Skip to content
English
  • There are no suggestions because the search field is empty.

Information Security Policy

1.  Contents

1.      Contents. 1

2.      Information security management system policy and objectives. 3

3.      Information security management system objectives. 4

4.      Information security management system manual 4

Scope. 5

The context of the organization. 5

Information security management system structure. 7

Roles and responsibilities. 8

Top management: 8

Information security manager: 8

Risk manager: 9

Information asset owners: 9

System administrators: 10

Internal auditors: 10

User managers. 10

Employees and users: 11

Compliance Manager: 11

Normative references. 12

Definitions, terms and abbreviations. 12

5.      Risk management 13

Information security risk management 13

Risk register and treatment plan. 14

Corporate risk management 14

Business continuity management 14

Statement of applicability. 15

6.      Control procedures and policies. 15

Access control policy. 15

Authorization. 15

Identification and authentication. 16

Data integrity. 16

Transmission security. 17

Remote access (BYOD and teleworking policy) 17

Physical access. 18

Emergency access. 19

Access control review.. 19

User access management policy. 19

Password policy. 20

Encryption and cryptography. 20

IT asset classification and handling policy. 20

Information assets. 20

Information classification policy. 21

IT assets. 21

Acceptable information technology infrastructure and resource use policy. 21

Information security incident management 21

Physical and environmental security. 21

Clean desk and screen policy. 22

E-mail policy. 23

Virus protection. 23

Backup policy. 24

Backup and recovery testing. 24

Configuration management 25

Network management 26

7.      Documents and records control management 28

8.      Training and awareness documentation. 29

Training and personal development policy. 29

Security training policy. 29

9.      Internal audit and review.. 29

Internal audit: 29

Management review: 30

10.   Incident recording, monitoring, and mitigation. 31

11.   Continual improvement 32

Nonconformity and corrective action. 33

12.   Documented information on ISMS performance. 34

13.   Legal and regulatory compliance. 35

Personal data protection policy. 36

Anti-bribery and anti-corruption policy. 36

Background check policy. 36

Code of conduct 36

14.   Communication and reporting. 37

 

 

2.  Information security management system policy and objectives

At Exponam, we are committed to ensuring the confidentiality, integrity, and availability of information  within our scope of software development, systems integration, computer programming consultancy,  and related activities. This policy establishes the framework for our information security management  system (ISMS) to protect our assets and meet the requirements of ISO/IEC 27001:2022. It is the ISMS of Exponam that information, as defined hereinafter, in all its forms - written, spoken,  recorded electronically, or printed – will be protected from accidental or intentional unauthorized  modification, destruction or disclosure throughout its life cycle. This protection includes an  appropriate level of security over the equipment and software used to process, store, and transmit  that information.

This policy will be communicated to all employees, contractors, and relevant stakeholders. It will be  made available to interested parties upon request.

This policy will be reviewed annually or as needed to ensure its continuing suitability, adequacy, and  effectiveness.

3.  Information security management system objectives

These general objectives provide a comprehensive framework for building and maintaining an  effective ISMS. They serve as a foundation upon which specific security controls and measures can be  implemented to address the unique risks and requirements of an organization.

Our primary information security objectives are:

● Confidentiality: To ensure that sensitive information is accessible only to authorized  individuals.

● Integrity: To safeguard the accuracy and completeness of information and processing  methods.

● Availability: To ensure that information and information processing facilities are available  when needed.

We are committed to complying with all applicable legal and regulatory requirements related to  information security in the jurisdiction where we operate.

We will conduct regular risk assessments to identify, evaluate, and prioritize information security risks.  Appropriate controls will be implemented to mitigate these risks to an acceptable level. Roles and responsibilities for information security will be defined, communicated, and documented.  All employees, contractors, and third-party entities with access to our information assets will be made  aware of their responsibilities.

We will provide ongoing training and awareness programs to ensure that all employees and relevant  stakeholders are aware of information security risks, policies, and procedures.

Access to information and information processing facilities will be controlled based on business  requirements and the principle of least privilege. Access rights will be reviewed and updated regularly. We will integrate security measures into the software development and systems integration  processes, including secure coding practices, vulnerability assessments, and penetration testing.

We will establish and maintain procedures for reporting, assessing, and responding to information  security incidents. Lessons learned will be used to improve our security posture.

We will monitor the effectiveness of our ISMS through regular performance measurement, internal  audits, and management reviews.

We are committed to continually improving our ISMS to adapt to changing business needs, emerging  threats, and technological advancements.

4.  Information security management system manual

This section describes in more detail document scope, context of the organization, information  security management system structure, roles and responsibilities and normative references.

Scope

The scope of ISMS includes information security to protect the confidentiality, integrity, and  availability of information.

ISMS in the scope of this document is meant as a compilation of all the various policies which are  included in the document as well as referencing to all separate external full-bodied sections to manage  information security in accordance with ISO/IEC 27001:2022. It stands for establishing, implementing,  maintaining and continually improving ISMS, so it is up to date, is in accordance with organization and  its context, as well as interested parties - is corresponding with actual business plans or needs and is  fully integrated into the processes and business activities of the organization.

ISMS documentation describes how data, assets and security is managed and secured, how employees  are trained, who is responsible for what information, processes and procedures, how this  documentation is continually updated and approved with management to keep an ever-evolving ISMS  and be able to respond to all new emerging threats and vulnerabilities.

The framework for managing information security described in this document applies to all Exponam  involved persons and all involved systems throughout Exponam.

This policy and all standards apply to all protected health information and other classes of protected  information in any form as defined in 6.2.2. Information classification policy.

The scope of the Information Security Management System (ISMS) encompasses the provision of  services in the areas of Software Development, Systems Integration, Computer Programming  Consultancy, and related activities. This includes all processes, technologies, and personnel associated  with these services within our organization.

This scope is defined to ensure the confidentiality, integrity, and availability of sensitive information,  both belonging to our organization and entrusted to us by our clients and stakeholders. By establishing  and maintaining a robust ISMS, we aim to safeguard the interests of all parties involved and uphold  the highest standards of information security.

