top of page
AUDIT MANUFAKTUR

KENNENLERN-

ANGEBOT MIT

FAST 50% PREISVORTEIL

Festpreisaudit für Neukunden

Internes Audit nach ISO/IEC 27001 oder VDA ISA

 

Was Sie erhalten:

✓ 5 Personentage professionelle Auditierung

✓ 4,5 Tage fokussierte Interviews mit Ihren Fachbereichen

✓ 100% remote – keine Reise- und Zusatzkosten

✓ Risikobasierte Prüfung Ihres ISMS

✓ Detaillierter Auditbericht mit klaren Handlungsempfehlungen

✓ Exklusive Compliance-Bestätigung bei Erfolg

What are the ISMS resource requirements?

  • Autorenbild: Marc Borgers
    Marc Borgers
  • 17. Aug. 2021
  • 8 Min. Lesezeit

ree

You have been told...


  • that the implementation of an ISMS can be accomplished quickly?

  • that you only need a few policy templates?

  • that ISO 27001 is almost identical to ISO 9001?

  • that effective risk management can be implemented quickly?

  • that you do not have system and/or software development in the company?


Then please be skeptical! The introduction of an ISMS based on ISO 27001 always involves considerable effort, which is influenced by many factors. The costs of implementation vary as much as the organizations and their business areas. Unfortunately, this individuality applies not only to the introduction, but also to the operation of an ISMS. Despite many factors, the effort can be roughly estimated if certain uniform parameters are taken into account. I will discuss these uniform parameters identified during my work below and provide you with an initial orientation for a rough estimate of the effort.


For better comprehensibility, I would like to point out that the introduction and maintenance of an ISMS always takes place in steps and can be divided into specific sections:


  • Initial works

  • Regular work


Before implementing the ISMS, management must determine who will be responsible for introducing and maintaining information security in the company, what rights and obligations they have in this role, and who will support them as a deputy. This role is usually referred to as the information security officer (ISO) and is located outside of IT, as it monitors the work of IT. Furthermore, information security is thematically superior to data protection and IT security, as data protection only focuses on the protection of personal data and IT security focuses on the security of IT systems and the data processed there, while information security holistically addresses all of a company's assets that are worth protecting (information, data, processes, systems, people, products, tools, buildings, properties, etc.).

For this reason, the ISB should be directly subordinate to the management in both organizational and disciplinary terms and should have or obtain one or more recognized qualifications in the field of information security before starting work:

  • ISO 27001 Lead Implementer (PECB, BSI Group, etc.)

  • Certified CISO/ISB (TÜV, bitcom, etc.)

  • Certified Information Security Manager (ISACA)


Since the introduction of an ISMS also involves the creation of guidelines, directives, work instructions, concepts or similar specifications in the context of information security, the author of said documents should always take the following basic steps into account during his work and repeat them whenever the subject area changes. Only then can an efficient and adequate creation of specifications for the organization be ensured:


  • Identify generally accepted best practices in the subject area as well as legal, regulatory, industry-specific, corporate and contractual requirements that impact the specification to be created.

  • Identification of interested and affected parties and the associated scope of the specification to be drawn up.

  • Research and recording of the current status of the relevant topic area in the organization and the affected business processes.

Together with my introduction, this brings us full circle, because without sufficient qualifications it is difficult or even impossible to know and take into account the "best practices".



Basis of the estimate Since the effort is significantly influenced by factors such as the number of employees, heterogeneity of the IT landscape and IT processes, number of locations and the proportion of IT applications with confidentiality and high availability requirements, I assume the following in my estimate:


  • Homogeneous IT landscape and IT processes, no other locations and IT applications with only normal confidentiality and high availability requirements.

  • Average risk landscape.

  • Templates are used to create guidelines.

  • Tools such as risk management software, asset database program, SIEM, computer based training software, etc., are not used.

  • Consulting services are not used.


The activities I have mentioned are deliberately aimed at a practical implementation of the ISMS and therefore go beyond the basic requirements of the standard.




