To ensure the security of our customers' information, we have implemented an Information Security Management System (ISMS) in accordance with the requirements of ISO/IEC 27001:2022 standard.
All the company policies, terms, and operational procedures are organized into a set of interconnected documents.
These documents are internal, but we will be happy to show them to you and provide further details in a dedicated audit session.
Business Continuity Plan
The structured framework that defines how the organization ensures the continued delivery of critical services and operations during and after disruptive events.It includes risk assessments, business impact analysis, continuity strategies, cloud provider selection, and recovery priorities to minimize downtime and safeguard essential functions.
Security Plan
This document describes the organization's security objectives, policies, controls, and responsibilities.
It details how information assets are protected and describes access control procedures and monitoring activities.
It also includes the roadmap for maintaining and improving the company and software (DPS) security.Disaster Recovery Plan
This plan describes the procedures, resources, and responsibilities needed to restore IT systems, infrastructure, and data after a disruption event.
It covers backup strategies, recovery time objectives (RTO), recovery point objectives (RPO), and step-by-step restoration processes.Employment Conditions & Company Policies
The set of formal documents defining employee rights, responsibilities, roles, and expected behaviors within the organization.
They include terms of employment, confidentiality agreements, acceptable use policies, code of conduct, and disciplinary measures.
These documents ensure that personnel understand and comply with legal, contractual, and security requirements stated in the Security Plan.
Below you will find all the requirements of the ISO 27001:2022 standard, and for each of them, where the arrow āāā is present, you can see how Servity complies.
Main Clauses
1. Scope
Not relevant for describing the compliance.
2. Normative references
Not relevant for describing the compliance.
3. Terms and definitions
Not relevant for describing the compliance.
4. Context of the Organization
The organization and its context are identified. ā Business Continuity Plan, Security Plan, Security Framework.
Internal and external issues that may affect security, reliability, and performance.
The needs and expectations of interested parties are well described. ā Business Continuity Plan, Security Plan, SLA (Service Level Agreement).
Relevant stakeholders and their information security requirements.
The scope of the ISMS is determined. ā Security Plan, DPS Architecture, Security Framework.
The boundaries of the ISMS, including what is included and excluded (with justification).
Processes, activities, sites, information systems, and data are covered.
The ISMS is established.ā Security Plan, Security Framework.
The ISMS is established, implemented, maintained, and continually improved in accordance with the standard.
5. Leadership
Leadership and commitment are demonstrated. ā Security Plan
The ISMS is supported by top management and integrated into business processes.
Resources needed for the ISMS are provided, and a continuous improvement of the ISMS is promoted.
The information security policy is established. ā Security Plan, Employment Conditions & Company Policies
An information security policy appropriate to the organizationās purpose is established and maintained.
The policy is communicated within the organization and made available to interested parties.
Organizational roles, responsibilities, and authorities are assigned. ā Security Plan, Employment Conditions & Company Policies
Roles and responsibilities related to information security are assigned and communicated.
Authorities for ISMS performance and reporting are defined and acknowledged.
6. Planning
Actions to address risks and opportunities are determined. ā Business Continuity Plan, Security Plan, Secure Development Practices.
Risks and opportunities relevant to the ISMS are identified and addressed.
Information security risks are assessed using established risk assessment criteria.
Information security risks are treated through selected and implemented risk treatment options.
Information security objectives and planning to achieve them are established. ā Security Plan, Secure Development Practices.
Information security objectives consistent with the policy are defined and documented.
Objectives are monitored, communicated, and updated as appropriate.
Plans for achieving the objectives are established, including responsibilities, resources, timelines, and evaluation methods.
Planning of changes is carried out. ā Security Plan
Changes to the ISMS are planned and implemented in a controlled manner.
7. Support
Resources are provided. ā Business Continuity Plan, Security Plan
Necessary resources for establishing, implementing, maintaining, and continually improving the ISMS are provided.
