Skip to content
English - United Kingdom
  • There are no suggestions because the search field is empty.

Your step-by-step guide to information security in Wired Relations

Wired Relations builds on best practices and the Plan-Do-Check-Act principle of information security. 

Publishing date: December 10, 2024

Besides the best building on top of best practices and the Plan-Do-Check-Act principle, we work with this foundational framework:

Wired Relations InfoSec Program_ENG_Help center article

This article outlines the chronological steps for managing information security in Wired Relations based on both frameworks.

1) Set up your Wired Relations account:

  • Create your Wired Relations account
  • Invite other users who are to assist with data mapping
  • Complete your company info for optimised and correct use

Lay the foundation of the infosec programme

2) Map your systems using our step-by-step guide to mapping systems. This will allow you to manage the risks associated with individual systems.

3) Map all your vendors using our step-by-step guide to mapping vendors. This will allow you to control the risks posed by your supply chain.

4) Identify supply chains and criticality:
  • Identify your entire supply chain by adding sub-vendors to each system / vendor.
  • Identify the criticality of the system to prioritise infosec resources.
System and Vendor Management_Step-by-step-guide-to-mapping-vendors_Help center article

Run the programme

5) Risk management: How to perform threat-based risk assessments in Wired Relations

6) Set-up your control framework (e.g ISO27001/27002, NIS2, CIS 18, ISAE3000, Custom Controls):
  • Wired Relations already has several frameworks ready for you to work with.
  • It is possible to work with multiple frameworks in Wired Relations, mapping them so that one control relates to several frameworks.
  • If you have your own framework, set it up through Custom Controls and map it to other frameworks.

Governance_Step-by-step-guide-to-mapping-vendors_Help center article

7) Vendor management and audits: How to audit in Wired Relations

8) Handle security incidents through our Security Incidents Module.

Security Incidents__Step-by-step-guide-to-mapping-vendors_Help center article

Awareness

Evaluate & iterate

Plan-do-check-act is what information security is all about. You can set up your annual information security schedule in Wired Relations by creating one-off and recurring tasks in our Task Manager.
  • Set up internal audits in task management
  • Build an annual cycle of tasks that automatically serve as documentation for all your work.