It is developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an information security management system.