Information Security Management System

The establishment and implementation of information security management system is influenced by needs and objectives, security requirements, processes used, structure and our size

This document can be used by internal and external parties to assess how we meet the information security requirements.

It is important that the information security management system is part of and integrated with our processes and overall management structure and that information security is considered in the design of processes, information systems, and controls. An information security management system implementation will be scaled in accordance with the changing needs of our organization.

POLICIES
STANDARDS
PROCESSES

INFORMATION SECURITY POLICY (1)

LINUX HARDENING STANDARD (2.1)

Incident Management Processes (3.1)

Information Management Policy

INFORMATION SECURITY GOVERNANCE STANDARD (1.1)

Access Provisioning Process (4.1)

Access Control Policy (4)

Incident Management Standard (3)

Access Review Process (4.2)

Change Management policy

Risk Management Standard

On-boarding And Off-boarding Process (4.3)

Encryption Policy

Secure Development Management Standard

Vulnarability Management Process (5.1)

Server Security Policy (2)

Physical Security Standard

Threat Hunting Process (1.1.1)

Patch Management Policy

Penetration Testing Standard (5)

Information Asset Management Standard

Information Security Requirements Standard

Disaster Recovery Plan Standard

Back-up and Recovery Standard

Management System Improvement Standard

Last updated