The context of the organization

● Company background:

Exponam was founded in 2017 to solve problems with modern data via innovative software solutions.  The company is based in New Hampshire with operations in Portsmouth NH and New York.

● Interested Parties and Their Relevant Requirements:

○ Clients/Customer Organizations

Relevant Requirements:

Clients almost always have individual requirements additionally to any available  standards, therefore Exponam ISMS policies are prepared in a modular way, linked to  ISMS as external documents - to be able to deliver just the required separate policy  or procedure not the whole documentation.

Addressed through ISMS:

Implementation of robust access controls, encryption, and secure coding practices.

Adherence to industry-specific security standards (e.g., ISO 27001).

○ Regulatory Authorities

Relevant Requirements:

Compliance with applicable data protection and privacy laws.

Reporting of security incidents and breaches.

Addressed through ISMS:

Regular risk assessments and compliance audits.

Incident response and reporting procedures.

○ Legal Counsel

Relevant Requirements:

Adherence to contractual obligations and legal requirements.

Addressed through ISMS:

Clearly defined policies and procedures aligned with legal and contractual obligations.

Regular legal review to ensure compliance.

○ Employees and Contractors

Relevant Requirements:

Awareness and training on security policies and procedures.

Access to information necessary for their role.

Addressed through ISMS:

Employee awareness and training programs.

Role-based access controls and regular access reviews.

○ Third-Party Vendors and Suppliers

Relevant Requirements:

Security of shared data and information.

Adherence to security standards and practices.

Addressed through ISMS:

Vendor risk assessments and due diligence.

Contractual clauses define security expectations.

○ Internal Stakeholders (Management, Board of Directors)

Relevant Requirements:

Assurance of information security practices.

Oversight of compliance and risk management.

Addressed through ISMS:

Regular reporting and communication on ISMS effectiveness.

Executive support and allocation of resources for ISMS.

○ Industry Partners and Associations

Relevant Requirements:

Adherence to industry-specific security standards and best practices.

Addressed through ISMS:

Active participation in industry forums and compliance with industry standards.

Information security management system structure

The organization of information security is the foundational structure and framework put in place  within Exponam to proficiently manage all aspects of information security practices. This comprehensive system ensures that sensitive information is handled with the utmost care and in  compliance with industry-leading standards.

● Information Security Management System (ISMS):

At Exponam, we have established an all-encompassing Information Security Management  System (ISMS) that is meticulously designed, implemented, maintained, and continuously  improved in strict adherence to the latest ISO/IEC 27001:2022 standards. This internationally  recognized framework serves as the backbone of our information security practices, providing  a robust structure for safeguarding sensitive data.

● Enhancing Accessibility and Oversight:

This centralized approach significantly enhances accessibility, allowing authorized personnel  to swiftly locate and refer to pertinent policies. Moreover, it facilitates greater oversight,  enabling us to monitor adherence to established policies and promptly address any deviations  or emerging risks.

● Strengthening ISMS Effectiveness:

By leveraging this centralized document control system, we fortify the effectiveness of our  ISMS. It streamlines processes, minimizes the risk of information security breaches, and  fosters a culture of security awareness and compliance across the organization.

● Continuous Improvement:

Our commitment to information security extends beyond implementation. We are dedicated  to an ongoing cycle of evaluation, enhancement, and refinement of our ISMS, ensuring that it  remains at the forefront of industry best practices.

Roles and responsibilities

Exponam has defined the following Information security related roles and responsibilities.

Top management:

Role: This includes the organization's executives and senior leaders who have the ultimate  responsibility for the ISMS.

Responsibilities:

Demonstrating leadership and commitment to information security (Clause 5.1).

Establishing the information security policy and objectives (Clause 5.2).

Providing the necessary resources for the ISMS (Clause 7.1).

Information security manager:

Role: The information security manager oversees the development, implementation, and  maintenance of the ISMS.

Responsibilities:

Coordinating and managing the ISMS implementation (Clause 6.2).

Ensuring compliance with ISO/IEC 27001 requirements (Clause 4.3).

Conducting risk assessments and defining security controls (Clause 6.1).

The ISM or ISO for each entity is responsible for working with user management, owners,  custodians, and users to develop and implement prudent security policies, procedures, and  controls, subject to the approval of Exponam. Specific responsibilities include:

● Ensuring security policies, procedures, and standards are in place and adhered to by  entity.

● Providing basic security support for all systems and users.

● Advising owners in the identification and classification of computer resources. See  Section VI Information Classification.

● Advising systems development and application owners in the implementation of  security controls for information on systems, from the point of system design, through  testing and production implementation.

● Educating custodian and user management with comprehensive information about  security controls affecting system users and application systems.

● Providing on-going employee security education.

● Performing security audits.

● Reporting regularly to the Exponam Oversight Committee on the entity's status  regarding information security.

Risk manager:

Role: The risk manager is responsible for identifying, assessing, and managing risks to  information assets.

Responsibilities:

Conducting regular risk assessments and vulnerability scans (Clause 6.1.2).

Identifying potential threats and vulnerabilities (Clause 6.1.3).

Recommending and implementing risk mitigation measures (Clause 6.1.3).

Information asset owners:

Role: Information asset owners are responsible for specific information assets within the  organization.

Responsibilities:

Determining the classification and labeling of information assets (Clause 7.2).

Defining access controls and permissions for their respective assets (Clause 7.2).

Ensuring compliance with security policies and controls (Clause 7.2).

The owner of a collection of information is usually the manager responsible for the creation  of that information or the primary user of that information. This role often corresponds with  the management of an organizational unit. In this context, ownership does not signify  proprietary interest, and ownership may be shared. The owner may delegate ownership  responsibilities to another individual by completing the Exponam Information Owner  Delegation Form. The owner of information has the responsibility for:

● Knowing the information for which she/he is responsible.

● Determining a data retention period for the information, relying on advice from the  legal department.

● Ensuring appropriate procedures are in effect to protect the integrity, confidentiality,  and availability of the information used or created within the unit.

● Authorizing access and assigning custodianship.

● Specifying controls and communicating the control requirements to the custodian and  users of the information.

● Reporting promptly to the information security manager the loss or misuse of Exponam  Information.

● Initiating corrective actions when problems are identified.

