Module 16 of 16

ISO 27001 without Excel hell and 50,000-euro consultancy fees

Maintain risk inventory, Statement of Applicability and TOMs structured in one module. Audit trail unchangeable with hash chaining, incident response with NIS2 deadline tracker, mandatory measures maturity per area. GDPR-compliant, multi-tenant isolated on Postgres with Row-Level Security, EU-hosted at Hetzner Nuremberg. 49 euros per user per month all-in, no module bingo.

What ISMS does

Risk inventory with rating matrix
Maintain all information risks structured with damage amount, probability of occurrence and risk score. Rating matrix configurable per tenant, e.g. three by three or five by five, qualitative or quantitative in euro amounts with expected damage per year. Risks are assigned to assets, processes or persons, links are visible and traceable e.g. when an asset failure hits multiple processes and cascades. Treatment plan per risk with measures, owner and due date, notifications on overrun escalate automatically. Residual risk calculation automatically after measure implementation, acceptance workflow by management documented with electronic signature under eIDAS. Heatmap in the dashboard, drill-down from risk category to single entry, filter by asset type, process, owner or residual risk category. Trends over time for management reviews with quarterly comparison and benchmarking against industry. Four-eyes principle on risk acceptance optionally activatable, mandatory for risks above certain damage thresholds.
Statement of Applicability with all 93 Annex A controls
All 93 controls from ISO 27001 Annex A 2022 are prepared, you mark per control 'applicable' or 'not applicable' with reasoning and reference to risk inventory. Implementation status (planned, in progress, implemented, in review, documented), owner and reference to measures are maintained centrally with linking to evidence. At the press of a button you generate the SOA document for your ISO auditor, audit-ready without Excel export or manual consolidation. Changes are versioned, you see the history per control including reasoning and approver with time stamp. Comparison with ISO 27002 implementation guide directly linked, you see the recommended implementation next to your own. At the annual SOA review, outdated reasoning is marked, you only need to maintain changes, not the whole list, that saves several person-days per review cycle. Mapping to BSI IT-Grundschutz, NIST CSF and CIS Controls automatically available, dual maintenance is gone. Export as Word, PDF or structured XML for GRC tools with electronic signature under eIDAS.
TOMs under Article 32 GDPR documented
Technical and organisational measures are documented structured by confidentiality, integrity, availability and resilience, supplemented by recoverability and regular review. Encryption, pseudonymisation, access control, backup concept and recovery procedures are maintained with reference to the respective process and linked with evidence. At the press of a button you export the TOM document for your clients, e.g. as an attachment to the data processing agreement with or without contract reference, multilingualism per recipient configurable. Also works for your own DPAs with sub-processors, multilingualism German and English automatically synchronised. Mapping to ISO 27001 Annex A controls automatic, dual maintenance is completely gone. Record of processing activities under Article 30 GDPR in the same module, unified data basis, no Excel dual maintenance and no inconsistencies between TOM and record. Data protection impact assessments (DPIA) under Article 35 GDPR are created in the same workflow, with templates per DSK standard and consultation-obligation trigger above critical risk thresholds.
Audit trail unchangeable
Every change to risks, controls, measures, incidents or documents is stored unchangeable with time stamp, user and diff. The audit report is available at the press of a button, filtered by period, actor, object type or module. ISO 27001 auditors and ISMS auditors get complete traceability without log file digging or database dumps. Storage period configurable, default ten years, longer retention for regulated industries possible, e.g. 30 years for insurers or energy suppliers. Cryptographic hash chaining secures against subsequent manipulation, the hash chain is verifiable by the auditor with standard tools. Export as PDF with electronic signature (eIDAS-compliant) or as CSV for DATEV-style audit tools. Audit trail is immutable even for admins, no insider risk through privilege escalation.
Incident response with escalation paths
Capture security incidents with category, severity and affected parties, escalation paths are triggered automatically depending on severity and type of the incident. Level three triggers notification to CISO, level four to management, NIS2 reporting trigger for critical incidents with deadline tracker for 24-hour early warning report, 72-hour update and 30-day final report. Measures are maintained in the incident ticket, recovery times are measured, lessons learned structured supplemented with linking to risk inventory for future prevention. For NIS2-reportable incidents the early warning report with mandatory fields is automatically pre-filled, you only add details. The AI helper suggests immediate measures based on incident category and suggests links to comparable incidents. Crisis communication templates for customers, authorities and press pre-installed, customisable per tenant.
NIS2 maturity and mandatory measures tracker
The ten mandatory measures from NIS2 Article 21 are tracked structurally with maturity rating per area on a five-stage scale. You see immediately where gaps are and which measures have priority, roadmap to NIS2 compliance derivable with effort estimate in person-days. Management liability under Article 20 documented, board training audit-proof stored, quarterly reviews automatically scheduled with reminders. If you qualify as an important or essential entity, the tracker automatically adjusts to the respective requirements, e.g. stricter reporting obligations or extended audit duty. Supply chain risk management under Article 21 paragraph 2d integrated, sub-processors are maintained in the DPA module, risk rating per supplier with escalation for critical findings. Applicability check at onboarding of a new client, indirect applicability via supplier status recognised.

Who uses this module

CEO
You want ISO 27001 without five-figure consultancy fees and Excel collections that no one maintains after three months and aren't current at the first audit. In the ISMS module you see in the dashboard the implementation status per control, risk heatmap and open measures with deadlines, drill-down from top level to single entry. The AI helper answers 'Which Annex A controls are not yet implemented and which have the highest risk reduction?' in the chat, with effort estimate. Statement of Applicability is available at the press of a button, as are TOMs for DPA addenda with multilingualism. NIS2 maturity shows you whether you meet the mandatory measures as an important or essential entity, gaps are prioritised with effort estimate. Board reports for management reviews quarterly pre-filled, you only add strategic comments and decide on measure budget.
Team lead
As CISO or information security officer you maintain risks, measures and incidents centrally instead of in ten distributed Excel sheets. For a security incident you start incident response per click, escalation paths run automatically to management and to the BSI for NIS2 obligation, the 24-hour early warning report is prepared with all mandatory fields, 72-hour update and 30-day final report also in the same workflow with deadline tracker. Audit trail documents every step with time stamp and hash chaining. In the internal audit you show auditors the SOA and the TOMs at the press of a button, without Excel export. For external audits by TÜV or DEKRA you export audit packages with steps, owners and evidence, the auditor works directly with the PDF package and verifies hash chaining themselves.
Employee
You're measure owner for 'encryption of mobile devices' as part of the ISO 27001 implementation of your company. In the ISMS module you see the open task with due date and reference to the ISO 27001 Annex A control, upload evidence (e.g. MDM configuration as PDF, screenshot of enforced disk encryption) and mark the measure as implemented. The AI helper suggests which further controls or processes are linked with this measure, e.g. Annex A 8.24 Cryptography and Annex A 8.1 User Endpoint Devices, you link in two clicks. Your supervisor approves the closure electronically, the audit trail documents everything unchangeable including time stamp and hash. For recurring measures (e.g. annual pen tests) the task is automatically renewed, deadline reminders run without your intervention.

Connects with

Microsoft 365Google WorkspaceJiraConfluenceSlack

Frequently asked questions

Ready for DARION-AI ISMS?

49 € net/user/month — all modules included

Other modules in this area