This page outlines the required Statement of Applicabilty
and all relevant links to the required documents/samples/templates/evidence.
Information security management systems: Requirements
AREA/SECTION | CONTROL | CONTROL APPLICABLE? | CONTROL IMPLEMENTED? | JUSTIFICATION FOR INCLUSION OR EXCLUSION | ||||||||
A.5 Information security policies | ||||||||||||
A.5.1 Management direction for information security | Yes | Yes | ||||||||||
A.5.1.2 Review of the policies for information security | Yes | Yes | ||||||||||
Totals: | 2 | 2 | ||||||||||
A.6 Organisation of information security | ||||||||||||
A.6.1 Internal organisation | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.6.2 Mobile devices and teleworking | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Totals: | 4 | 3 | ||||||||||
A.7 Human resources security | ||||||||||||
A.7.1 Prior to employment | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
A.7.2 During employment | Yes | Yes | ||||||||||
A.7.2.2 Information security awareness, education and training | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
A.7.3 Termination and change of employment | A.7.3.1 Termination or change of employment responsibilities | Yes | Yes | |||||||||
Totals: | 6 | 4 | ||||||||||
A.8 Asset management | ||||||||||||
A.8.1 Responsibility for assets | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.8.2 Information classification | Yes | Yes | ||||||||||
Yes | Yes | Asset Management Policy - Restricted, Protected, Confidential (Internal Use) | ||||||||||
Yes | Yes | |||||||||||
A.8.3 Media Handling | No | No | We don't manage removable media; everything is stored in cloud-based services.Yes | Yes | ||||||||
Yes | Yes | |||||||||||
NoYes | No | We don't currently transfer any physical media. | Yes | |||||||||
Totals: | 4 | 4 | ||||||||||
A.9 Access control | ||||||||||||
A.9.1 Business requirements of access control | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
A.9.2 User access management | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.9.2.4 Management of secret authentication information of users | Yes | Yes | ||||||||||
Yes | No | |||||||||||
Yes | Yes | |||||||||||
A.9.3 User responsibilities | Yes | Yes | ||||||||||
A.9.4 System and application access control | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Totals: | 12 | 11 | ||||||||||
A.10 Cryptography | ||||||||||||
A.10.1 Cryptographic controls | A.10.1.1 Policy on the use of cryptographic controls | No | No | Do we encrypt any data? | ||||||||
A.10.1.2 Key managementNo | No | Do we encrypt any data?No | ||||||||||
Totals: | 0 | 0 | ||||||||||
A.11 Physical and environmental security | ||||||||||||
A.11.1 Secure areas | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.11.1.4 Protecting against external and environmental threats | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.11.2 Equipment | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Yes | YesAll equipment is maintained according to manufacturers' instructions. | |||||||||||
Yes | Yes | |||||||||||
Yes | Yes | Assets are often used offsite in a home environment. | ||||||||||
Yes | Yes | Secure disposal is in place with a third party. | Yes | Yes | Training has been provided to ensure that screens and equipment are locked when unattended. What are the parameters of securing devices (ie. screensaver) | |||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
Totals: | 7 | 7 | ||||||||||
A.12 Operations security | ||||||||||||
A.12.1 Operational procedures and responsibilities | Yes | Yes | Procedures must be performed the same way each time to avoid accidents. | |||||||||
Yes | Yes | |||||||||||
Yes | YesCapacity of key resources is monitored. | |||||||||||
A.12.1.4 Separation of development, testing and operational environments | Yes | YesConsistent approach to Software Development is essential to Vertic's success. | ||||||||||
A.12.2 Protection from malware | Yes | Yes | Anti-malware is in place and monitored from a central console within the Salesforce platform. | Yes | ||||||||
A.12.3 Backup | Yes | Yes | The Salesforce digital platform provides this service directly to our clients (via third-party applications). Action: Reference cloud provider backup services. | |||||||||
A.12.4 Logging and monitoring | Yes | YesThe Salesforce digital platform provides this service directly to our clients (via third-party applications). | ||||||||||
Yes | Yes | This does not apply to Vertic as event logs are captured directly within the Salesforce platform.Yes | ||||||||||
Yes | YesAll such access is recorded. | |||||||||||
Yes | Yes | |||||||||||
A.12.5 Control of operational software | Yes | Yes | Software installation is planned and controlled. | |||||||||
A.12.6 Technical vulnerability management | Yes | Yes | ||||||||||
A full patching process is in place via recurring Salesforce Health Checks.A.12.6.2 Restrictions on software installation | Yes | YesAdmin access is required to install software. | ||||||||||
A.12.7 Information systems audit considerations | Yes | YesAudits are planned so that business activities are not disrupted. | ||||||||||
Totals: | 11 | 9 | ||||||||||
A.13 Communications security | ||||||||||||
A.13.1 Network security management | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | |||||||||||