● Promoting employee education and awareness by utilizing programs approved by the  ISM, where appropriate.

● Following existing approval processes within the respective organizational unit for the  selection, budgeting, purchase, and implementation of any computer  system/software to manage information.

System administrators:

Role: System administrators manage and maintain information systems and networks. Responsibilities:

Implementing and enforcing security controls on systems and networks (Clause 8.1).

Conducting regular system audits and vulnerability assessments (Clause 8.1).

Ensuring the timely application of security patches and updates (Clause 8.1).

Internal auditors:

Role: Internal auditors are responsible for conducting periodic audits to assess the  effectiveness of the ISMS.

Responsibilities:

Planning and conducting internal audits of the ISMS (Clause 9.2).

Reporting audit findings and recommending corrective actions (Clause 9.2).

Monitoring the implementation of corrective actions (Clause 9.2).

User managers

Exponam management who supervise users as defined below. User management is responsible  for overseeing their employees' use of information, including: 

● Reviewing and approving all requests for their employees’ access authorizations.

● Initiating security change requests to keep employees' security record current with  their positions and job functions.

● Promptly informing appropriate parties of employee terminations and transfers, in  accordance with local entity termination procedures.

● Revoking physical access to terminated employees, i.e., confiscating keys, keycards,  changing combination locks, etc.

● Providing employees with the opportunity for training needed to properly use the  computer systems.

● Reporting promptly to the ISO the loss or misuse of Exponam information.

● Initiating corrective actions when problems are identified.

● Following existing approval processes within their respective organization for the  selection, budgeting, purchase, and implementation of any computer  system/software to manage information.

Employees and users:

Role: All employees and users within the organization have a role to play in maintaining  information security.

Responsibilities:

Following security policies and procedures (Clause 7.3).

Reporting security incidents or vulnerabilities promptly (Clause 10.1).

Participating in security awareness and training programs (Clause 7.2).

The user is any person who has been authorized to read, enter, or update information. A user  of information is expected to:

● Access information only in support of their authorized job responsibilities.

● Comply with Information Security Policies and Standards and with all controls  established by the owner and custodian.

● Keep personal authentication devices (e.g. passwords, SecureCards, PINs, etc.)  confidential.

● Report promptly to the ISO the loss or misuse of Exponam information.

● Initiate corrective actions when problems are identified. 

Compliance Manager:

Role: The compliance manager ensures that the organization adheres to all relevant legal and  regulatory requirements related to information security.

Responsibilities:

Monitoring changes in regulations and standards (Clause 4.2).

Ensuring that the ISMS remains compliant with ISO/IEC 27001 (Clause 4.3).

Coordinating with legal and regulatory bodies as necessary (Clause 4.2).

Normative references

1. ISO/IEC 27001:2022 - Information security, cybersecurity, and privacy protection -Information  security management system - Requirements.

2. ISO/IEC 27000:2018 - Information Technology - Security Techniques - Information security  management system - overview and vocabulary

3. ISO/IEC 27002:2022 - Information security, cybersecurity, and privacy protection -Information  security controls

4. ISO/IEC 27003:2017 - Information technology security techniques Information security  management systems guidance

5. ISO/IEC 27004:2016 - Information technology security techniques Information security  management monitoring, measurement, analysis and evaluation

6. ISO/IEC 27005:2022 - Information security, cybersecurity and privacy protection - Guidance  on managing information security risks

7. ISO 31000:2018 - Risk management guidelines

8. ISO/IEC 27001:2002 - Annex A Controls

Definitions, terms and abbreviations

Confidentiality: Data or information is not made available or disclosed to unauthorized persons or  processes.

Integrity: Data or information has not been altered or destroyed in an unauthorized manner. Availability: Data or information is accessible and usable upon demand by an authorized person. Involved persons: Every worker at Exponam – no matter what their status. This includes residents,  students, employees, contractors, consultants, temporary workers, volunteers, interns, etc.

Involved systems: All computer equipment and network systems that are operated within the  Exponam environment. This includes all platforms (operating systems), all computer sizes (personal  digital assistants, desktops, mainframes, etc.), and all applications and data (whether developed in house or licensed from third parties) contained on those systems.

Risk: The probability of a loss of confidentiality, integrity, or availability of information resources.  Information resources (IR): Any and all computer printouts, online display devices, magnetic storage  media, and all computer-related activities involving any device capable of receiving email, browsing  Websites, or otherwise capable of receiving, storing, managing, or transmitting electronic data  including, but not limited to, mainframes, servers, personal computers, notebook computers, hand held computers, personal digital assistants (PDA), pagers, distributed processing systems,  telecommunication resources, network environments, telephones, fax machines, printers and service  bureaus. Additionally, it is the procedures, equipment, facilities, software, and data that are designed,  built, operated, and maintained to create, collect, record, process, store, retrieve, display, and  transmit information.

Information technology support and security (ITSS): Exponam IT department responsible for  information and technology security, computers, networking and data management.

Entity: Every separate Exponam company and location, team and department.

ISP: Information security policy.

ISO: Information security officer.

ISM, CISO: Information security manager or chief information security officer.

IT: Information technology.

ISMS: Information security management system.

Company: Exponam

AWS: Amazon web services

MFA: Multi factor authentication

OTP: One time password

5.  Risk management

● Risk assessment and treatment methodology: Describe the approach to identifying,  evaluating, and treating risks.

● Risk Register: Maintain a record of identified risks, their assessments, and treatment plans. ● Risk Treatment Plans: Provide specific details on how each identified risk will be addressed.

Information security risk management

● A comprehensive risk assessment of all Exponam information networks and systems will be  conducted at least annually or when significant changes occur within the organization, to  identify and document the threats and vulnerabilities to stored and transmitted information.  This process will also include a business impact analysis to determine the potential impact of  various threats on critical business functions.

● The risk assessment will analyze various types of threats – internal or external, natural or  manmade, electronic and non-electronic – that may affect the confidentiality, integrity, and  availability of information resources. The assessment will also evaluate the information assets  and the technology associated with their collection, storage, dissemination, and protection,  considering the specific requirements and compliance obligations for financial institutions.

