ISO 27001 Audit and ISMS Audit
on the basis of IT-Grundschutz
Consulting and implementation of your audit by professional and experienced experts.
Audit and inspection support, initial certification, surveillance audit and re-certification.
Vulnerability identification and development of security blueprints.
Security
becon prepares you for audits according to ISO/IEC 27001 and IT-Grundschutz according to BSI, analyzes your IT, identifies vulnerabilities, develops security blueprints based on the identified security needs and implements them.
Why is an ISMS or ISO 27001 audit useful?
Effective protection of your sensitive information and business processes.
Elimination of weak points in the handling of sensitive information.
Increase the safety awareness of your staff through targeted measures.
Proof of trust towards customers, business partners and investors.
Establishment of a framework for continuous improvement in IT processes.
Reduce costs by proactively avoiding security incidents and their potential impact.
REFERENCES
An excerpt of the customers who trust us:
Our services for your ISO 27001 and ISMS audit
Analysis and evaluation
becon analyses your IT according to BSI IT-Grundschutz, identifies vulnerabilities and develops security blueprints based on the identified security needs.
Conception and planning
Creation of a security concept according to ISO 27001 on the basis of IT-Grundschutz according to BSI incl. Definition of the requirement for an ISMS. On request incl. subsequent planning of your solution for sensitive and vulnerable areas for a smooth implementation.
Audit preparation and documentation
Preparation and support of ISO/IEC 27001 and BSI IT-Grundschutz audits with certified experts. Provision of best practice for the documentation of ISO/IEC 27001 and IT-Grundschutz procedures in i-doit.
Introduction, optimization and implementation
Introduction of a ISMS on the basis of i-doit and combination of CMDB and information security. Addressing vulnerabilities through infrastructure optimizations in the areas of communications, cloud, system hardening, and encryption. Implement secure solutions in the communications, cloud, system hardening, and encryption segments.
Workshop
Workshop for implementing and optimizing a SIEM/SOC in response to the growing threat potential from cyber incidents.
Support from experts
Adept at handling sensitive and protectable data and auditing through own full-time security officer.
BSI Confederation
IT-Grundschutz-Kompendium – Tool for information security
The IT-Grundschutz-Kompendium is the fundamental publication of IT-Grundschutz. Together with the BSI standards, it forms the basis for all those who wish to deal comprehensively with the subject of information security.
The IT-Grundschutz-Kompendium is published annually in February in a new edition. The BSI provides draft building blocks throughout the year for users to comment on.
A detailed list of the changes can be found on the pages of the BSI.
BSI Confederation
IT-Grundschutz-Kompendium – Tool for information security
The IT-Grundschutz-Kompendium is the fundamental publication of IT-Grundschutz. Together with the BSI standards, it forms the basis for all those who wish to deal comprehensively with the subject of information security.
The IT-Grundschutz-Kompendium is published annually in February in a new edition. The BSI provides draft building blocks throughout the year for users to comment on.
A detailed list of the changes can be found on the pages of the BSI.
Frequently asked questions about ISO 27001 audit and ISMS audit
becon blog
More articles on this topic
Get in touch with us!
We look forward to hearing from you.
Do you have any questions or are you facing a particular challenge? Our dedicated team will be happy to provide you with a no-obligation consultation.