A.13.2 Information transfer | Yes | YesWe conduct ourselves within the frameworks of the software tools we use, like Atlassian. | ||||||||||
Yes | Yes | |||||||||||
Yes | YesThere is significant use of email and instant messaging. | |||||||||||
Yes | Yes | NDAs should be in place with all parties with whom we share personal data. | ||||||||||
Totals: | 3 | 3 | ||||||||||
A.14 System acquisition, development and maintenance | ||||||||||||
A.14.1 Security requirements of information systems | A.14.1.1 Information security | Yes | YesSecurity requirements are specified for all new or changed systems. | |||||||||
Yes | Yes | TLS is used in all circumstances as per the Salesforce platform. | ||||||||||
Yes | Yes | TLS is used in all circumstances as per the Salesforce platform. | Yes | |||||||||
A.14.2 Security in development and support processes | Yes | Yes | All software development is undertaken in accordance with Salesforce guidelines and development processes. | |||||||||
Yes | Yes | |||||||||||
A.14.2.3 Technical review of applications after operating platform changes | Yes | Yes | Reviews are conducted as part of acceptance testing of new systems. | |||||||||
Yes | Yes | |||||||||||
Yes | Yes | Yes | Yes | We are developing on top of the Salesforce platform and are limited and directed by their Secure system engineering principles. | Yes | Yes | ||||||
A.14.2.7 Outsourced 6 Secure development environment | Yes | YesWe outsource some of the technical software development to an outsourcing firm which exclusively delivers to Vertic under the same rules, regulations, and processes as Vertic. | ||||||||||
Yes | Yes | |||||||||||
Yes | Yes | New and changed systems are tested to check they meet security requirements. | Yes | |||||||||
Yes | YesNew and changed systems are tested to check they meet security requirements. | |||||||||||
A.14.3 Test data | Yes | Yes | We don’t handle data in production environments. Put this into the referenced policy. | |||||||||
Totals: | 11 | 11 | ||||||||||
A.15 Supplier relationships | ||||||||||||
A.15.1 Information security in supplier relationships | A.15.1.1 Information security policy for supplier relationships | No | No | Vertic does not use an external providers in relation to our client services.Yes | Yes | |||||||
No | No | Vertic does not use an external providers in relation to our client services.Yes | Yes | |||||||||
A.15.1.3 Information and communication technology supply chain | NoYes | No | Vertic does not use an external providers in relation to our client services. | Yes | ||||||||
A.15.2 Supplier service delivery management | No | No | Vertic does not use an external providers in relation to our client services.Yes | Yes | ||||||||
NoYes | No | Vertic does not use an external providers in relation to our client services. | Yes | |||||||||
Totals: | 0 | 0 | ||||||||||
A.16 Information security incident management | ||||||||||||
A.16.1 Management of information security incidents and improvements | Yes | Yes | An incident response procedure is in place.Yes | |||||||||
Yes | YesThis is addressed as part of awareness training. | |||||||||||
Yes | Yes | This is addressed via our Risk Submission Form. | ||||||||||
A.16.1.4 Assessment of and decision on information security events | Yes | Yes | Systems and procedures are used to assess events and raise incidents where appropriate. | A.16.1.5 Response to information security incidents | Yes | Yes | Training in incident response has been carried out. | A.16.1.6 Learning from information security incidents | Yes | Yes | ||
A review is part of the procedure./wiki/spaces/SCA/pages/445776488 | Yes | Yes | ||||||||||
Yes | Yes | |||||||||||
Yes | YesWe document all incident evidence via our Atlassian system. | |||||||||||
Totals: | 7 | 7 | ||||||||||
A.17 Information security aspects of business continuity management | ||||||||||||
A.17.1 Information security continuity | Yes | Yes | Security is considered as part of the business continuity plan. | |||||||||
Yes | YesSecurity is considered as part of the business continuity plan. | |||||||||||
A.17.1.3 Verify, review and evaluate information security continuity | Yes | No | Testing the plan is essential.Yes | |||||||||
A.17.2 Redundancies | No | No | We don't manage our own infrastructure and are using Salesforce's services to manage information processing.Yes | Yes | ||||||||
Totals: | 3 | 2 | ||||||||||
A.18 Compliance | ||||||||||||
A.18.1 Compliance with legal and contractual requirements | A.18.1.1 Identification of applicable legislation and contractual requirements | Yes | YesAll applicable legislation and requirements from contracts have been identified. | |||||||||
Yes | Yes | A policy on the use and protection of IP has been agreed and communicated. | Yes | Yes | ||||||||
Yes | Yes | Records are protected effectively. | ||||||||||
A.18.1.4 Privacy and protection of personally identifiable information | Yes | Yes | ||||||||||
A data protection policy is in place.A.18.1.5 Regulation of cryptographic controls | No | NoCompliance has been reviewed deemed not applicable to Vertic. | ||||||||||
A.18.2 Information security reviews | Yes | YesAuditors are used to review our information security approach. | ||||||||||
Yes | Yes | Managers have received training in ensuring compliance. | ||||||||||
Yes | YesThis will be part of Vertic’s annual compliance review. | |||||||||||
Totals: | 7 | 7 |