● The risk assessment will document the existing vulnerabilities within each entity, which  potentially expose the information resource to identified threats. Based on the combination  of threats, vulnerabilities, and asset values, an estimate of the risks to the information's  confidentiality, integrity, and availability will be determined.

● The frequency of the risk assessments will be determined at the entity level, with a minimum  requirement of an annual assessment or when significant changes occur within the  organization.

● Based on the risk assessment outcomes, appropriate risk mitigation measures will be  implemented to reduce the impact of the threats by decreasing the amount and scope of the  vulnerabilities. Risk mitigation strategies may include technical, administrative, and physical  controls.

● Exponam will establish risk acceptance criteria to define the acceptable level of risk. Any risks  exceeding the defined risk acceptance criteria will be escalated to the appropriate  management level for review and decision-making.

● Regular monitoring and review of the effectiveness of implemented risk mitigation measures  will be conducted to ensure that they remain relevant and effective in addressing the  identified risks. The results of this monitoring will be reported to the ISO and other relevant  stakeholders. Risk management processes will be aligned with industry best practices, such as  the NIST Cybersecurity Framework and ISO/IEC 27001, and will be subject to regular reviews  and updates to ensure continuous improvement and adaptability to the evolving threat  landscape.

Risk register and treatment plan

Risk register and treatment plan is described in Exponam corporate risk log in this external document - refer to: “Corporate risk log”, available to the Risk Management.

Risk is identified and added to the risk log as described in 4.3. - Corporate risk management.

Corporate risk management

As the Company recognizes the importance of a structured approach to corporate risk management  and internal control, this policy is put in place to provide the framework to identify, assess, monitor,  and manage risks associated with the Company’s business.

Corporate Risk Management Policy has been described in this external document - refer to: “P030  Corporate Risk Management Policy”.

Business continuity management

The purpose of this business continuity plan is to prepare Exponam in the event of extended service outages  caused by factors beyond our control (e.g., natural disasters, man-made events), and to restore  services to the widest extent possible in a minimum time frame. All Exponam Consulting sites are  expected to implement preventive measures whenever possible to minimize operational disruptions  and to recover as rapidly as possible when a n incident occurs.

The plan identifies vulnerabilities and recommends necessary measures to prevent extended voice  communications service outages. It is a plan that encompasses all Exponam sites and  operations facilities.

Business Continuity Management has been described in this external document - refer to: “P011  Business Continuity and Disaster Recovery plan”.

Important aspect of risk management is ISMS itself - are processes and responsibilities unclear or is  there poor engagement of the top management or poor awareness of employees about IS or its  purpose, insufficient documentation or in contrary too detailed or complicated.

Also opportunities should be identified, for example cooperation with other companies regarding IS  or using ISMS to make changes in the company to achieve other benefits like enhanced productivity  or employee engagement.

Regarding all identified risks, the company should plan actions to avoid them and integrate those  actions into processes of the ISMS and evaluate how effective those actions are.

Statement of applicability

Statement of applicability and implementation status of ISO/IEC 27001:2022 Annex A controls has  been described in this external document - refer to: “Statement of applicability”, available to Risk  Management.

6.  Control procedures and policies

Access control policy

Physical and electronic access, Confidential and Internal information and computing resources is  controlled. To ensure appropriate levels of access for internal workers, a variety of security measures  will be instituted as recommended by the Information Security Officer and approved by Exponam.  Mechanisms to control access, Confidential and Internal information include (but are not limited to)  the following methods:

Authorization

Access will be granted on a “need to know” basis and must be authorized by the immediate  supervisor and application owner with the assistance of the ISO. Any of the following methods  are acceptable for providing access under this policy:

● Context-based access

Access control based on the context of a transaction (as opposed to being based on  attributes of the initiator or target). The “external” factors might include time of day,  location of the user, strength of user authentication, etc.

● Role-based access

An alternative to traditional access control models (e.g., discretionary or non

discretionary access control policies) that permits the specification and enforcement  of enterprise-specific security policies in a way that maps more naturally to an  organization’s structure and business activities. Each user is assigned to one or more  predefined roles, each of which has been assigned the various privileges needed to  perform that role.

● User-based access

A security mechanism used to grant users of a system access based upon the identity  of the user.

Identification and authentication

Unique user identification (user id) and authentication is required for all systems that maintain  or access Confidential and/or Internal Information. Users will be held accountable for all  actions performed on the system with their user id.

At least one of the following authentication methods must be implemented:

● strictly controlled passwords (5.1.10. - Password Policy),

● biometric identification, and/or

● tokens in conjunction with a PIN.

The user must secure his/her authentication control (e.g., password, token) such that it is  known only to that user and possibly a designated security manager.

An automatic timeout re-authentication must be required after a certain period of no activity  (maximum 15 minutes).

The user must log off or secure the system when leaving it.

MFA is mandatory for all systems where that is available. Google platform MFA setup and use  is explained in this external document - refer to: “20230525_Google Platform MFA setup and  user guide_v1”.

Data integrity

Exponam must be able to provide corroboration that Confidential and Internal Information has  not been altered or destroyed in an unauthorized manner. Listed below are some methods  that support data integrity:

● transaction audit

● checksums (file integrity)

● encryption of data in storage

● digital signatures

Transmission security

Technical security mechanisms must be put in place to guard against unauthorized access to  data that is transmitted over a communications network, including wireless networks. The  following features must be implemented: 

integrity controls and encryption, where deemed appropriate.

Remote access (BYOD and teleworking policy)

Access into Exponam network from outside will be granted using Exponam approved devices  and pathways on an individual user and application basis. All other network access options  are strictly prohibited. Further Confidential and/or Internal Information that is stored or  accessed remotely must maintain the same level of protection as information stored and  accessed within the Exponam network.

The purpose of this policy is to establish guidelines for employees who utilize their own  devices to work or bring them to work at the company office to ensure the security and  confidentiality of company data.

This policy applies to all employees who utilize their own devices to work.

● Employees are allowed to bring their own devices to work, including smartphones,  tablets, and laptops.

● It is not permitted to connect personally owned equipment to any network socket at  the work office. Personally owned devices should use the wireless network.

