Structured ISMS for critical infrastructures: Establishing information security sustainably and in compliance with NIS2

With increasing regulatory requirements, the need for structured information security is growing. jovoco supports critical organizations in setting up an ISMS, increases the level of security and ensures NIS2 compliance in the long term.

Customer

Customer benefits

Technology stack

"Thanks to jovoco GmbH's structured approach, we were able to gain a holistic view of our information security for the first time. The combination of technical implementation and organizational clarity was particularly valuable."
Profil
Assistant to the management

Challenges of the customer

When the NIS2 directive came into force, it became necessary for the clinic to implement information security systematically, comprehensibly and organization-wide. Although individual security measures were in place at the start of the project, they were not uniformly documented, evaluated or integrated into an overarching management system.

The organization is characterized by several locations and specialist departments. Security-relevant processes – for example in identity and authorisation management, in the handling of sensitive information or in organizational responsibilities – had grown historically and were not harmonized across the board. There was no consolidated view of risks, protection requirements and dependencies.

There was also uncertainty as to which measures are absolutely necessary, how technical and organizational requirements interact in a meaningful way and how information security can be permanently anchored in ongoing operations. The aim of the project was therefore to reduce risks in a targeted manner, create transparency and establish a reliable basis for NIS2 compliance and ISO/IEC 27001 certification.

Our approach

At the start of the project, a structured process model was defined that holistically combines regulatory requirements, organizational processes and technical security measures. The aim was to establish information security in a practical manner, reduce risks in a targeted manner and establish sustainable structures in ongoing operations.

Holistic gap analysis
(ISO 27001 & NIS2)

To begin with, a comprehensive gap analysis was carried out, bringing together technical, organizational and regulatory requirements from ISO/IEC 27001 and NIS2. Existing measures, responsibilities and documentation were evaluated and deviations from the target status were recorded in a structured manner.

1

Process recording in all specialist departments

Based on the initial analysis, security-relevant processes were recorded in all departments involved. Real processes, responsibilities and data flows were recorded in interviews and structured surveys in order to derive practical and department-specific protection requirements.

2

Extended risk analysis based on BSI IT baseline protection

In addition to the normative analysis, the BSI IT baseline protection was used. This made it possible to identify additional risks that go beyond the minimum requirements, such as organizational, physical or environmental risks. This enabled a well-founded prioritization of further measures.

3

Implementation of technical and organizational measures

Based on the gaps, processes and risks identified, the necessary technical and organizational measures were implemented in a targeted manner. These included the optimization of identity and access concepts, the implementation of secure authentication mechanisms and the protection of sensitive data and end devices in the Microsoft 365 environment.

4

Cross-departmental effectiveness testing

Finally, all departments involved checked whether the defined measures had been fully implemented and effectively established. Identified deviations were rectified so that organizational and technical security requirements are consistently met.

5

Results for the customer

the NIS2-relevant requirements are recorded, evaluated and implemented in a structured manner
0 %
Security-relevant departments fully integrated into the ISMS
0

Further results:

Do you have a specific project in mind?

Your decision would be the same as that of renowned companies:

Geschaftsfuhrer Matthias vom IT Dienstleister jovoco

Similar case studies

NIS2 konformes KRITIS-Unternehmen

Operating Microsoft 365 securely and in compliance with NIS2

Unclear security statuses, a lack of governance and increasing regulatory requirements increase the risk. With a structured NIS2 implementation in Microsoft 365, jovoco creates transparency, security and sustainable compliance.
TISAX Zertifizierung Anleitung

Successful TISAX certification in 5 months

The project focused on the implementation of TISAX-compliant security solutions to improve information security and fault diagnosis. Centralized monitoring systems and standardized processes increased efficiency, reduced dependence on individual knowledge and increased operational stability.
monday-ki-task-zuordnung

Time recording with AI – from manual allocation to automated efficiency

Employees save time, management benefits from clean data: an AI-supported solution for time recording in the project management tool Monday.com