Stakeholder Identification Worksheet
Use this worksheet to systematically identify and analyze your ISMS stakeholders.
Instructions
Complete each section to build a comprehensive stakeholder register.
Part 1: Stakeholder Categories
Internal Stakeholders
| Name/Role | Department | Security Interest | Priority (H/M/L) |
|---|---|---|---|
External Stakeholders
| Organization/Type | Relationship | Security Requirements | Priority (H/M/L) |
|---|---|---|---|
Part 2: Requirements Analysis
For each high-priority stakeholder, document:
Stakeholder: _____________
What they need from your ISMS:
- Data protection
- Compliance evidence
- Incident notification
- Security reporting
- Other: __________
Their requirements source:
- Contract
- Regulation
- Policy
- Expectation
How you'll meet their needs:
Part 3: Communication Planning
| Stakeholder | Communication Method | Frequency | Owner |
|---|---|---|---|
Completion Checklist
- All stakeholder categories considered
- Requirements documented
- Priorities assigned
- Communication plan drafted
- Approved by management
Next Lesson: Define your ISMS scope boundaries.