Initial work of the Information Security Officer (ISO)

Initial activity of the information security officer Internal effort in person-days (PT), use of templates .

Company with 25 employees


Company with 100 employees

Company with 5000 employees

Establish and approve a document control procedure and records management guidelines.

2

3

5

Determination, definition and description of the ISMS scope.

(based on ISO 27003)

2

3

4

Creation and release of an information security policy that takes into account the corporate objectives, business and IT strategy in the information security objectives and defines the global information security requirements within the company.

(including improvements)

2

3

5

Establishment and approval of a methodology for risk assessment and risk treatment.

3

5

8

Carrying out a comprehensive risk assessment based on the defined methodology.

8

10

20

Preparation of a statement of applicability.

2

2

2

Preparation and coordination of a risk treatment plan.

8

10

15

Initiate and control the recording of all assets.

2

3

5

Identification and confirmation of asset owners.

0.5

1

3

Creation and approval of guidelines for the classification of information and assets.

2

2

5

Determining who may use the assets and how.

2

3

8

Creation of appropriate guidelines for entry, access and entry.

3

5

8

Establishing guidelines for the use of mobile devices, home offices and private devices.

1

1

3

Establishing guidelines for the use and creation of passwords.

0.5

1

3

Determination of monitoring and measurement results in the ISMS context.

1

1

2

Establishment of guidelines for conducting internal audits and creation of an audit program for the coming years.

1

1

2

Conducting a full internal audit and preparing reports.

4

5

6

Conducting a management review and documenting the results.

1

1

1

Evidence for recording nonconformities and corrective actions taken as well as the associated process description for determining, implementing and evaluating corrective actions.

1

1

3

Control logs of security-related user activities, security events and security incidents.

2

3

5

Control of documentation of evidence of training, skills, experience and required qualifications of the persons working within the scope of application.

0.5

0.5

1

Preparation and control of training and awareness-raising measures in the context of information security.

3

5

10

Determination and approval of guidelines for the disposal and destruction of assets.

0.5

1

2

Creation of guidelines for working in security areas (areas with assets that require protection).

1

1

2

Determination and approval of requirements for tidy workplaces and measures when leaving the workplace.

0.5

1

3

Creation and approval of guidelines and procedures for change management.

2

3

7

Establish and approve policies for backup creation, protection, transportation, storage and methodology.

1

2

3

Recording of all paths for information transmission within the scope of application and determination of permissible use.

3

5

9

Establishment and approval of processes, procedures and measures to maintain information security in adverse situations, embedded in the organization's business continuity management system.

3

5

15

Documentation/creation of the exercise plans, test plans, maintenance plans, review plans and evidence of implementation contained in the Business Continuity Management System.

6

10

20

Estimated initial effort in person days (PD):

69.5 PD

98.5 PD

183 PD

Note: This is only a rough overview of the activities!




Initial work of the organization

Initial activities of the organization

Internal effort in person days (PD), without tool support .

1000 assets

5000 assets

10,000 assets

Identify and record assets in a database/registers.

(Asset Owner; manual; 10 minutes per asset)

20.5

104

208

Allocation of responsibilities and classification of "disputed" assets.

(Asset Owner)

0.5

1

3

Estimated initial effort in person days (PD):

21 PD

105 PD

221 PD

Note: This is only a rough overview of the activities! By using tools and establishing uniform procedures, synergies can be achieved. Management should set a criticality level above which assets must be recorded and protected.



Regular work of the organization

Regular activities of the organization

Internal effort in person days (PD), without tool support .

Pursue

with 25

Employees

Pursue

with 100

Employees

Pursue

with 5000

Employees

Updating the asset database/asset registers.

(Asset Owner; approx. 4x per year)

4

8

40

Carrying out an event-related risk assessment

(Asset/Risk Owner; approx. 10x per year)

5

5

5

Conducting internal ISMS audits.

(Qualified and independent auditor; approx. 1x per year)

4

5

6

Checking compliance with technical specifications.

(IT security; approx. 4x per year)

4

8

20

Conducting regular backup recovery tests.