● Employees must not store any company information assets on their personal devices  unless authorized by the company or by signing remote work agreements or specified  by the license agreement. Company may require adding such devices to AppleSeeds  instance to partially manage Apple devices.

● Whenever possible, information asset storage must be provided by company cloud  services, rather than stored on individual computers locally. If that is not possible,  then the user is responsible also for information asset accessibility and integrity  ensuring data backup procedures are in place.

● Employees must ensure information asset integrity, whenever synchronization  between Employees and Company takes place, to ensure that the most current,  uncorrupted information or data is available.

● Information and data separation must be ensured between work and personal use by  using separate folders or user accounts.

● Employees must not share their devices with others, including family members or  friends.

● Employees must not download or install any unauthorized software or applications  on their devices.

● Employees must report any lost or stolen devices to the Information Services  immediately.

● Employees must understand and comply with all company policies and procedures  related to data security and confidentiality, as well as Information Classification and  Information Asset use.

● Employees are responsible for security and confidentiality regarding company data  and information assets and must perform actions that prevent unauthorized persons  accessing that data and information. 

● Employees must ensure that their devices are password protected and have up-to date antivirus software installed. 

● It is required to lock access to the computer when the Employee is away from it by  using screen-lock, signing-out or shutting down the computer.

Physical access

Access to areas in which information processing is carried out must be restricted to only  appropriately authorized individuals. 

File servers containing Confidential and/or Internal Information must be installed in a secure  area to prevent theft, destruction, or access by unauthorized individuals.

Workstations or personal computers (PC) must be secured against use by unauthorized  individuals. Local procedures and standards must be developed on secure and appropriate  workstation use and physical safeguards which must include procedures that will: 

● Position workstations to minimize unauthorized viewing of protected health  information.

● Grant workstation access only to those who need it in order to perform their job  function.

● Establish workstation location criteria to eliminate or minimize the possibility of  unauthorized access to protected health information.

● Use automatic screen savers with passwords to protect unattended machines.

Facility access controls must be implemented to limit physical access to electronic information  systems and the facilities in which they are housed, while ensuring that properly authorized  access is allowed. Local policies and procedures must be developed to address the following  facility access control requirements:

● Contingency Operations – Documented procedures that allow facility access in  support of restoration of lost data under the disaster recovery plan and emergency  mode operations plan in the event of an emergency.

● Facility Security Plan – Documented policies and procedures to safeguard the facility  and the equipment therein from unauthorized physical access, tampering, and theft.

● Access Control and Validation – Documented procedures to control and validate a  person’s access to facilities based on their role or function, including visitor control,  and control of access to software programs for testing and revision.

● Maintenance records – Documented policies and procedures to document repairs and  modifications to the physical components of the facility which are related to security  (for example, hardware, walls, doors, and locks).

Additional physical security policy has been described in this external document - refer to:  “P014 Physical Security Policy”. Physical access instruction has been described in this external  document - refer to: “Physical Access instructions_06012020”.

Emergency access

Each entity is required to establish a mechanism to provide emergency access to systems and  applications if the assigned custodian or owner is unavailable during an emergency.

Procedures must be documented to address:

● Authorization

● Implementation

● Revocation

If not stated otherwise by an individual, then by a chain of command PM or higher manager  may become a temporary owner during an emergency, however ISO or ISM should be notified  to properly record this as a probable security incident.

Access control review

Existing user accounts and access rights will be reviewed at least annually to detect dormant  accounts and accounts with excessive privileges by the System Administrator. Examples of  accounts with excessive privileges include: 

An active account assigned to external contractors, vendors or employees that no longer work  for the Institution. 

An active account with access rights for which the user’s role and responsibilities do not  require access. For example, users that do not have authority or responsibility to approve  expenses should not have access with approval permissions within a financial system.  System administrative rights or permissions (including permissions to change the security  settings or performance settings of a system) granted to a user who is not an administrator.  Unknown active accounts.

User access management policy

The purpose of this policy is to prevent unauthorized access to the Exponam’s information  systems. The policy describes the registration and de-registration process for all Exponam  information systems and services.

User Access Management Policy has been described in this external document - refer to:  “P019 User Access Management Policy”.

 Password policy

Password complexity, as well as password change, password confidentiality and other  password requirement details are explained in this external document - refer to: “P019 User  Access Management Policy”.

Encryption and cryptography

These terms are used in AWS to secure virtual hosts and when signing with a secure  signature (signature usage is mandatory in the company and enforced through the  onboarding process when hiring a new employee). Google Workspace uses the latest  cryptographic standards to encrypt all data at rest and in transit between its facilities. In  addition, Gmail uses TLS (Transport Layer Security) for communication with other email  service providers. With Gmail Client-side encryption (CSE), you can strengthen the  confidentiality of your sensitive or regulated data content by having the encryption  handled in your browser before any data is transmitted or stored in Google's cloud-based  storage. This provides uniform protection to your messages until it is received by the intended recipients. Also encryption may be used to securely transfer or store data offline  (e.g. archiving with a password), but as cloud services offer more secure and easy to use  services, that becomes obsolete. Bitlocker is enabled when configuring new laptops for  employees. Encryption should be used in development (e.g. to secure a publicly accessible  database).

IT asset classification and handling policy

Information assets

All involved systems and information are assets of Exponam and are expected to be protected  from misuse, unauthorized manipulation, and destruction. These protection measures may  be physical and/or software based.

● Ownership of information assets

All computer software developed by Exponam employees or contract personnel on  behalf of Exponam or licensed for Exponam use is the property of Exponam and must not  be copied for use at home or any other location, unless otherwise specified by the  license agreement.

The storage, transmission, distribution or use of copyrighted material not legally  owned by or licensed to the user, or the company is strictly prohibited on Exponam  computers (or individually owned computers in case of BYOD/Teleworking) and  networks. This includes, but is not limited to, movies, photos, music, and other  copyrighted content. Furthermore, any non-work-related data should not be stored  on company systems to maintain the security and integrity of information assets

● Installed software

All software packages that reside on computers and networks within Exponam must  comply with applicable licensing agreements and restrictions and must comply with  Exponam acquisition of software policies.

Information classification policy

Exponam provides fast, efficient, and cost-effective electronic services for a variety of clients  worldwide.