Competence is ensured. ā Security Plan, Secure Development Practices.
Personnel performing work affecting the ISMS are made competent through education, training, or experience.
Awareness is promoted. ā Security Plan, Employment Conditions & Company Policies, Secure Development Practices.
Personnel are made aware of the information security policy, their contributions to ISMS effectiveness, and the implications of non-compliance.
Communication is managed. ā Security Plan
Internal and external communications relevant to the ISMS are determined, implemented, and maintained.
What, when, with whom, and how to communicate is ensured.
Documented information is controlled. ā Security Plan
Required documented information is created, updated, and controlled.
Documented information required by the ISMS and the standard is protected and made available as needed (audit).
8. Operation
Operational planning and control are implemented. ā Security Plan, Secure Development Practices.
Processes needed for the ISMS are planned, implemented, and controlled.
Criteria for these processes are established and applied.
Risks associated with operations are addressed and managed.
Information security risk assessment is performed. ā Security Plan, Secure Development Practices.
Information security risks are assessed at planned intervals and when changes occur.
Assessment results are documented and used to guide risk treatment.
Information security risk treatment is applied. ā Security Plan, Secure Development Practices.
Risk treatment plans are implemented and maintained.
Residual risks are accepted and communicated as appropriate.
Controls selected from Annex A or other sources are implemented and monitored.
9. Performance Evaluation
Monitoring, measurement, analysis, and evaluation are performed. ā Security Plan
The performance and effectiveness of the ISMS are monitored, measured, analyzed, and evaluated at planned intervals.
Internal audits are conducted. ā Security Plan, Secure Development Practices.
Internal audits of the ISMS are planned and performed at defined intervals.
Audit results are documented and communicated to relevant management.
Management reviews are conducted. ā Security Plan
The ISMS is reviewed by top management at planned intervals.
Opportunities for improvement and changes needed to maintain the ISMS are identified and acted upon.
10. Improvement
Nonconformities and corrective actions are addressed. ā Security Plan, Secure Development Practices
Nonconformities are identified and addressed.
Corrective actions are implemented to eliminate causes of nonconformities.
The effectiveness of corrective actions is verified.
Continuous improvement is ensured. ā Security Plan.
The ISMS is continually improved to enhance information security performance.
Annex A - Controls
A.5 ā Organizational Controls
Information Security Policies ā Security Plan, Employment Conditions & Company Policies, Security Framework
Information security roles and responsibilities ā Security Plan, Employment Conditions & Company Policies
Segregation of Duties ā Security Plan, Employment Conditions & Company Policies
Management responsibilities ā Security Plan, Employment Conditions & Company Policies
Contact with authorities ā Security Plan, Data Processor Agreement
Contact with special interest groups ā Security Plan, Secure Development Practices
Threat intelligence ā Business Continuity Plan, Security Plan, Secure Development Practices
Information security in project management ā Security Plan, Employment Conditions & Company Policies, Secure Development Practices
Inventory of information and other associated assets ā Security Plan, Secure Development Practices
Acceptable use of information and other associated assets ā Security Plan
Return of assets ā Security Plan
Classification of information ā Security Plan
Labelling of information ā Security Plan
Information transferā Security Plan, Security Framework, GDPR Compliance
Access control ā Security Plan, Account and Identity Security
Identity management ā Security Plan, Account and Identity Security
Authentication information ā Security Plan, Account and Identity Security
Access rights ā Security Plan, Account and Identity Security
Information security in supplier relationships ā Security Plan, Employment Conditions & Company Policies
Addressing information security within supplier agreements ā Security Plan
Managing information security in the ICT supply chain ā Security Plan, Servitly Privacy Management
Monitoring, review, and change management of supplier services ā Security Plan