(IT operations; approx. 4x per year)

2

3

16

Evaluation of logs of security-relevant user activities and security events

(IT security; approx. 12x per year)

12

20

64

Checking and documenting compliance with security policies and standards as well as any other security requirements.

(Manager; management span 25; approx. 4x per year)

2

5

200

Updating evidence of training, skills, experience and required qualifications of persons working within the scope of application.

(Human Resources Department; 4x per year)

2

4

12

Implementation of the exercise plans, test plans, maintenance plans and review plans contained in the Business Continuity Management System.

(Departments, once a year)

8

12

64

Estimated regular effort in person days (PD) per year:

43 PD

70 PD

427 PD

Note: This is only a rough overview of the activities! Synergies can be achieved by using tools and establishing uniform procedures.



Regular work of the Information Security Officer (ISO)

Regular activities of the information security officer

Internal effort in person days (PD), without tool support .

Pursue

with 25

Employees

Pursue

with 100

Employees

Pursue

with 5000

Employees

Review of all managed ISMS relevant documents for validity, timeliness and appropriateness and update them if necessary.

(approx. once per year)

3

5

10

Preparation and moderation of regular risk assessments.

(approx. 4x per year, excluding special events)

6

8

12

Updating the risk treatment plan.

(approx. 4x per year, excluding special events)

4

4

6

Checking the asset database/asset register for up-to-dateness.

(approx. 4x per year)

4

4

6

Review and evaluation of the results of the internal ISMS audit.

(approx. once per year)

4

4

6

Review of evidence provided by management regarding compliance with security policies and standards as well as any other security requirements in information processing.

(approx. 4x per year)

4

4

6

Check test results for compliance with technical specifications.

(approx. 4x per year)

4

4

6

Reviewing backup recovery test results.

(approx. 4x per year)

4

4

6

Collection of monitoring and measurement results in the ISMS context.

(approx. 4x per year)

8

8

20

Preparation, implementation and documentation of planned management reviews.

(approx. 2x per year, excluding event-related processes)

1

1

4

Completion/verification of nonconformities and effectiveness of corrective actions taken.

(approx. 4x per year, excluding event-related processes)

8

8

12

Control of log evaluations and tracking of security-relevant user activities, security events and security incidents.

(approx. 12x per year, excluding event-related processes)

25

40

70

Checking the evidence of training, skills, experience and required qualifications of the persons working within the scope of application.

(approx. 2x per year)

1

1

3

Preparation and implementation of training and awareness-raising measures in the context of information security.

(approx. 2x per year, excluding event-related processes)

4

10

60

Updating/supplementing the channels for transmitting information within the scope of application.

(approx. 2x per year)

2

3

6

Checking the Business Continuity Management System test results.

(approx. 2x per year)

4

4

10

Estimated regular effort in person days (PD) per year:

86 PD

112 PD

243 PD

Note: This is only a rough overview of the activities! Synergies can be achieved by using tools and establishing uniform procedures.


Individualization

Hardly any company has a homogeneous IT landscape and IT processes, just one location and IT applications with only normal confidentiality and high availability requirements. So that you can adapt my estimate to your circumstances, I recommend using the following values:


Initial activities of the organization

surcharge

Homogeneous IT landscape and IT processes

0%

Heterogeneous IT landscape and IT processes

25%

Per additional location

5%

IT applications with only normal confidentiality and high availability requirements

0%

IT applications with predominantly high confidentiality and high availability requirements

15%

IT applications with predominantly very high confidentiality and high availability requirements

30%


 
 

Bevor ich Auditor wurde, saß ich auf Ihrer Seite.

Als CISO und Leiter IT-Sicherheit in Konzernen kenne ich den Druck, dem Sicherheitsverantwortliche ausgesetzt sind, besonders im Spannungsfeld zwischen operativer Sicherheit und Management-Entscheidungen. Genau deshalb sind meine Audits keine bloße Normen-Abfrage, sondern ein echter Mehrwert, der hilft, Informationssicherheit auch auf Vorstandsebene strategisch zu verankern.

