Newsletter Anmeldung

Bleiben Sie mit dem Newsletter immer up to date.

Request
arrow-to-top
HomeConsultancyInformation securityISDP concepts
Reto Steinmann
Head of Consulting
request

ISDP concepts

Structured implementation of information security and data protection

With our structured ISDS methodology, we create transparency, minimise risks and ensure that information security and data protection requirements are implemented in your organisation in an effective, comprehensive and auditable manner.

ISDP methodology:

  1. Analysis:
    • Status report: Analysis and determination of the applicable legal basis and internal guidelines regarding information security (including data protection and IT security, information protection)
  2. Protection needs analysis:
    • Conducting a protection needs analysis with regard to protection objectives: confidentiality, integrity, availability and data protection
  3. System architecture:
    • System architecture diagram
    • Interfaces, communication matrix
    • Data flows
  4. Risk analysis:
    • Conducting risk analysis based on the system architecture and the information processed therein
    • Identifying security-critical areas in the five sub-areas of technology, law, personnel, organisation and physical infrastructure that need to be optimised
  5. Development ISDP concept:
    • Description of risk treatment measures
    • Development of the following content (may vary):
      1. Management summary
      2. Protection needs analysis
      3. Security-related documents / legal basis
      4. System description
      5. Risk analysis
      6. Security measures
      7. Data protection / legal
      8. Business continuity (ITSCM)
      9. Compliance / review / acceptance of security measures
      10. Liquidation
  6. Implementation ISDP concept:
    • Implementation of the measures described in the ISDP concept
  7. Implementation review:
    • Risk-based review of the implemented measures
    • New risk assessment after measures have been implemented
  8. Conclusion
    • Transfer of the ISDP concept into an operating manual
    • Modification of the ISDP concept in the event of changes to the system architecture
Reto Steinmann
Head of Consulting
request

Non-binding enquiry

© Swiss Infosec AG 2025