Skip to main content

Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001

  • Conference paper
  • First Online:
Book cover Business Information Systems (BIS 2018)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 320))

Included in the following conference series:

Abstract

An Information Security Management System, according with the ISO/IEC 27001 is the set of “that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security”. ISO/IEC 27001 defines the requirements and process for implementing an Information Security Management System. However, implementing this standard without a detailed plan can become a burden on organizations. This paper presents a maturity model for the planning, implementation, monitoring and improvement of an Information Security Management System based on ISO/IEC 27001. The purpose of this model is to provide an assessment tool for organizations to use in order to get their current Information Security Management System maturity level. The results can then be used to create an improvement plan which will guide organizations to reach their target maturity level. This maturity model allows organizations to assess their current state of affairs according to the best practices defined in ISO/IEC 27001. The maturity model proposed in this paper is evaluated through a multi-step perspective that is used to confirm that the maturity model makes a useful and novel contribution to the Information Security Management domain by taking in consideration the best practice of the domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dubois, E., Heymans, P., Mayer, N., Matulevicius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyté, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289–306. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12544-7_16

    Chapter  Google Scholar 

  2. ISO/IEC 27001:2013, Information technology - Security techniques - Information security management systems – Requirements (2013)

    Google Scholar 

  3. Miller, H., Murphy, R.: Secure cyberspace: answering the call for intelligent action. IT Professional (2009)

    Google Scholar 

  4. CMMI Product Team: CMMI for Development, Version 1.3, Carnegie Mellon Univ., no. November, p. 482 (2010)

    Google Scholar 

  5. Mettler, T.: A design science research perspective on maturity models in information systems. Institute of Information Management, University of St. Gallen, St. Gallen (2009)

    Google Scholar 

  6. The Open Group: Open Information Security Management Maturity Model (O-ISM3) (2011)

    Google Scholar 

  7. Carnegie-Mellon-University: Systems Security Engineering Capability Maturity Model (SSE-CMM) - Model Description Document. Version 3.0 (2003)

    Google Scholar 

  8. ISF: Time to grow using maturity models to create and protect value, in Information Security Forum ISF (2014)

    Google Scholar 

  9. IT Governance Institute: COBIT 5 – A business Framework for the Governance and Management of Enterprise IT (2012)

    Google Scholar 

  10. Department of Energy, U.S. Department of Homeland Security, Cybersecurity Capability Maturity Model (C2M2 v1.1) (2014)

    Google Scholar 

  11. McGraw, G., Migues, S., West, J.: Building Security in Maturity Model (BSIMM) Version 8 (2015)

    Google Scholar 

  12. Mettler, T., Rohner, P., Winter, R.: Towards a classification of maturity models in information systems. In: D’Atri, A., De Marco, M., Braccini, A., Cabiddu, F. (eds.) Management of the Interconnected World. Physica-Verlag, Heidelberg (2010). https://doi.org/10.1007/978-3-7908-2404-9_39

    Chapter  Google Scholar 

  13. De Bruin, T., Freeze, R., Kaulkarni, U., Rosemann, M.: Understanding the main phases of developing a maturity assessment model. In: Proceedings of the Australasian Conference on Information Systems (ACIS) (2005)

    Google Scholar 

  14. Poeppelbuss, J., Niehaves, B., Simons, A., Becker, J.: Maturity models in information systems research: literature search and analysis. In: Communications of the Association for Information Systems, vol. 29 (2011)

    Google Scholar 

  15. van Loon, H.: Process Assessment and Improvement: A Practical Guide. Springer, New York (2015)

    Google Scholar 

  16. Becker, J., Knackstedt, R., Pöppelbuβ, J.: Developing maturity models for IT management: a procedure model and its application. Bus. Inf. Syst. Eng. 3, 213–222 (2009)

    Article  Google Scholar 

  17. Hevner, A., Ram, S., March, S., Park, J.: Design science in information systems research. MISQ 28, 75–105 (2004)

    Article  Google Scholar 

  18. Vom Brocke, J.: Design principles for reference modeling-reusing information models by means of aggregation, specialization, instantiation, and analogy. In: Fettke, P., Loos, P. (eds.) Reference Modeling for Business Systems Analysis. Idea Group Inc., Hershey (2007)

    Google Scholar 

  19. Hevner, A., Chatterjee, S.: Design Research in Information Systems: Theory and Practice. Springer, Heidelberg (2010). https://doi.org/10.1007/978-1-4419-5653-8

    Book  Google Scholar 

  20. Wand, Y., Weber, R.: On the ontological expressiveness of information systems analysis and design grammars. Inf. Syst. J. 3(4), 217–237 (1993)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by national funds through Fundação para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Diogo Proença .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Proença, D., Borbinha, J. (2018). Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001. In: Abramowicz, W., Paschke, A. (eds) Business Information Systems. BIS 2018. Lecture Notes in Business Information Processing, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-319-93931-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93931-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93930-8

  • Online ISBN: 978-3-319-93931-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics