Araştırma Makalesi
BibTex RIS Kaynak Göster

KEY CONSIDERATIONS IN PREPARING SPECIFICATIONS FOR ISMS PROJECTS

Yıl 2025, Cilt: 1 Sayı: 2, 75 - 84, 16.12.2025

Öz

In the digital era, where information security has become indispensable for institutional sustainability, establishing an Information Security Management System (ISMS) and obtaining ISO/IEC 27001 certification are of critical importance for organizations. However, successful completion of this process requires more than just hiring a consultancy firm; it demands strong management support, active institutional involvement, and well-prepared technical specifications. This study outlines the key considerations in preparing specifications for ISMS projects and provides practical recommendations to guide organizations through implementation. Topics such as consultant selection, project duration, scope definition, risk analysis, security controls, internal audit, and certification processes are elaborated to support effective, compliant, and sustainable ISMS projects aligned with international standards.

Kaynakça

  • Ali, S. M., Razzaque, A., Yousaf, M., & Shan, R. U. (2025). An automated compliance framework for critical infrastructure security through artificial intelligence. IEEE Access, 13, 4436–4459. https://doi.org/10.1109/ACCESS.2024.3524496
  • Bouraffa, T., & Hui, K. L. (2025). Regulating information and network security: Review and challenges. ACM Computing Surveys, 57(5). https://doi.org/10.1145/3711124
  • Chan, K. C., Gururajan, R., & Carmignani, F. (2025). A human–Al collaborative framework for cybersecurity consulting in capstone projects for small businesses. Journal of Cybersecurity and Privacy, 5(2), Article 21. https://doi.org/10.3390/jcp5020021
  • de Wit, J., Pieters, W., & van Gelder, P. (2025). Sources of security risk information: What do professionals rely on for their risk assessment? The Information Society, 41(3), 157–172. https://doi.org/10.1080/01972243.2025.2475311
  • Górka–Chowaniec, A., & Popek, A. (2025). Attempt to use the demıng cycle (PDCA) in the process of implementing an information securıty management system. International Journal for Quality Research, 19(2), 371–386. https://doi.org/10.24874/IJQR19.02-01
  • Pacana, A., & Czerwińska, K. (2025). Validation of the use of KPIs to measure information security management system performance in manufacturing companies. Production Engineering Archives, 31(2), 266–275. https://doi.org/10.30657/pea.2025.31.26
  • Sánchez-García, I. D., Feliu, T. S., & Calvo-Manzano, J. A. (2025). Building a cyber risk treatment taxonomy. Cluster Computing, 28(3), Article 205. https://doi.org/10.1007/s10586-024-04899-1
  • Sermhattakit, A., & Sae-Lim, P. (2025). Key risks and mitigation strategies in enterprise risk management for private hospitals: A mixed-method study. Inquiry, 62, 1-13. https://doi.org/10.1177/00469580251347132
  • Supriyanto, A., Jananto, A., Razaq, J. A., Hartono, B., & Damaryanti, F. (2025). Alignment of KAMI index with global security standards in information security risk maturity evaluation. Cybernetics and Information Technologies, 25(2), 173–192. https://doi.org/10.2478/cait-2025-0018
  • Svadlenka, R. (2025). Cybersecurity management system of large enterprises: Probabilistic behavioural model. E & M: Economics and Management, 28(1), 221–237. https://doi.org/10.15240/tul/001/2025-1-014
  • Vestad, A., & Yang, B. (2025). From security frameworks to sustainable municipal cybersecurity capabilities. Journal of Cybersecurity and Privacy, 5(2), Article 19. https://doi.org/10.3390/jcp5020019

Key Considerations in Preparing Specifications for ISMS Projects

Yıl 2025, Cilt: 1 Sayı: 2, 75 - 84, 16.12.2025

Öz

In the digital era, where information security has become indispensable for institutional sustainability, establishing an Information Security Management System (ISMS) and obtaining ISO/IEC 27001 certification are of critical importance for organizations. However, successful completion of this process requires more than just hiring a consultancy firm; it demands strong management support, active institutional involvement, and well-prepared technical specifications. This study outlines the key considerations in preparing specifications for ISMS projects and provides practical recommendations to guide organizations through implementation. Topics such as consultant selection, project duration, scope definition, risk analysis, security controls, internal audit, and certification processes are elaborated to support effective, compliant, and sustainable ISMS projects aligned with international standards.