Ich bin Marc Borgers – Inhaber der AUD
IT MANUFAKTUR und ich vereine drei Perspektiven für Ihren Erfolg:

AUDIT MANUFAKTUR Marc Borgers.jpg


🎓 1. Der TRAINER (Mastery & Wissen)

Wer prüft, muss wissen, wovon er spricht. Ich bin einer der wenigen Trainer weltweit, der von TRECCERT für acht Zertifizierungsprogramme (Schemes) berufen ist. Als Lead Trainer bilde ich die Experten von morgen aus – u.a. in ISO 27001, 22301, 31000 und 20000-1. Ihr Vorteil: Sie arbeiten mit einem Experten, der die Normen nicht nur liest, sondern lehrt.

🔍 2. Der AUDITOR (Prüfung & Zertifikate)

Als berufener Zertifizierungsauditor und Inhaber von High-End-Zertifikaten (CISA, CISM, CDPSE) prüfe ich streng, fair und mit tiefem Verständnis für komplexe Umgebungen (KRITIS, § 8a BSIG, EnWG). Ihr Vorteil: Sicherheit durch höchste Qualifikation – auch in regulierten Märkten.

💡 3. Der BERATER (Review & Validierung)

Ich kombiniere die Exaktheit eines Prüfers mit moderner Effizienz. Sie haben Ihre Dokumentation selbst erstellt oder durch KI generieren lassen? Ihr Vorteil: Ich validiere Ihre Unterlagen (Review). Ich prüfe mit der „Brille des Auditors“, ob Ihre Konzepte standhalten. Das spart Beratungskosten und gibt Sicherheit.

​​

Meine Schwerpunkte

  • Standards: ISO 27001 (ISMS), VDA ISA (TISAX® Prüfgrundlage), IT-SiKat 1a & 1b, B3S (KRITIS), ISO 22301 (BCMS).

  • Branchen: Automotive, Kritische Infrastrukturen, Energie & Mittelstand.

  • Arbeitsweise: Transparent, digital gestützt & bei Bedarf 100% Remote.

​​

Sie suchen einen Partner, der die Theorie lehrt, die Praxis kennt und die Sprache des Vorstands spricht? Vernetzen Sie sich gerne mit mir auf LinkedIn: https://www.linkedin.com/in/borgers/

  • LinkedIn

Meine Prüfschwerpunkte, Branchen und KRITIS-Sektoren

Büro ISMS Audit ISO 27001

Büro ISMS Audit ISO 27001

Interne ISMS Audits ISO 27001

Pharma ISMS Audit

Pharma ISMS Audit

Interne ISMS Audits im Bereich Pharma

Lebensmittelproduktion ISMS Audit

Lebensmittelproduktion ISMS Audit

Interne ISMS Audits im Bereich Lebensmittelproduktion

Krankenhaus ISMS Audit

Krankenhaus ISMS Audit

Interne ISMS Audits im Bereich Krankenhaus

Internes ISMS Audit TISAX / ISO 27001

Internes ISMS Audit TISAX / ISO 27001

Interne ISMS Audits im Bereich Automotive TISAX / ISO 27001

Netzleitstelle ISMS Audit IT-SiKat 1a

Netzleitstelle ISMS Audit IT-SiKat 1a

Interne ISMS Audits im Bereich Einergieversorgung IT-Sicherheitskatalog (IT-SiKat) 1a

Internes ISMS Audit Operational Technology (OT)

Internes ISMS Audit Operational Technology (OT)

Interne ISMS Audits im Bereich Operational Technology (OT)

Internes ISMS Audit IT-SiKat 1a

Internes ISMS Audit IT-SiKat 1a

Interne ISMS Audits im Bereich Gas Einergieversorgung IT-Sicherheitskatalog (IT-SiKat) 1a

Internes ISMS Audit IT-SiKat 1b

Internes ISMS Audit IT-SiKat 1b

Interne ISMS Audits im Bereich Stromerzeugung Einergieversorgung IT-Sicherheitskatalog (IT-SiKat) 1b

