
ISO 27001:2022 Know-how set
This know-how set defines an ISO 27001:2022 and ISO 27002:2022 compliant information security and a cyber security management system. It is used to ensure information security, cybersecurity, and lawful processing of personal information.

Description
Find out more about the know-how set

ISMS complete documentation
This know-how set contains the documentation required to define and operate an ISO 27001-compliant Information Security Management System. It includes over 117 policies, processes, procedures, instructions, document templates, normative sources, roles, and other types of content that comprise the systematic approach to any organization’s information security.

Ready-to-use and structured
The know-how set content is ready to use. It indicates the elements which should be tailored for the organization’s specificity using the TODO: strings. Thanks to this approach, you can focus on implementing the ISMS, not defining all its elements. The know-how set also establishes a structure of the ISMS documentation, introducing order to the system.

Role-based training
The know-how set introduces seven fundamental roles required by the ISMS. The roles define the scope of the training/awareness building concerning the ISMS definition. By assigning a person to a role on ins2outs, you limit a person’s perspective only to their essential information security tasks.

Normative sources
The know-how set documentation was derived from and is linked to the following normative sources: ISO 27001:2022, ISO 27002:2022, ISO 22301:2012, HIPAA, and General Data Protection Regulation (GDPR). Each normative source has a list of the documentation from this know-how set used to prove compliance.
Know-how set elements
Click on each of the groups to expand and see the complete list
ISMS Elements (110+)
15 - Policies
- ISMS Acceptable Use Policy
- ISMS Access Control Policy
- ISMS Access to Network and Network Services Policy
- ISMS Backup Policy
- ISMS Clean Desk and Clean Desktop Policy
- ISMS External Communication Policy
- ISMS Information Classification Policy
- ISMS Information Security Policy
- ISMS Information Security Risk Management Policy
- ISMS Information Transfer Policy
- ISMS Management of Removable Media Policy
- ISMS Mobile Devices Policy
- ISMS Password Management Policy
- ISMS Policy of Information Security in Relations with Suppliers
- ISMS Policy on the Use of Cryptographic Controls
11 - Processes
- ISMS Access Control Process
- ISMS Assets Management Process
- ISMS Audit Management Process
- ISMS Business Continuity Management Process
- ISMS Change Management Process
- ISMS Management Review Process
- ISMS Operations Management Process
- ISMS Personal Information Management Process
- ISMS Purchasing Process
- ISMS Risk Management Process
- ISMS Security Incident Handling Process
12 - Procedures
- ISMS Procedures for Individual Rights Execution in Data Processing
- ISMS Assets Management Procedure
- ISMS Disposal of Removable Media Procedure
- ISMS Internal Audit Procedure
- ISMS Management Review Procedure
- ISMS Nonconformities and Corrective Actions Management Procedure
- ISMS Procedure for Responding to Security Incidents
- ISMS Procedure for Responding to Security Weaknesses
- ISMS Procedure for the Management of Risks Related to Information Security
- ISMS Procedure for Working in Secure Areas
- ISMS Control of Records Procedure
- ISMS Control of System Documents Procedure
06 - Instructions
- ISMS Recruitment Process Instructions
- ISMS Computer User Instructions
- ISMS Instruction for Granting Rights in the Access Control System
- ISMS Instruction for Information Security in Project Management
- ISMS Instruction for Protecting Secure Areas
- ISMS Instructions for Equipment and Infrastructure Maintenance
32 - Ins/Outs (Templates)
- ISMS Change Request
- GDPR Agreement Regulating Access Rights
- GDPR Data Protection Impact Assessment
- GDPR Non-competition and Information Confidentiality Agreement
- GDPR Statement of Applicability
- ISMS Clearance Sheet
- ISMS – Monitoring and Measurements
- ISMS Access Control: Procedures
- ISMS Asset Information
- ISMS Asset Supplementary Information
- ISMS Business Continuity Plan
- ISMS Corrective Action
- ISMS ISO 27001 Statement of Applicability
- ISMS Management Review Report
- ISMS Nonconformity (NCR)
- ISMS Operations Management Plan
- ISMS Opportunity for Improvement (OFI)
- ISMS Organization Context
- ISMS Preventive Action
- ISMS Purchase Requirements
- ISMS Purchase Specification
- ISMS Risk Assessment
- ISMS Risk Treatment Plan
- ISMS Risks and Vulnerability Database
- ISMS Security Incident
- ISMS Security Weakness
- ISMS Supplier Agreement
- ISMS Audit Plan
- ISMS Audit Programme
- ISMS Audit Report
- ISMS Excel Document Template
- ISMS Word Document Template
7 - Normative sources
- GDPR EU: General Data Protection Regulation
- ISMS ISO 22301:2012
- ISMS ISO 27001:2013
- ISMS US:NIST 800-175B:2020
- ISMS US:NIST 800-57 – Part 2:2019
- ISMS US:NIST 800-61 Revision 2
- US: HIPAA
7 - Roles
- ISMS Data Protection Officer
- ISMS Information Security Officer
- ISMS IT System Administrator
- ISMS Contractor
- ISMS Employee
- ISMS Internal Auditor
- ISMS Top Management