It is critical for Exponam to set the standard for the protection of information assets from  unauthorized access, compromise, and disclosure. Accordingly, Exponam has adopted this  information classification policy to help manage and protect its information assets.

Information Classification Policy has been described in this external document - refer to:  “P012 Information Classification Policy”.

IT assets

This policy is designed to protect the organizational resources on the network by establishing  a policy and procedure for IT asset control. These policies will help prevent the loss of data or  organizational assets and will reduce the risk of losing data.

IT Asset Control and Disposal policy has been described in this external document - refer to:  “P016 Asset Control and Disposal policy, explaining asset types, tracking, transfer, and  disposal procedures.

Acceptable information technology infrastructure and resource use policy

This policy outlines acceptable use of IT resources (which includes, but is not limited to  software, hardware, and networks) and infrastructure by any individuals working at Exponam. Acceptable Information Technology Infrastructure, Resource Use Policy has been described in  this external document - refer to: “P017 Acceptable Information Technology Infrastructure _  Resource Use Policy”.

Information security incident management

The purpose of this policy is to ensure a consistent and effective approach to the management of  information security incidents, including communication on security events and weaknesses. It  enables the efficient and effective management of incidents by providing a definition of an incident  and establishing an overall structure for the reporting and management of such incidents.

Information Security Incident Management has been described in this external document - refer to:  “P018 Information Security Incident Management Policy”.

Physical and environmental security

Physical and environmental security is a section of the information security policy that addresses  measures to protect the organization's physical assets and infrastructure. It includes guidelines for the  secure management and use of facilities, equipment, and other physical resources. The policy may  cover areas such as access control, monitoring, and protection against environmental threats like fire  and water damage. It may also outline procedures for secure disposal of sensitive information and  equipment. The goal of this section is to ensure that the physical environment is secure and that the  organization's assets are protected against unauthorized access, theft, or damage.

Physical and environmental security aspects have been described in this external document - refer to:  “P014 Physical Security Policy”.

Clean desk and screen policy

Staff with access to sensitive information are responsible for ensuring that information is  always controlled and/or protected by taking appropriate actions to prevent loss, theft,  misuse, or unintended disclosure of this information in their workspace (i.e. offices, cubicles,  residential and work-at-home environments, hotels, conference centers, and public spaces).  These actions include, but are not limited to:

● Sensitive information in any format or media must be securely stored (i.e., locked  cabinet or drawer) when not in use.

● All sensitive information must promptly be removed from unattended or non-secured  areas (e.g. conference rooms and break rooms), printers, fax machines, and incoming  mail points. Any items left in these areas for an extended time must be securely  disposed of.

● Unauthorized duplication or reproduction of sensitive information is specifically  prohibited. This includes but is not limited to photocopying, scanning, and  photography.

● Staff must set their workstation to a password protected screen saver any time it is  unattended (for example, using Ctrl+Alt+Delete buttons and selecting “Lock this  Computer” or by using the Windows Key + L).

● Desktop screensaver lock must also be set to automatically launch after no more than  15 minutes of inactivity.

● VPN tokens or other similar user authentication mechanisms must be safeguarded  when not in use or when unattended.

● If a work area is visible from a less restricted area (e.g. exterior windows), users should  attempt to configure the work area such that computer screens are not easily visible  from the less restricted area.

● Staff must exercise caution when sharing/displaying computer screens via web  meetings or desktop sharing technologies with external parties. In such instances,  staff must only share the information adequate for the purpose of the call, and only  grant permission to see the information to those who have a genuine business need.

● Media handling and data transfer management

● Secure system development and maintenance

● System monitoring and logging

● Backup

● Incident management and response

● Supply chain security

By implementing operational security measures, organizations can mitigate risks associated with the  day-to-day operation of their information systems and ensure that their data is secure and available  when needed.

E-mail policy

All use of email must be consistent with Exponam policies and procedures of ethical conduct,  safety, compliance with applicable laws and proper business practices. 

Exponam email account should be used primarily for Exponam business related purposes and  personal communication is permitted on a limited basis using a reasonable amount of Exponam  resources (non-work-related email shall be saved in a separate folder), but non-Exponam  related commercial uses are prohibited.

Sending chain letters or joke emails from a Exponam email account is prohibited. 

The Exponam email system shall not be used for the creation or distribution of any disruptive  or offensive messages, including offensive comments about race, gender, hair color,  disabilities, age, sexual orientation, pornography, religious beliefs and practice, political  beliefs, or national origin. Employees who receive any emails with this content from any  Exponam employee should report the matter to their supervisor immediately.

Users are prohibited from automatically forwarding Exponam email to a third-party email  system. Individual messages which are forwarded by the user must not contain Exponam  confidential or above information. 

Exponam employees shall have no expectation of privacy in anything they store, send or  receive on the company’s email system. Exponam may monitor messages without prior notice.  Exponam is not obliged to monitor email messages.

Exponam email should not be registered with any external service provider, if that is not related  to work and work responsibilities.

Virus protection

Virus checking systems approved by the Information Security Officer and Information Services  must be deployed using a multi-layered approach (desktops, servers, gateways, etc.) that  ensures all electronic files are appropriately scanned for viruses. Users are not authorized to  turn off or disable virus checking systems.

Backup policy

The backup is a crucial component of information security that ensures the availability and  integrity of data in case of data loss or system failure. This section should address the backup  strategy, including frequency, retention period, and storage location. The backup policy  should specify the backup procedures, such as the type of backups, media used, and the  backup schedule. Additionally, the policy should outline the procedures for testing the backup  system to ensure its effectiveness and include a plan for disaster recovery. Finally, the backup section should outline the roles and responsibilities of staff involved in the backup process  and specify the security measures to protect the backup data.

Google Drive and Microsoft Disc are available to all users of the company and may be used to  backup critical information. Automatic backup procedures as well as additional backup  solutions may be implemented if necessary to better improve the integrity and availability of  information stored.