Logistik ISMS Audit TISAX / ISO 27001

Logistik ISMS Audit TISAX / ISO 27001

Interne ISMS Audits im Bereich Logistik TISAX / ISO 27001

Internes ISMS Audit Rechenzentrum Housing Hosting Telekommunikation

Internes ISMS Audit Rechenzentrum Housing Hosting Telekommunikation

Interne ISMS Audits im Bereich Rechenzentrum Housing Hosting Telekommunikation

Automobilzulieferer ISMS Audit Prototypenschutz VDA ISA TISAX

Automobilzulieferer ISMS Audit Prototypenschutz VDA ISA TISAX

Interne ISMS Audits im Bereich Automotive Prototypenschutz VDA ISA TISAX

SmartCard technische Prüfung

SmartCard technische Prüfung

Interne ISMS Audits im Bereich physische Sicherheit KRITIS TISAX / ISO 27001 CER NIS2

Prüfung physische Sicherheit

Prüfung physische Sicherheit

Interne ISMS Audits im Bereich physische Sicherheit KRITIS TISAX / ISO 27001 CER NIS2

PhysicalSecurityCheck_edited_edited

PhysicalSecurityCheck_edited_edited

Interne ISMS Audits im Bereich physische Sicherheit KRITIS TISAX / ISO 27001 CER NIS2

AUDIT MANUFAKTUR Kira

Sie haben Fragen?

Ich bin im Chat 24x7x365 für Sie erreichbar.

Produkte, Preise, Rabatte, Neukundenangebote,

Termine, Verfügbarkeit, Prüfgrundlagen, Schulungen, kostenlose ISMS-Hilfe mit KI-Untersützung...

Kundenmeinungen

Martin Kerkmann via LinkedIn | EPLAN
 

Im Rahmen einer umfangreichen ISO 27001 Zertifizierung hat Herr Borgers uns im Rahmen eines Thirty Party Audit im Vorfeld der Zertifizierung entscheidende Empfehlungen gegeben, so dass wir direkt beim ersten Anlauf das Zertifizierungsaudit zur ISO 27001 erfolgreich bestanden haben.

Matthias Zeiss via LinkedIn | Stadtwerke Mainz Netze

Gerade ihre Expertise im Voraudit waren maßgeblich für die später erfolgreiche Zertifizierung nach IT-Sicherheitskatalog gemäß Bundesnetzagentur und ISO 27001.

Sorin Mustaca via LinkedIn | Endpoint Cybersecurity GmbH

Herr Borgers ist ein sehr professioneller, fairer und aufgeschlossener Auditor. Er hat viel Flexibilität und Freundlichkeit gezeigt, ohne Abzüge in Gründlichkeit und Fachwissen. 

 Andreas Kirchner via LinkedIn | SPIRIT ISD

Fachlich brillant, super normensicher und technisch sehr versiert & up-to-date. Er kommt schnell auf den Punkt, kombiniert Methodik mit technischem Tiefgang und bleibt dabei absolut angenehm im Umgang. Seine Audits bringen dem Kunden echten Mehrwert und sorgen für ein besseres Informationssicherheitsniveau.

© 2025 AUDIT

MANUFAKTUR

TISAX® ist eine eingetragene Marke der ENX Association. Die AUDIT MANUFAKTUR steht in keiner geschäftlichen Beziehung zur ENX. Mit der Nennung der Marke TISAX® ist keine Aussage des Markeninhabers zur Geeignetheit der hier beworbenen Leistungen verbunden. TISAX® Assessments, zur Erlangung von Labels, werden nur von den auf der Homepage der ENX genannten Prüfdienstleistern durchgeführt. In unserer Funktion als Auditoren für Zertifizierungsstellen ist es uns für einige Jahre untersagt, Unternehmen zu zertifizieren, die wir zuvor im Bereich Informationssicherheit unterstützt haben. Diese Regelung stellt die Unparteilichkeit und Integrität des Zertifizierungsverfahrens sicher.

bottom of page