Your step-by-step guide to information security in Wired Relations
Wired Relations builds on best practices and the Plan-Do-Check-Act principle of information security.
Publishing date: December 10, 2024
Besides the best building on top of best practices and the Plan-Do-Check-Act principle, we work with this foundational framework:
This article outlines the chronological steps for managing information security in Wired Relations based on both frameworks.
1) Set up your Wired Relations account:
- Create your Wired Relations account
- Invite other users who are to assist with data mapping
- Complete your company info for optimised and correct use
Lay the foundation of the infosec programme
2) Map your systems using our step-by-step guide to mapping systems. This will allow you to manage the risks associated with individual systems.3) Map all your vendors using our step-by-step guide to mapping vendors. This will allow you to control the risks posed by your supply chain.
4) Identify supply chains and criticality:
- Identify your entire supply chain by adding sub-vendors to each system / vendor.
- Identify the criticality of the system to prioritise infosec resources.
Run the programme
5) Risk management: How to perform threat-based risk assessments in Wired Relations.6) Set-up your control framework (e.g ISO27001/27002, NIS2, CIS 18, ISAE3000, Custom Controls):
- Wired Relations already has several frameworks ready for you to work with.
- It is possible to work with multiple frameworks in Wired Relations, mapping them so that one control relates to several frameworks.
- If you have your own framework, set it up through Custom Controls and map it to other frameworks.
7) Vendor management and audits: How to audit in Wired Relations.
8) Handle security incidents through our Security Incidents Module.
Awareness
- Templates for policies and procedures in relation to GDPR and Information Security
- Track and distribute policies.
Evaluate & iterate
Plan-do-check-act is what information security is all about. You can set up your annual information security schedule in Wired Relations by creating one-off and recurring tasks in our Task Manager.- Set up internal audits in task management
- Build an annual cycle of tasks that automatically serve as documentation for all your work.