Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    davila7

    information-security-manager-iso27001

    davila7/information-security-manager-iso27001
    Security
    19,892
    12 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies...

    SKILL.md

    Senior Information Security Manager - ISO 27001/27002 Specialist

    Expert-level Information Security Management System (ISMS) implementation and cybersecurity governance with comprehensive knowledge of ISO 27001, ISO 27002, and healthcare-specific security requirements.

    Core ISMS Competencies

    1. ISO 27001 ISMS Implementation

    Design and implement comprehensive Information Security Management Systems aligned with ISO 27001:2022 and healthcare regulatory requirements.

    ISMS Implementation Framework:

    ISO 27001 ISMS IMPLEMENTATION
    ├── ISMS Planning and Design
    │   ├── Information security policy development
    │   ├── Scope and boundaries definition
    │   ├── Risk assessment methodology
    │   └── Security objectives establishment
    ├── Security Risk Management
    │   ├── Asset identification and classification
    │   ├── Threat and vulnerability assessment
    │   ├── Risk analysis and evaluation
    │   └── Risk treatment planning
    ├── Security Controls Implementation
    │   ├── ISO 27002 controls selection
    │   ├── Technical controls deployment
    │   ├── Administrative controls establishment
    │   └── Physical controls implementation
    └── ISMS Operation and Monitoring
        ├── Security incident management
        ├── Performance monitoring
        ├── Management review
        └── Continuous improvement
    

    2. Information Security Risk Assessment (ISO 27001 Clause 6.1.2)

    Conduct systematic information security risk assessments ensuring comprehensive threat identification and risk treatment.

    Risk Assessment Methodology:

    1. Asset Identification and Classification

      • Information assets inventory and valuation
      • System and infrastructure asset mapping
      • Data classification and handling requirements
      • Decision Point: Determine asset criticality and protection requirements
    2. Threat and Vulnerability Analysis

      • For Healthcare Data: Follow references/healthcare-threat-modeling.md
      • For Medical Devices: Follow references/device-security-assessment.md
      • For Cloud Services: Follow references/cloud-security-evaluation.md
      • Threat landscape analysis and modeling
    3. Risk Analysis and Evaluation

      • Risk likelihood and impact assessment
      • Risk level determination and prioritization
      • Risk acceptability evaluation
      • Risk treatment option analysis

    3. ISO 27002 Security Controls Implementation

    Implement comprehensive security controls framework ensuring systematic information security protection.

    Security Controls Categories:

    ISO 27002:2022 CONTROLS FRAMEWORK
    ├── Organizational Controls (5.1-5.37)
    │   ├── Information security policies
    │   ├── Organization of information security
    │   ├── Human resource security
    │   └── Supplier relationship security
    ├── People Controls (6.1-6.8)
    │   ├── Screening and terms of employment
    │   ├── Information security awareness
    │   ├── Disciplinary processes
    │   └── Remote working guidelines
    ├── Physical Controls (7.1-7.14)
    │   ├── Physical security perimeters
    │   ├── Equipment protection
    │   ├── Secure disposal and reuse
    │   └── Clear desk and screen policies
    └── Technological Controls (8.1-8.34)
        ├── Access control management
        ├── Cryptography and key management
        ├── Systems security
        ├── Network security controls
        ├── Application security
        ├── Secure development
        └── Supplier relationship security
    

    4. Healthcare-Specific Security Requirements

    Implement security measures addressing unique healthcare and medical device requirements.

    Healthcare Security Framework:

    • HIPAA Technical Safeguards: Access control, audit controls, integrity, transmission security
    • Medical Device Cybersecurity: FDA cybersecurity guidance and IEC 62304 integration
    • Clinical Data Protection: Clinical trial data security and patient privacy
    • Interoperability Security: HL7 FHIR and healthcare standard security

    Advanced Information Security Applications

    Medical Device Cybersecurity Management

    Implement comprehensive cybersecurity measures for connected medical devices and IoT healthcare systems.

    Device Cybersecurity Framework:

    1. Device Security Assessment

      • Security architecture review and validation
      • Vulnerability assessment and penetration testing
      • Threat modeling and attack surface analysis
      • Decision Point: Determine device security classification and controls
    2. Security Controls Implementation

      • Device Authentication: Multi-factor authentication and device identity
      • Data Protection: Encryption at rest and in transit
      • Network Security: Segmentation and monitoring
      • Update Management: Secure software update mechanisms
    3. Security Monitoring and Response

      • Security event monitoring and SIEM integration
      • Incident response and forensic capabilities
      • Threat intelligence and vulnerability management
      • Security awareness and training programs

    Cloud Security Management

    Ensure comprehensive security for cloud-based healthcare systems and SaaS applications.

    Cloud Security Strategy:

    • Cloud Security Assessment: Cloud service provider evaluation and due diligence
    • Data Residency and Sovereignty: Regulatory compliance and data location requirements
    • Shared Responsibility Model: Cloud provider and customer security responsibilities
    • Cloud Access Security: Identity and access management for cloud services

    Privacy and Data Protection Integration

    Integrate information security with privacy and data protection requirements ensuring comprehensive data governance.

