Skip to content
i-doit Add-on

ISMS

   i-doit     /        Paid

Build an information security management system with risk analysis and management according to ISO 27001
add-on-isms-square
Key functionalities

  • ISO27001 Risk Management within i-doit

  • Importing and managing threats and measures from external catalogs

  • Risk evaluations directly at documented assets

  • Reporting and integration into the i-doit Add-on Documents

Pricing

Paid.

Fixed priced add-on

View pricing


Support

Support for this add-on is included in the i-doit basic support.


Installation

For installation instructions, please visit our knowledge base

More details


i-doit-group-logo

IT Documentation with i-doit: the foundation for successful ISMS

Get a comprehensive overview of your (IT) infrastructure while maintaining high data quality through integrated processes.

The i-doit Add-on ISMS integrates security documentation directly into your CMDB, where it belongs. Since IT documentation is the first to know about new components and infrastructure changes, you can manage security assessments daily through risk identification and evaluation of objects (IT assets, Configuration Items) directly in i-doit.

We believe change processes are complex enough already! Avoid purchasing additional software and maintaining redundant data. The i-doit Add-on ISMS's native i-doit integration leverages existing functions like templates, bulk processing, and reporting. Users can add security information to assets without modifying the underlying data model. For final refinements to your Risk Management Process, the i-doit Add-on Documents can incorporate ISMS data into professionally formatted documents matching your corporate design.

screenshot-ISMS-2024

Achieve ISO 27001 Compliance in Just Three Steps

With the i-doit Add-on ISMS, you seamlessly integrate risk assessment directly into your IT asset management. Whether following ISO 27001 Annex A, the BSI IT-Grundschutz Catalog, or the IT Security Catalog of the Bundesnetzagentur, you’re covered from the start.

  • Step 1: Install the i-doit Add-on ISMS and conduct risk assessments within the context of your IT assets.
  • Step 2: Customize your risk management framework by adjusting predefined catalogs, defining impact scenarios, setting up mitigation measures, and assigning roles, responsibilities, and rating scales. Initial report definitions complete this phase.
  • Step 3: Implement and maintain risk management to ensure ISO 27001 compliance. Analyze and evaluate assets, manage versioning, and follow the PDCA cycle (Plan, Do, Check, Act) with full documentation support from the i-doit Add-on ISMS.

i-doit-add-on-ISMS-screenshot

 

Use-Cases

multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc (1)
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

Use cases

i-doit use cases for your documentation needs

Network and cabling management
Network and cabling management

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

View use case

Software and license management
Software and license management

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

View use case

Reporting and auditing
Reporting and auditing

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

View use case

Contract management
Contract management

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

View use case

Life cycle management
Life cycle management

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

View use case

Location management
Location management

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.

View use case

Test i-doit free for 30 days

icon-it-documentation-in-team-lt
2000+ Customers
icon-api-lt
No payment details required
icon-link-lt
Support included
icon-digital-contract-management-lt
Full functionality
icon-it-security-lt
GDPR compliant

Related Add-ons

add-on-analysis-box
i-doit Add-on Analysis

Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.

add-on-flows-box
i-doit Add-on Flows

Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.

add-on-isms-box
i-doit Add-on ISMS

Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.

add-on-documents-box
i-doit Add-on Documents

Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).

add-on-checkmk2-box
i-doit Add-on Checkmk2

Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.

add-on-forms-box
i-doit Add-on Forms

Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.

add-on-trigger-box
i-doit Add-on Trigger

Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.

add-on-viva2-box
i-doit Add-on VIVA2

Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.

More Add-ons

Data Privacy
Data Privacy

Expand i-doit to include DSGVO-relevant areas. The master data remains, the extended rights system ensures security.

Mehr lesen

 i-doit
 Free

Documents
Documents

From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!

Read more

 i-doit
 Paid

Rights Documentation
Rights Documentation

Record and control authorizations between business departments and IT. Authorizations can be linked to business applications via LDAP/LDAPs.

Read more

 i-doit
  Free

VIVA2 (IT-Grundschutz)
VIVA2 (Baseline Protection)

Build information security management systems (ISMS) according to the BSI's IT Baseline Protection methodology.

Read more

 i-doit
  Paid

Get your personalized quote today!

Discover how the i-doit Add-on ISMS can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

pwr-man-glasses-beard-tablet-blue


Telefon: +49 (0) 211 - 699 31 0