ISO 27001 ISMS implementation and cybersecurity governance for HealthTech and MedTech companies. Use for ISMS design, security risk assessment, control implementation, ISO 27001 certification, security audits, incident response, and compliance verification. Covers ISO 27001, ISO 27002, healthcare security, and medical device cybersecurity.
87
73%
Does it follow best practices?
Impact
95%
1.33xAverage score across 6 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./ra-qm-team/information-security-manager-iso27001/SKILL.mdHealthcare risk assessment using prescribed tooling and scoring methodology
risk_assessment.py used
0%
100%
Healthcare template flag
0%
100%
Scope parameter used
0%
100%
Likelihood × Impact formula
100%
100%
1-5 scoring scales
100%
100%
Risk level thresholds
0%
100%
Asset inventory fields
60%
60%
STRIDE threat model
0%
0%
Residual risk calculated
20%
90%
Report structure
100%
100%
Treatment timelines
50%
100%
Output saved to file
0%
100%
ISMS implementation workflow, SoA structure, and compliance monitoring schedule
compliance_checker.py used
0%
100%
--standard iso27001 flag
0%
100%
--gap-analysis flag used
0%
100%
ISMS four-step sequence
60%
70%
SoA Control ID field
100%
80%
SoA Applicable and Justification
100%
100%
SoA Implementation Status
100%
100%
SoA Evidence Reference
0%
100%
Monthly compliance command
100%
100%
Quarterly gap analysis command
0%
100%
AES-256 at rest
100%
100%
TLS 1.3 in transit
62%
100%
MFA for all users
0%
100%
Hardware token for admins
0%
0%
iso27002 for control mapping
0%
100%
Incident response procedures, severity classification, and regulatory notification timelines
15-minute logging target
50%
100%
Critical = Immediate response
100%
100%
High = 1-hour response
62%
100%
Medium = 4-hour response
62%
100%
Post-incident review timing
40%
100%
GDPR 72-hour notification
100%
100%
HIPAA 60-day notification
100%
100%
Preserve evidence before changes
100%
87%
Isolation as containment action
100%
100%
MTTD target < 1 hour
0%
100%
MTTR target < 4 hours
0%
100%
MTTC target < 2 hours
0%
100%
Repeat incidents target 0
0%
100%
Incident categories covered
100%
100%
Security governance documentation: policy lifecycle, RACI, training program, remote working
Policy approval step
100%
100%
Policy communication step
100%
100%
Annual policy review
100%
100%
RACI matrix present
100%
100%
Information Security Manager role
100%
100%
Annual training program
100%
100%
Role-specific training
100%
100%
Phishing simulations
100%
100%
Training effectiveness tracking
100%
100%
VPN requirement
100%
100%
Endpoint protection requirement
100%
100%
Job descriptions with security duties
100%
0%
Technical security controls: backup policy, SIEM logging, vulnerability management, privileged access
Backup encryption
100%
100%
Automated backups
100%
100%
Restoration testing
100%
100%
Centralized log management (SIEM)
100%
100%
Log retention period
100%
100%
Log integrity protection
100%
100%
CVSS-aligned vulnerability scoring
100%
100%
Named vulnerability tool categories
100%
100%
Remediation SLAs by severity
100%
100%
PAM solution
87%
100%
Separate admin accounts
75%
100%
MFA for privileged access
100%
100%
Privileged activity logging
100%
100%
Certification readiness, evidence retention, post-incident report, and containment by incident type
Stage 1: SoA in checklist
100%
100%
Stage 1: Internal audit item
100%
100%
Stage 1: Management review item
100%
100%
Stage 2: 3+ months metrics
0%
100%
Stage 2: Controls operational
100%
100%
Account compromise containment
100%
100%
Malware containment: isolate + C2 block
100%
100%
Data breach: DLP action
50%
100%
DDoS: traffic scrubbing
100%
100%
Audit reports retention: 3 years
100%
100%
Training records retention
25%
100%
Policy versions retention
100%
100%
Post-incident report: RCA section
100%
100%
Post-incident report: Impact Assessment
66%
100%
Post-incident report: Timeline section
100%
100%
Post-incident report: Recommendations table
100%
100%
a96cc20
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.