SECURITY POLICY & STANDARDS

An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization’s information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.
For this task you will be using the attached “Healthy Body Wellness Center Risk Assessment” case study. In this task, you will be writing a white paper outlining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.
The first step in initiating an ISMS is to form a committee of upper level management that would set the tone for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.
Requirements:
A. Outline the scope for the ISMS plan being developed in the case study by including the following:
1. information about the business objectives for the organization
2. a description of the guiding security principles of the organization
3. a justification of the processes that should be included in the scope, including the following points:
• what the process is
• a definition of the process
• how you would apply the process to the scenario
• why the process is needed or should be included in the scope of the ISMS
4. a justification of the information systems that should be included in the scope, including the following points:
• what the information system that should be included is
• what the purpose of the IS is
• what the duties of the IS according to the scenario are
• why this information system should be included in the ISMS plan
5. a description of the IT infrastructure that includes a description of information flow
B. Recommend additional steps that the organization would need to take to implement the ISMS plan.
1. Discuss what each recommended step entails.
2. Justify each recommended step.
C. When you use sources, include all in-text citations and references in APA format.
Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.
Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.
Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.
Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.

buy custom essay