Etik Beyan

This article does not contain any studies involving human or animal subjects. Scientific and ethical principles were adhered to during the preparation of this study, and all referenced studies are listed in the references.

Teşekkür

Authors would like to thank to Dr. Ahmet Albayrak from Düzce University for his valuable comments and editorial effort.

Kaynakça

  • Ali, S. M., Razzaque, A., Yousaf, M., & Shan, R. U. (2025). An automated compliance framework for critical infrastructure security through artificial intelligence. IEEE Access, 13, 4436–4459. https://doi.org/10.1109/ACCESS.2024.3524496
  • Bouraffa, T., & Hui, K. L. (2025). Regulating information and network security: Review and challenges. ACM Computing Surveys, 57(5). https://doi.org/10.1145/3711124
  • Chan, K. C., Gururajan, R., & Carmignani, F. (2025). A human–Al collaborative framework for cybersecurity consulting in capstone projects for small businesses. Journal of Cybersecurity and Privacy, 5(2), Article 21. https://doi.org/10.3390/jcp5020021
  • de Wit, J., Pieters, W., & van Gelder, P. (2025). Sources of security risk information: What do professionals rely on for their risk assessment? The Information Society, 41(3), 157–172. https://doi.org/10.1080/01972243.2025.2475311
  • Górka–Chowaniec, A., & Popek, A. (2025). Attempt to use the demıng cycle (PDCA) in the process of implementing an information securıty management system. International Journal for Quality Research, 19(2), 371–386. https://doi.org/10.24874/IJQR19.02-01
  • Pacana, A., & Czerwińska, K. (2025). Validation of the use of KPIs to measure information security management system performance in manufacturing companies. Production Engineering Archives, 31(2), 266–275. https://doi.org/10.30657/pea.2025.31.26
  • Sánchez-García, I. D., Feliu, T. S., & Calvo-Manzano, J. A. (2025). Building a cyber risk treatment taxonomy. Cluster Computing, 28(3), Article 205. https://doi.org/10.1007/s10586-024-04899-1
  • Sermhattakit, A., & Sae-Lim, P. (2025). Key risks and mitigation strategies in enterprise risk management for private hospitals: A mixed-method study. Inquiry, 62, 1-13. https://doi.org/10.1177/00469580251347132
  • Supriyanto, A., Jananto, A., Razaq, J. A., Hartono, B., & Damaryanti, F. (2025). Alignment of KAMI index with global security standards in information security risk maturity evaluation. Cybernetics and Information Technologies, 25(2), 173–192. https://doi.org/10.2478/cait-2025-0018
  • Svadlenka, R. (2025). Cybersecurity management system of large enterprises: Probabilistic behavioural model. E & M: Economics and Management, 28(1), 221–237. https://doi.org/10.15240/tul/001/2025-1-014
  • Vestad, A., & Yang, B. (2025). From security frameworks to sustainable municipal cybersecurity capabilities. Journal of Cybersecurity and Privacy, 5(2), Article 19. https://doi.org/10.3390/jcp5020019
Toplam 11 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi
Bölüm Araştırma Makalesi
Yazarlar

Tolga Mataracıoğlu 0009-0008-6233-706X

Duygu Fidancıoğlu 0009-0005-5362-8736

Gönderilme Tarihi 26 Ağustos 2025
Kabul Tarihi 24 Ekim 2025
Yayımlanma Tarihi 16 Aralık 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 1 Sayı: 2

Kaynak Göster

APA Mataracıoğlu, T., & Fidancıoğlu, D. (2025). Key Considerations in Preparing Specifications for ISMS Projects. Siber Güvenlik ve Dijital Ekonomi, 1(2), 75-84.