Information Security Policy
Introduction
This document defines the information security policy of Vertic Pty Ltd.
As a modern, forward-looking business, Vertic Pty Ltd recognises at senior levels the need to ensure that its business operates smoothly and without interruption for the benefit of its customers, shareholders and other stakeholders.
In order to provide such a level of continuous operation, Vertic Pty Ltd has implemented an Information Security Management System (ISMS) in line with the International Standard for Information Security, ISO/IEC 27001. This standard defines the requirements for an ISMS based on internationally recognised best practice.
The operation of the ISMS has many benefits for the business, including:
Protection of revenue streams and company profitability
Ensuring the supply of goods and services to customers
Compliance with legal and regulatory requirements
Vertic Pty Ltd has decided to maintain full certification to ISO/IEC 27001 in order that the effective adoption of information security best practice may be validated by an independent third party, a Registered Certification Body (RCB).
This policy applies to all systems, people and processes that constitute the organisation’s information systems, including board members, directors, employees, suppliers and other third parties who have access to Vertic Pty Ltd systems.
The following supporting documents are relevant to this information security policy and provide additional information about how it is applied:
Risk Assessment and Treatment Process
Statement of Applicability
Supplier Information Security Evaluation Process
Internet Acceptable Use Policy
Cloud Computing Policy
Mobile Device Policy
Access Control Policy
User Access Management Process
Physical Security Policy
Anti-Malware Policy
Software Policy
Technical Vulnerability Management Policy
Privacy and Personal Data Protection Policy
Details of the latest version number of each of these documents is available from the ISMS Documentation Log.
Information security policy
Information security requirements
A clear definition of the requirements for information security within Vertic Pty Ltd will be agreed and maintained with the internal business so that all ISMS activity is focussed on the fulfilment of those requirements. Statutory, regulatory and contractual requirements will also be documented and input to the planning process. Specific requirements about the security of new or changed systems or services will be captured as part of the design stage of each project.
It is a fundamental principle of the Vertic Pty Ltd Information Security Management System that the controls implemented are driven by business needs and this will be regularly communicated to all staff through team meetings and briefing documents.
Framework for setting objectives
A regular cycle will be used for the setting of objectives for information security, to coincide with the budget planning cycle. This will ensure that adequate funding is obtained for the improvement activities identified. These objectives will be based upon a clear understanding of the business requirements, informed by the management review process during which the views of relevant interested parties may be obtained.
Information security objectives will be documented for an agreed time period, together with details of how they will be achieved. These will be evaluated and monitored as part of management reviews to ensure that they remain valid. If amendments are required, these will be managed through the change management process.
In accordance with ISO/IEC 27001 the reference controls detailed in Annex A of the standard will be adopted where appropriate by [Organization Name]. These will be reviewed on a regular basis in the light of the outcome from risk assessments and in line with information security risk treatment plans. For details of which Annex A controls have been implemented and which have been excluded please see the Statement of Applicability.
Continual improvement of the ISMS
Vertic Pty Ltd policy regarding continual improvement is to:
Continually improve the effectiveness of the ISMS
Enhance current processes to bring them into line with good practice as defined within ISO/IEC 27001 and related standards
Achieve ISO/IEC 27001 certification and maintain it on an on-going basis
Increase the level of proactivity (and the stakeholder perception of proactivity) with regard to information security
Make information security processes and controls more measurable in order to provide a sound basis for informed decisions
Review relevant metrics on an annual basis to assess whether it is appropriate to change them, based on collected historical data
Obtain ideas for improvement via regular meetings and other forms of communication with interested parties
Review ideas for improvement at regular management meetings in order to prioritise and assess timescales and benefits
Ideas for improvements may be obtained from any source including employees, customers, suppliers, IT staff, risk assessments and service reports. Once identified they will be recorded and evaluated as part of management reviews.
Information security policy areas
[Organization Name] defines policy in a wide variety of information security-related areas which are described in detail in a comprehensive set of policy documentation that accompanies this overarching information security policy.
Each of these policies is defined and agreed by one or more people with competence in the relevant area and, once formally approved, is communicated to an appropriate audience, both within and external to, the organization.
The table below shows the individual policies within the documentation set and summarises each policy’s content and the target audience of interested parties.
POLICY TITLE | AREAS ADDRESSED | TARGET AUDIENCE |
Internet Acceptable Use Policy | Business use of the Internet, personal use of the Internet, Internet account management, security and monitoring and prohibited uses of the Internet service. | Users of the Internet service |
Cloud Computing Policy | Due diligence, signup, setup, management and removal of cloud computing services. | Employees involved in the procurement and management of cloud services |
Mobile Device Policy | Care and security of mobile devices such as laptops, tablets and smartphones, whether provided by the organization for business use. | Users of company-provided mobile devices |
Access Control Policy | User registration and deregistration, provision of access rights, external access, access reviews, password policy, user responsibilities and system and application access control. | Employees involved in setting up and managing access control |
Anti-Malware Policy | Firewalls, anti-virus, spam filtering, software installation and scanning, vulnerability management, user awareness training, threat monitoring and alerts, technical reviews and malware incident management. | Employees responsible for protecting the organisation’s infrastructure from malware |
Software Policy | Purchasing software, software registration, installation and removal, in-house software development and use of software in the cloud. | All employees |
Social Media Policy | Guidelines for how social media should be used when representing the organization and when discussing issues relevant to the organization. | All employees |
HR Security Policy | Recruitment, employment contracts, policy compliance, disciplinary process, termination | All employees |
Acceptable Use Policy | Employee commitment to organisational information security policies. | All employees |
Table 1: Set of policy documents
Application of information security policy
The policy statements made in this document and in the set of supporting policies listed in Table 1 have been reviewed and approved by the top management of [Organization Name] and must be complied with. Failure by an employee to comply with these policies may result in disciplinary action being taken in accordance with the organisation’s Employee Disciplinary Process.
Questions regarding any Vertic Pty Ltd policy should be addressed in the first instance to the employee’s immediate line manager.