This is an Information Security Management System report based on a fictional business that was in need of security controls. This report aims to fix these security issues using the NIST framework and is built on the requirements of ISO 27001 (clauses 6.1.2 and 6.1.3).