Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Register to 4Geeks

← Back to Projects

Developing a Basic Information Security Management System (ISMS) for a Public Organization

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Developing a Basic Information Security Management System (ISMS) for a Public Organization
📝 Instructions

Developing a Basic Information Security Management System (ISMS) for a Public Organization

🌱 How to Start This Project

To begin this project, you will take the role of a cybersecurity consultant tasked with implementing an ISMS for a public organization. Your goal is to develop a basic ISMS to ensure that the organization can properly manage and secure its information. This project will guide you through defining the scope, conducting a risk assessment, selecting controls, and documenting security policies and procedures. Use the provided instructions and checklists to organize your work.

🔑 General Objective

To develop a foundational ISMS for a public organization scenario, ensuring the organization has a formal structure for information security management that identifies risks, selects appropriate controls, and maintains effective security policies and procedures.

📝 Instructions

Step 1: Select a Public Organization

Choose one of the following types of public organizations for your ISMS project:

  1. Government Agencies (Local, State, National)
  2. Public Universities
  3. Public Hospitals
  4. Transportation Authorities
  5. Non-Profit or NGOs with Public Mandates

When selecting your organization, consider the following criteria:

  • Availability of Information: The organization should have publicly accessible reports, privacy policies, compliance documents, or IT/security documentation.
  • Relevance to Information Security: Organizations that manage sensitive information are preferable for a more realistic learning experience.
  • Complexity: Choose an organization complex enough to provide a challenging experience, with a mix of physical, technical, and administrative controls to address.

To develop an Information Security Management System (ISMS) for a public organization, it’s crucial to choose an organization that has a substantial amount of publicly accessible information. Here are some types of organizations along with recommendations and links to information sources that would facilitate the ISMS project:

Recomended Organizations or Public Companies:

OrganizationDescriptionInformation Sources
United States Postal Service (USPS)Complex public service organization handling sensitive citizen information. Ideal for ISMS.USPS Reports and Publications
National Institute of Standards and Technology (NIST)Provides numerous resources for public transparency, including risk assessment guidelines and policies.NIST Public Information
University of California SystemPublic university system with accessible documents on cybersecurity standards, privacy policies, and risk management.University of California Information Security Office
New York City Health + HospitalsManages extensive patient data with available annual reports, financial reports, and IT security strategies.NYC Health + Hospitals Publications
National Health Service (NHS), UKExtensive information about privacy policies, cybersecurity strategies, and public health data management.NHS Digital – Data and Information Governance
Metropolitan Transportation Authority (MTA), New YorkPublishes extensive documentation on operational plans, cybersecurity policies, and financial statements.MTA Financial and Budget Reports
Transport for London (TfL)Provides transparency reports, risk management documentation, and compliance policies related to information technology.Safety & Security
World Health Organization (WHO)Publicly available documents related to privacy and cybersecurity policies, along with annual reports on IT infrastructure.WHO Publications
UNICEFPublishes annual reports, financial statements, and cybersecurity and privacy policies.UNICEF Reports and Data

These organizations have extensive information on their public websites, which will help you to gather data needed for the ISMS, conduct a risk assessment, select controls, and create appropriate policies and procedures. Let me know if you need additional details or further guidance on specific steps of the ISMS project.

Step 2: Scope Definition

Define the scope of the ISMS to establish the boundaries of what needs to be secured.

Create an inventory of all information assets, such as computers, servers, databases, citizen/student/patient information, research data, etc.

Identify and classify assets based on their importance to operations (e.g., critical, high, medium, low).

Determine which physical locations are included in the ISMS (e.g., offices, data centers, campuses).

Identify areas that need restricted access (e.g., server rooms, research laboratories).

Identify networks, cloud environments, and virtual machines that are included in the ISMS.

Specify which systems and data types fall under ISMS control.

Identify key stakeholders (e.g., IT team, management, employees, citizens/students/patients).

Assign responsibilities to each stakeholder for information security activities.

Document the purpose of the ISMS, including its scope, goals, and objectives.

Specify any limitations or exclusions.

Step 3: Risk Assessment

Identify and assess the risks associated with the organization and its assets.

Develop a comprehensive list of all assets identified in the scope definition.

Classify assets into categories such as hardware, software, data, and personnel.