Information security for the use of cloud services ā Business Continuity Plan, Security Plan
Information security incident management planning and preparation ā Security Plan, Data Processor Agreement
Assessment and decision on information security eventsā Business Continuity Plan, Security Plan, Secure Development Practices
Response to information security incidents ā Business Continuity Plan, Disaster Recovery Plan, Data Processor Agreement
Learning from information security incidents ā Security Plan
Collection of evidenceā Security Plan
Information security during disruption ā Security Plan, Continuous Improvements
ICT readiness for business continuity ā Business Continuity Plan, Security Plan, Secure Development Practices
Legal, statutory, regulatory, and contractual requirements ā Employment Conditions & Company Policies
Intellectual Property Rights ā Employment Conditions & Company Policies, Terms and Conditions
Protection of records ā Security Plan, Data Isolation
Privacy and protection of personally identifiable information (PII) ā Security Plan, Account and Identity Security, GDPR Compliance
Independent review of information security ā Security Plan, Continuous Improvements
Compliance with policies, rules, and standards for information security ā Security Plan
Documented operating procedures ā Security Plan
A.6 ā People Controls
Screening ā Security Plan
Terms and conditions of employment ā Security Plan
Information security awareness, education, and training ā Security Plan, Employment Conditions & Company Policies, Continuous Improvements
Disciplinary process ā Security Plan
Responsibilities after termination or change of employment ā Security Plan
A.7 ā Physical Controls
Physical security perimeters ā Business Continuity Plan, Security Plan
Physical entry controls ā Business Continuity Plan, Security Plan
Securing offices, rooms, and facilities ā Business Continuity Plan
Physical security monitoring ā Business Continuity Plan
Protection against physical and environmental threats ā Business Continuity Plan, Security Plan
Working in secure areas ā Business Continuity Plan, Security Plan
Clear desk and clear screen ā Business Continuity Plan, Security Plan
Equipment siting and protection ā Security Plan
Security of assets off-premises ā Security Plan
Storage media ā Security Plan
Supporting utilities ā Business Continuity Plan, Security Plan
Cabling security ā Business Continuity Plan, Security Plan
Equipment maintenance ā Security Plan
Secure disposal or re-use of equipment ā Security Plan
A.8 ā Technological Controls
Endpoint User Devices ā Security Plan
Privileged Access Rights ā Security Plan, Account and Identity Security
Information Access Restriction ā Security Plan, Employment Conditions & Company Policies, Account and Identity Security
Access to Source Code ā Employment Conditions & Company Policies, Security Plan
Secure Authentication ā Employment Conditions & Company Policies, Account and Identity Security
Capacity Management ā Security Plan, Scalability, SLA (Service Level Agreement)
Protection Against Malware ā Security Plan
Management of Technical Vulnerabilities ā Security Plan, Secure Development Practices
Configuration Management āSecurity Plan, DPS Configuration Console
Information Deletion ā Security Plan, Rights for Individuals
Data Masking ā Data Masking and Filtering
Data Leakage Prevention ā Employment Conditions & Company Policies
Information Backup ā Disaster Recovery Plan
Redundancy of Information Processing Facilities ā Business Continuity Plan, Disaster Recovery Plan, DPS Architecture
Logging ā Security Plan, Account and Identity Security
Monitoring Activities ā Monitoring and Logging
Clock Synchronization ā Microservices
Use of Privileged Utility Programs ā Security Plan
Installation of Software on Operational Systems ā Secure Development Practices
Network Security ā Architectural Security
Security of Network Services ā Architectural Security
Segregation of Networks ā Architectural Security
Web Filtering ā Architectural Security
Use of Cryptography ā Disaster Recovery Plan, REST API Security, IoT Connectors Security, Secure Development Practices
Secure Development Life Cycle ā Secure Development Practices, SLA (Service Level Agreement)
Application Security Requirements ā Secure Development Practices
Secure System Architecture and Engineering Principles ā Secure Development Practices
Secure Coding ā Secure Development Practices
Security Testing in Development and Acceptance ā Secure Development Practices
Outsourced Development ā NOT in place