The company uses Amazon web services (AWS), to host the internal systems and systems in  active development, therefore backup is included as a cloud service, and here are some notes  on RDS (relational database service) backup strategy:

● When something that may have an effect on Production RDS occurs, a production  environment RDS snapshot is created. RDS snapshot creation is automated - e.g. as a  pre-step of back-end component deployment with the help of AWS CLI (command line  interface).

● Sometimes, it is necessary to create a snapshot at some specific time - in these cases  the snapshot is created manually via the AWS console.

● RDS snapshot naming is based on the short name of application, date and time when  snapshot creation occurred, e.g. "my-app-cluster-20231006-193214".

● When there is a need to rollback an application's RDS - another RDS is created based  on the snapshot. Right after the new RDS from snapshot is ready - the application RDS  address is switched.

● Automated snapshots are created for production RDS, and manual for production and  non-production RDS.

The company uses Google Workspace, which ensures information integrity and availability is  included as a cloud service.

Individual backup procedures must be ensured by a user, if his/her own individual hardware  or software solutions are used, but that must be informed and agreed with management. As for individual client projects, different backup procedures and policies may be used and  organized from the client side.

Backup and recovery testing

AWS Backup and recovery testing is done manually when ITSS receives a problem request or  when an issue is detected. Request or issue is analyzed to assess severity and if the problem  relies on a single or multiple hosts and if the problem can be remedied without backup  restore. In the latter case another backup should be created for safety before attempting to  recover without backup restore. Proactive, recurring backup and recovery testing is not  implemented, as AWS is a cloud environment and provides a layer of security against physical  data damage. Backup and recovery testing events are recorded in this log -refer to: “Backups:  history of restore procedures”, available to the administration team.

Configuration management

Configuration management is the process of monitoring the hardware and software  configuration of computers and changing configurations when necessary to ensure they stay  in line with IT policies. As Exponam allows work from home, this becomes more important as  ITSS department no longer has ready access to all computers, which employees are using.  Those computers, which may include mobile devices employees bought and set up themselves, may have fallen behind on software patches. Or they might be missing updates  to antivirus software. Falling behind on security software updates increases a computer’s  vulnerability to malware and other forms of attack. Benefits of configuration management: ● Improved user experiences and productivity

● Reduced security vulnerabilities

● Faster time to repair

● Improved IT decision-making

Best practices to ensure successful configuration management:

● Plan, which covers people, processes and technology

Effective configuration management involves people, processes, and technology. It  requires planning about how configuration updates will be rolled out, who will  manage those updates, how those people will be trained and so on. It also requires  well-defined processes for monitoring endpoints and updating endpoints when they  are found to be out of compliance with configuration policies. And it requires a  process for rapidly deploying patches or making other types of changes to respond to  security threats or serious performance problems from recent changes. Plans should  be documented and understood by all the relevant stakeholders in the IT department.  And those plans should include requirements for configuration tools and for training  IT engineers on the use of those tools.

● Being able to monitor on a local network, in a remote location or cloud:

IT organizations need a comprehensive way of managing configurations regardless of  where an endpoint is being used. Whether an employee is working in the office, at  home, or in some other remote location, the IT organization should be able to monitor  and configure that employee’s endpoint flawlessly.

● No unmanaged endpoints

To avoid security risks and optimize endpoint performance for employees, IT teams  need to put together tools and processes for ensuring that all endpoints regardless of  the operating system used have been found and that all changes to those endpoints  have been implemented.

● Whenever possible monitor and configure remote endpoints without requiring VPN  to access.

That way, no matter where employees are working, the IT team can stay on top of  keeping their computers up-to-date and working well. And you’ll avoid the problem  of employees complaining about the slow network performance that’s common with  VPNs.

● Avoiding network traffic jams

Use tools for remote access and configuration which does not require a lot of  dedicated servers and makes less traffic congestion. Make use of distributed network  solutions if possible.

● Result monitoring, problem remediation and continuous improvement.

IT teams should continuously monitor the configurations of endpoints and make  changes whenever necessary. To keep track of that ongoing work, it’s a good idea to  build reporting and trend analysis into your documented configuration management processes. IT and business leaders should be able to receive and see “the big picture”  about the state of the computers that employees depend on.

ITSS tries to use these best practices to improve Exponam configuration management.

Network management

Network management best practices ensure that the network is accessible when needed, safe  from attackers, scalable to changes of endpoint count:

● Understand the network

Network managers need to have a clear understanding of its structure and  components. Importantly it is needed to assess the big picture by mapping out the  network topology. Then, identify the type of network (Ethernet, WAN, LAN, etc.) and  become familiar with the devices that are used to build it (switches, routers,  gateways, etc.). Finally, familiarize yourself with the OSI model, which provides a  framework for understanding how data flows through a network. With this  information in hand, network managers will be in a much better position to develop  a management plan that meets the business’s specific needs.

● Identify critical infrastructure and systems

One of the best practices in network management is to identify critical elements and  give them priority attention. This means ensuring they are properly configured,  monitored, and maintained.

● Implement security best practices

Network security includes policies, processes, and practices for monitoring the  network’s health, detecting vulnerabilities, and preventing unauthorized access.  Understanding network defenses can allow network managers to detect and prevent  potential threats more effectively. By regularly reviewing these elements,  administrators can ensure that the network is secure and running efficiently.

● Understanding compliance requirements

Network management is a complex task, and it can be difficult to keep track of all of  the different regulations that apply to a business. However, by taking the time to  understand compliance requirements, network managers can develop policies and  procedures that will keep the network in compliance with laws such as HIPAA,  Sarbanes-Oxley, PCI DSS, GDPR.

● Staff training

Employees need to be regularly reminded of basic information security measures,  such as password protection and avoiding phishing scams. They also need to be  familiar with common network problems and how to resolve them. By ensuring staff  are up to date on all aspects of network management, administrators can help to  prevent costly disruptions and ensure the network runs like clockwork.

● Monitoring

Monitoring is essential to keeping the network running smoothly. Network managers  can quickly establish a baseline for normal behavior and identify potential problems  by tracking data from multiple users and devices. In addition, monitoring helps to  ensure the high availability of critical systems and eliminates the need for multiple point solutions.

● Disaster recovery

Network administrators must be ready for disasters and plan accordingly, which  includes potential hazard identification and strategies for mitigating their effects This  may involve data backups, redundant systems, alternate connectivity options and  others.