Identify possible threats that may affect each asset (e.g., unauthorized access, malware, natural disasters, data breaches).

Consider both external and internal threats.

Identify vulnerabilities that could expose assets to identified threats (e.g., lack of encryption, weak passwords, outdated systems).

Assess how each vulnerability could be exploited.

For each risk, assess the likelihood of occurrence (e.g., high, medium, low).

Assess the potential impact on the organization if the risk materializes (e.g., financial loss, reputational damage, compromise of sensitive data).

Assign a risk rating (e.g., high, medium, low) based on likelihood and impact.

Prioritize risks that require immediate attention or mitigation.

Step 4: Control Selection

Select appropriate security controls to mitigate the identified risks.

Review standards such as ISO/IEC 27001, NIST, or CIS for control options.

Determine which controls are relevant to the identified risks and comply with any sector-specific regulations (e.g., HIPAA for healthcare).

Choose security controls that mitigate the identified risks effectively (e.g., firewalls, encryption, multi-factor authentication, access control systems).

Ensure that selected controls are feasible given the organization's resources and public sector constraints.

Document each control selected, including details on how it will mitigate the corresponding risk.

Specify roles and responsibilities for implementing each control.

Create an implementation plan that details timelines and resources needed for control implementation.

Identify any dependencies or prerequisites for implementing each control.

Step 5: Documentation of Security Policies and Procedures

Create formal documentation to establish security practices.

Draft a high-level Security Policy that outlines the organization's commitment to information security.

Include key principles such as confidentiality, integrity, and availability.

Define how user access will be granted, modified, or revoked.

Outline password policies, including complexity requirements and rotation frequency.

Define what constitutes a security incident.

Create a step-by-step procedure for reporting, responding to, and mitigating security incidents.

Identify roles and responsibilities during incident handling.

Establish procedures for regular data backups.

Define roles responsible for performing backups and verify recovery capabilities through testing.

Develop a training plan to ensure employees understand security policies and their responsibilities.

Create awareness materials (e.g., posters, guidelines) to encourage security best practices.

Ensure all policies and procedures are reviewed and approved by management.

Set a schedule for periodic reviews and updates of the documents.

Step 6: Prepare ISMS Manual

Compile all documentation into an ISMS manual.

Compile all policies, procedures, risk assessments, and control documentation into a structured manual.

Include an overview of the ISMS, its scope, and objectives.

Clearly define roles and responsibilities for maintaining and improving the ISMS.

Include a section on leadership commitment to the ISMS.

Provide a detailed explanation of the risk assessment process used.

Include templates or forms used in the risk assessment process.

Define how the effectiveness of the ISMS will be monitored and measured.

Include key performance indicators (KPIs) for information security.

Step 7: Review and Present ISMS

Conduct a review of your ISMS and prepare a presentation for stakeholders.

Review all components of the ISMS to ensure alignment with the defined scope and objectives.

Verify that all risks have been appropriately assessed and mitigated.

Ensure all security policies and procedures are documented clearly and comprehensively.

Develop a presentation that summarizes the ISMS scope, risk assessment findings, selected controls, and security policies.

Highlight key risks and the measures taken to mitigate them.

Identify areas for future improvement and ongoing monitoring.

Present the ISMS to key stakeholders (e.g., management, IT team, department heads).

Gather feedback and make necessary adjustments based on their input.

📦 Deliverables

A detailed report that includes:

  • Defined ISMS scope for the chosen public organization (in PDF format, approximately 1 pages).
  • Risk assessment results (in PDF format, approximately 2-3 pages).
  • List of selected controls (in PDF or spreadsheet format, 2-3 pages or equivalent).
  • Security policies and procedures (in Word or PDF format, approximately 5-6 pages).
  • ISMS Manual (in Word or PDF format, approximately 15-20 pages).
  • A presentation file summarizing your ISMS approach, findings, and recommendations (in PowerPoint or PDF format, 8-10 slides).

Remember to think critically about each step and make reasonable assumptions when faced with information gaps. This project will help you develop practical skills in risk assessment, policy development, and applying a risk-based approach to information security in a public sector context.

Signup and get access to similar projects

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Signup and get access to similar projects

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

5 hrs

Technologies

Difficulty

  • intermediate

Average duration

5 hrs

Technologies