed off by managers.
• **0** critical deviations from the security baseline on newly hardened systems. | Implementation Roadmap (ISMS-SUP-003)
Quarter 1 (Months 1-3): Foundation & Visibility
Goal: Establish baseline security controls and gain visibility into the environment.
Month | Key Deliverables & Activities | Key Metrics for Success |
---|---|---|
1 | Official Kick-Off & Scoping: • Finalize policies & obtain leadership sign-off. • Formally assign key roles (Security Officer, etc.). • Complete Gap Analysis and Data Discovery. | • 100% of policies formally approved and signed. • 100% of key security roles assigned in a RACI chart. • Gap analysis and data inventory documents completed. |
2 | Identity & Endpoint Security: • Deploy and enforce Multi-Factor Authentication (MFA) for all critical systems. • Deploy an Endpoint Detection & Response (EDR) solution to all workstations. • Roll out a company-wide Password Manager. | • 95%+ of users enrolled in MFA for critical systems. • 100% of corporate endpoints have an active EDR agent. • 80%+ of workforce actively using the password manager. |
3 | Initial Vulnerability Management: • Implement a vulnerability scanning tool for cloud and application assets. • Conduct initial baseline scans to understand the current risk posture. • Begin triaging critical and high-risk findings. | • 90%+ of production assets covered by vulnerability scans. • 100% of identified critical vulnerabilities have a remediation ticket created. • Reduction in the number of “quick win” high-risk vulnerabilities by 25%. |
Quarter 2 (Months 4-6): Control & Process Implementation
Goal: Move from ad-hoc actions to repeatable, defined security processes.
Month | Key Deliverables & Activities | Key Metrics for Success |
---|---|---|
4 | Formalize Core Processes: • Implement the formal Change Control Procedure using GitHub.• Implement the Vendor Risk Assessment Procedure for all new vendors.• Implement the formal HR Onboarding/Offboarding Procedures . | • 100% of production code changes are deployed via the new change control process. • 100% of new vendors undergo a documented risk assessment. • 100% of new hires and terminations follow the documented security checklists. |
5 | Training & Access Control: • Conduct the first company-wide Security Awareness Training campaign. • Conduct the first Quarterly User Access Review for critical systems.• Begin hardening critical systems based on defined baselines. | • 95%+ of workforce completes security awareness training. • 100% of required access reviews are completed and signed off by managers. • 0 critical deviations from the security baseline on newly hardened systems. |
6 | Incident Response Preparation: • Finalize the Incident Response Plan (IRP) .• Define and document Incident Commander and IRT roles. • Configure SIEM/logging to capture critical events for detection. | • IRP document is formally approved. • Incident Response Team roster is published and communicated. • 90%+ of critical systems are sending logs to a central SIEM. |
Quarter 3 (Months 7-9): Hardening & Testing
Goal: Validate the effectiveness of implemented controls and mature security practices.
Month | Key Deliverables & Activities | Key Metrics for Success |
---|---|---|
7 | Engage Third-Party Assessors: • Select and contract a vendor for the annual penetration test. • Select and contract an audit firm for the future SOC 2 audit. • Conduct the first BCDR Tabletop Exercise . | • Pen test and audit contracts signed. • BCDR tabletop exercise completed with a post-exercise report generated. • 100% of IRT members participate in the exercise. |
8 | Penetration Testing & Remediation: • Execute the annual third-party penetration test. • Triage findings from the test report and create a remediation plan. • Begin remediating high-risk findings from the pen test. | • Pen test report received. • 100% of critical and high-risk findings have a remediation plan with an assigned owner. • Mean Time to Remediate (MTTR) for critical vulnerabilities is under 15 days. |
9 | Mature Vendor & AI Governance: • Begin reviewing existing high-risk vendors against the new policy. • Implement the AI Tool Risk Assessment Procedure for any new AI tools being considered by teams. | • 50% of existing high-risk vendors have a completed risk assessment on file. • 100% of new AI tool requests follow the formal assessment procedure. • 0 unapproved AI tools are detected processing company data. |
Quarter 4 (Months 10-12): Audit Readiness & Optimization
Goal: Prepare for external audits and ensure the ISMS is a continuous, improving program.
Month | Key Deliverables & Activities | Key Metrics for Success |
---|---|---|
10 | Internal Audit & Evidence Gathering: • Conduct the first Internal Audit against the policy set.• Begin systematically collecting evidence (artifacts) for the upcoming SOC 2 audit. • Remediate any gaps found during the internal audit. | • Internal audit completed and report issued. • 75%+ of evidence requests for the upcoming SOC 2 are fulfilled and organized. • 100% of high-risk internal audit findings have a documented corrective action plan. |
11 | Formal Risk & BIA Assessment: • Conduct the formal Annual Risk Assessment .• Conduct the formal Business Impact Analysis (BIA) .• Present findings to the Information Security Committee. | • Annual Risk Assessment report is approved by leadership. • Business Impact Analysis (BIA) report is approved by leadership. • Top 5 company risks are identified and have a documented treatment plan. |
12 | Final Review & Planning for Year 2: • Hold the final quarterly Information Security Committee meeting of the year. • Review progress against the roadmap and finalize the audit schedule. • Develop the roadmap for the following year based on risk assessment and audit findings. | • Q4 committee meeting held with documented minutes. • Formal audit date is scheduled. • Year 2 Roadmap is drafted and presented to leadership for approval. |