How to purchase?
The purchase process is straightforward

Buying the know-how set
To buy a know-how set, you must order it using the contact form below. ins2outs would issue an invoice that covers the one-time payment for the know-how set. After the payment, ins2outs copies the know-how set to the organization’s account on ins2outs. The account must be active and have at least one paying user assigned. From that moment on, the know-how set is available for your organization. It usually takes one hour to copy the know-how set once the payment is confirmed.

Know-how set license
Once purchased, ins2outs grants your organization authorization for non-exclusive use of the Know-how set (non-exclusive license). The license is given in return for a one-time fee for the know-how set for the current status of the set. The license is granted for an indefinite period. The know-how set cannot be resold or made available outside the purchasing organization. The license limitations are documented in the Terms and Conditions document chapter “VI. Know-how set license”.

Ten hours of free consulting
When you purchase this know-how set on ins2outs, you are entitled to ten hours of free consulting. The purpose of that support is to smoother your entry into the ins2outs platform, show how to use ins2outs effectively, and let you test how an information security manager as a service offering could look. You define the schedule and the topics for which this consulting can be used. Try our Information Security Officer as a Service (ISOaaS) offering to prolong that service.
Benefits
Explore the benefits of starting your system definition with this know-how set
Deliver know-how to your organization in one hour
Acquire the ISO 27001 know-how set instantly from the ins2outs platform. Let your organization gain the know-how, information security processes and build the necessary competencies.
Shorten by up to 75% your ISMS implementation time
The ISMS implementation can be a prompt and effective process. Combine ins2outs software, ISO 27001 know-how sets, and our consultants to define and certify any management system in weeks, not years.
Start operating the ISMS from day one
By acquiring a know-how set, you can start executing your ISMS from the moment of completed purchase. Most of the elements require just publishing and then training your personnel. The ins2outs software delivers the training.
Introduce mature information security governance
The know-how set brings the Information Security governance framework that collects experiences and expertise from many years of operating and improving InfoSec processes. Available for you in less than 1 hour.
Structured and easy ISMS execution
The know-how set brings not only valuable security governance, but also documentation structures, a plethora of templates, and training tailored for each role in the ISMS. This way, the daily operations of the ISMS become easier to grasp and execute. As a result, you get more efficient ISMS.
Pricing
ISO 27001 Know-how set
- Defines ISO 27001-compliant ISMS
- Requires ins2outs account
- One-time net fee
- For organizations of any size
Information Security Officer
- Experienced Information Security Officer
- Delivered via ins2outs
- Monthly net fee
- For organizations with up to 100 users
ins2outs Software
- Cloud-hosted
- Requires one active user account
- Standard features package
- Full view and edit rights