Information security is already on the radar for most mid-market companies. NIS2 and ISO 27001 are hard to ignore. But here's where things get murky: nobody's quite sure what this actually looks like in practice. The standards feel foreign. The jargon is technical. The methodology seems abstract. What exactly is an asset? How do you tell the difference between need for protection and risk? And why do you even need confidentiality, integrity, and availability? This uncertainty is what holds most companies back.
This uncertainty is understandable. The language is unfamiliar, the thinking patterns are new, and it feels like you need to memorize half the standard just to get going.
Three hurdles come up again and again when companies tackle ISO 27001 for the first time:
The natural instinct is to dive into the tech side. You kick off with systems, vulnerabilities, firewalls, backups, permissions. It's not wrong — but it's often the wrong place to start. Here's why: information security quickly becomes an IT problem. And with the number of systems you're running, it becomes overwhelming fast.
Here's the real problem: you're asking the wrong question. The question isn't "How do we secure our systems?" The question is: "What does our company need to protect to stay in business?" Or put differently: What are the actual security risks hiding in how we work every day — in our business processes?
Information security isn't an IT problem. It's not even primarily a technical discipline. It's not about locking down systems for their own sake. It's about keeping your company able to deliver reliable services, process information correctly, and keep critical processes running — even when things go wrong. That's a business question, not a tech question.
Business processes are your best entry point. Here's why:
They're already familiar.
They create a bridge between two worlds.
This is the real payoff: business processes connect ISO 9001 (quality management) and ISO 27001 (information security) seamlessly. Instead of starting with abstract concepts like "assets," you anchor information security to something that already exists in your company.
You're not learning a new language. You're just asking new questions about processes you already know.
And this is exactly where the methodology suddenly becomes much simpler: Information is not processed in isolation, but always in a business process. A sales process processes different information than development, development processes other than purchasing, and each of these processes depends on specific resources — assets.
Systems, laptops, employees, rooms or external service providers are therefore no longer regarded as loose objects, but as a means of processing information in the business process.
With this point of view, the terms also become more tangible:
The major methodological advantage is that the protection goals can now also be derived cleanly.
Confidentiality and integrity result from the information. When customer data, contract data, calculations or personal data are processed in the company, the following questions arise immediately:
Availability, on the other hand, does not primarily result from information, but from the business process. The decisive question here is how long a process can fail before it causes business-critical damage.
For many companies, it is precisely this distinction that is a decisive aha moment. Because it makes the methodology easier to understand:
This turns an abstract security model into a comprehensible, business-oriented order.
All of this can be broken down to a simple methodological principle:
And this order also has another advantage: It prevents activism. Especially when cyber risks are present, there is a great desire to implement measures immediately. Multi-factor authentication, backup hardening, awareness training, network segmentation — it all makes sense, no question about it.
But without a proper derivation, it often remains unclear:
Getting started via business processes creates exactly the structure that many companies lack:
Information security is thus becoming much more concrete and finally what it should be at its core: a contribution to the stability and security of the company.
Perhaps this is even the most important insight to start with: You don't have to directly master every detail of the standard when getting started with ISO 27001, you first need comprehensible access. And it's right in front of you: with the business processes that your company manages every day anyway.
In the second part, exactly this logic becomes concrete. I will then give a practical example of the methodology — the evaluation of the information security of the sales process of a medium-sized mechanical engineering company.
Sign in to get in touch with Carsten directly.
.avif)