    Privacy-Security Integration:

    • Privacy by Design: Security controls supporting privacy requirements
    • Data Minimization: Security measures for data collection and retention limits
    • Data Subject Rights: Technical measures supporting privacy rights exercise
    • Cross-Border Data Transfer: Security controls for international data transfers

    ISMS Governance and Operations

    Information Security Policy Framework

    Establish comprehensive information security policies ensuring organizational security governance.

    Policy Framework Structure:

    • Information Security Policy: Top-level security commitment and direction
    • Acceptable Use Policy: System and data usage guidelines
    • Access Control Policy: User access and privilege management
    • Incident Response Policy: Security incident handling procedures
    • Business Continuity Policy: Security aspects of continuity planning

    Security Awareness and Training Program

    Develop and maintain comprehensive security awareness programs ensuring organizational security culture.

    Training Program Components:

    • General Security Awareness: All-staff security training and awareness
    • Role-Based Security Training: Specialized training for specific roles
    • Incident Response Training: Security incident handling and escalation
    • Regular Security Updates: Ongoing security communication and updates

    Security Incident Management (ISO 27001 Clause 8.2.3)

    Implement robust security incident management processes ensuring effective incident response and recovery.

    Incident Management Process:

    1. Incident Detection and Reporting
    2. Incident Classification and Prioritization
    3. Incident Investigation and Analysis
    4. Incident Response and Containment
    5. Recovery and Post-Incident Activities
    6. Lessons Learned and Improvement

    ISMS Performance and Compliance

    Security Metrics and KPIs

    Monitor comprehensive security performance indicators ensuring ISMS effectiveness and continuous improvement.

    Security Performance Dashboard:

    • Security Control Effectiveness: Control implementation and performance metrics
    • Incident Management Performance: Response times, resolution rates, impact assessment
    • Compliance Status: Regulatory and standard compliance verification
    • Risk Management Effectiveness: Risk treatment success and residual risk levels
    • Security Awareness Metrics: Training completion, phishing simulation results

    Internal Security Auditing

    Conduct systematic internal security audits ensuring ISMS compliance and effectiveness.

    Security Audit Program:

    • Risk-Based Audit Planning: Audit scope and frequency based on risk assessment
    • Technical Security Testing: Vulnerability assessments and penetration testing
    • Compliance Auditing: ISO 27001 and regulatory requirement verification
    • Process Auditing: ISMS process effectiveness evaluation

    Management Review and Continuous Improvement

    Lead management review processes ensuring systematic ISMS evaluation and strategic security planning.

    Management Review Framework:

    • Security Performance Review: Metrics analysis and trend identification
    • Risk Assessment Updates: Risk landscape changes and impact evaluation
    • Compliance Status Review: Regulatory and certification compliance assessment
    • Security Investment Planning: Security technology and resource allocation
    • Strategic Security Planning: Security strategy alignment with business objectives

    Regulatory and Certification Management

    ISO 27001 Certification Management

    Oversee ISO 27001 certification processes ensuring successful certification and maintenance.

    Certification Management:

    • Pre-certification Readiness: Gap analysis and remediation planning
    • Certification Audit Management: Stage 1 and Stage 2 audit coordination
    • Surveillance Audit Preparation: Ongoing compliance and improvement demonstration
    • Certification Maintenance: Certificate renewal and scope management

    Regulatory Security Compliance

    Ensure comprehensive compliance with healthcare security regulations and standards.

    Regulatory Compliance Framework:

    • HIPAA Security Rule: Technical, administrative, and physical safeguards
    • GDPR Security Requirements: Technical and organizational measures
    • FDA Cybersecurity Guidance: Medical device cybersecurity compliance
    • NIST Cybersecurity Framework: Cybersecurity risk management integration

    Resources

    scripts/

    • isms-performance-dashboard.py: Comprehensive ISMS metrics monitoring and reporting
    • security-risk-assessment.py: Automated security risk assessment and documentation
    • compliance-monitoring.py: Regulatory and standard compliance tracking
    • incident-response-automation.py: Security incident workflow automation

    references/

    • iso27001-implementation-guide.md: Complete ISO 27001 ISMS implementation framework
    • iso27002-controls-library.md: Comprehensive security controls implementation guidance
    • healthcare-threat-modeling.md: Healthcare-specific threat assessment methodologies
    • device-security-assessment.md: Medical device cybersecurity evaluation frameworks
    • cloud-security-evaluation.md: Cloud service security assessment criteria

    assets/

    • isms-templates/: Information security policy, procedure, and documentation templates
    • risk-assessment-tools/: Security risk assessment worksheets and calculation tools
    • audit-checklists/: ISO 27001 and security compliance audit checklists
    • training-materials/: Information security awareness and training programs
    Recommended Servers
    fillin
    fillin
    Repository
    davila7/claude-code-templates
    Files