Solution: Certification in Accordance with ISO/IEC 27001 on the Basis of IT-Grundschutz

Solution: Certification in Accordance with ISO/IEC 27001 on the Basis of IT-Grundschutz

TÜV TRUST IT GMBH Unternehmensgruppe TÜV AUSTRIA

Region: Deutschland

Waltherstraße 49-51 51069 Köln Deutschland

+49 221 9697890

Send email

Certification in Accordance with ISO/IEC 27001 on the Basis of IT-Grundschutz

In which region do you need this solution?

Information is the basis for the course of business, production processes and for communication with customers and partners. To provide appropriate protection for business information, effective processes, such as those that are mapped in an information security management system (ISMS), are required. The ultimate goal of the ISMS is to protect all information assets from loss of confidentiality, integrity, availability and authenticity. The construction of an ISMS therefore essentially includes processes for the analysis and assessment of risks resulting from IT operations as well as the selection and monitoring of appropriate security measures to treat these risks appropriately. The Federal Off ice for Information Security (BSI) has developed their own standards for the establishment of an ISMS in accordance with ISO/IEC 27001 based on IT-Grundschutz, illustrating the according procedures in detail.

If an ISMS is set up according to these specifications, the next possible step is certification. This certification is applied for to the BSI, which also acts as the certification body. Performing the certification audits requires the participation of at least one auditor who has been appointed by the BSI as an ISO/IEC 27001 audit team leader for audits on the basis of IT-Grundschutz. TÜV TRUST IT has a number of experienced and BSI appointed auditors, who can carry out this certification.

  • Show your customers and business partners that your security management is optimally set up
  • Permanent improvement of the ISMS processes by means of a periodic review
  • Identification of vulnerabilities as well as potentials for improvement
  • Avoidance of unexpected expenditures due to security incidents
  • Qualified ISO/IEC 27001 audit team leaders, who are appointed by the BSI to perform audits based on IT-Grundschutz

"*" indicates required fields

Land*
Address
This field is for validation purposes and should be left unchanged.

I am tami

Are you here for the first time? I will be happy to help you find your way around.

Check certificate

Find a solution

Submit science award

Check certificate

  • Person Certificate

  • Product Certificate

  • System Certificate

  • Verification of Conformity

Enter the data and check a certificate

Find a solution

WiPreis einreichen

WiPreis submit

"*" indicates required fields

1
2
3
4
First, please select in which category you would like to submit*

Select region

You cannot copy content of this page

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.