● Task automation

Automating repetitive tasks frees up time for more creative work, leading to a more  efficient and effective network management team. For example, network staff may  use automated device locators to discover where a device connects to the network,  and check application connectivity. Automation can also help verify that each network  infrastructure device is linked properly with its neighbor and detect inconsistencies  between parts of network configurations and company configuration templates.

● Network testing

Testing is an essential part of network management. By regularly testing the  performance of the network, network managers can identify and resolve potential  problems before they become disruptive. In addition, testing helps to ensure the  network meets the changing needs of the business.

● Gather data for future requirements

Network data can be used to predict future network needs. This is especially valuable  when planning for growth or expansion. By understanding how the network is  currently being used, network managers can make informed decisions about capacity  planning and avoid over or under-buying resources. Network data can also be used to  identify trends and spot potential problems. For example, if there is a sudden spike in  network traffic, it may be an indication of a distributed denial-of-service (DDoS)  attack.

Exponam tries to use these best practices to ensure a safe and reliable network and its  management. Exponam uses network segmentation at the office - wired and wireless networks  are separated to increase safety and accessibility. Employees use VPN to access critical  systems. Network is configured based on UniFi software with an overview of network  topology.

7.  Documents and records control management

The Information Security Management System (ISMS) of Exponam is a comprehensive framework  designed to ensure the protection of information in all its forms. This includes information in written,  spoken, electronically recorded, or printed formats. The primary objective of the ISMS is to safeguard  information from accidental or intentional unauthorized modification, destruction, or disclosure  throughout its entire life cycle.

● Documentation and Accessibility

Within the ISMS, all policies and procedures are meticulously documented. These documents  are made readily available to individuals who bear responsibility for their implementation and  compliance. This ensures that everyone within the organization is well-informed and  equipped to uphold the established standards.

● Recording of Activities

Additionally, all activities identified by the policies and procedures are diligently documented.  This practice not only serves as a means of transparency but also aids in traceability and  accountability in case of any security incidents or breaches.

● Retention Period

All documentation, regardless of its form, including electronic records, must be retained for a  minimum of six (6) years from the time of initial creation. For policies and procedures, this  retention period extends to cover any subsequent changes made. This extended retention  policy ensures that a historical record of information security practices is maintained.

● Periodic Review

To maintain relevance and effectiveness, all documentation must undergo periodic reviews.  The frequency of these reviews will be determined by each entity within Exponam, allowing for  flexibility in adapting to specific operational needs and evolving security landscapes.

8.  Training and awareness documentation

Any document, policy, rule, or guide may be offered to employees, using e-mail, brown-bag sessions  (example presentations, training) or BambooHR system - to receive feedback that employees have  reviewed required documentation, the BambooHR system is used to gather a signature from an  employee which is kept as a record.

Training and personal development policy

Exponam is committed to the continuous training and development of its employees, both in job related skills training and lifelong learning for personal development. Exponam’s employees are one of  our greatest assets and helping them develop professionally and personally is crucial to the  achievement of the organization's goals. All training practices and procedures will endeavor to support  individuals in achieving these goals. 

Training and Personal Development Policy has been described in this external document - refer to:  “P100 Training and Personal Development Policy”.

Security training policy

All new users must attend an approved Security Awareness training prior to, or at least within 30 days  of, being granted access to any Exponam information resources.

All users (employees, consultants, contractors, temporaries, etc.) must be provided with sufficient  training and supporting reference materials to allow them to properly protect Exponam information  resources.

ISO must prepare, maintain, and distribute one or more information security manuals that concisely  describe Exponam information security policies and procedures.

ISO must develop and maintain a communications process to be able to communicate new computer  security program information, security bulletin information, and security items of interest.

9.  Internal audit and review 

Internal audit:

Exponam conducts annual internal audits to assess the effectiveness of its Information Security  Management System (ISMS). The audit program is meticulously planned, considering the status and  significance of the processes and areas slated for examination, along with insights gleaned from prior  audits.

The audit criteria, scope, frequency, and methodologies should be clearly defined. This selection  process for auditors and the conduct of audits are structured to guarantee objectivity and impartiality  throughout. Auditors are prohibited from assessing their own work.

The management overseeing the audited area is responsible for swiftly implementing any necessary  corrections and corrective actions to rectify identified nonconformities and their underlying causes.  Subsequent activities encompass the verification of these corrective measures, with results duly  reported.

Comprehensive records of the audits and their outcomes are diligently maintained in accordance with  ISO/IEC 27001:2022.

Management review:

Exponam carries out an annual management review once a year to evaluate how effective its  Information Security Management System (ISMS) is.

The management review involves a comprehensive assessment that covers the following areas: Progress on Previous Actions: Checking on the advancement of tasks set during prior management  reviews to ensure they've been completed and have achieved their intended outcomes. Adaptations in External and Internal Factors: Examining any shifts in circumstances both inside and  outside the organization that might affect the Information Security Management System (ISMS). This  includes alterations in laws, market conditions, and the organization's structure.

Alterations in Stakeholder Needs and Expectations: Evaluating how the requirements and  anticipations of stakeholders and interested parties have evolved. This encompasses clients,  regulatory bodies, employees, and other relevant groups. The objective is to guarantee that the ISMS  continues to align with these evolving demands.

Feedback assessment: Scrutinizing input received from various sources:

● Identifying noncompliance and taking corrective measures: 

Investigating instances of nonconformity and evaluating the effectiveness of the corrective  actions taken.

● Evaluating monitoring and measurement outcomes: 

Analyzing results from ongoing monitoring and measurement activities to verify the  effectiveness of controls and processes.

● Reviewing audit findings: 

Going through the outcomes of internal and external audits to identify any areas that require  corrective action or improvement.

● Checking goal attainment: 

Reviewing the progress made towards achieving established objectives to ensure they are  being met as intended.

● Feedback from stakeholders: 

Considering input from stakeholders and interested parties regarding how well the ISMS is  performing. This information offers valuable insights into areas for improvement and  potential enhancements.

● Outcomes of risk assessment and progress of risk treatment plan: 

Reviewing the results of the risk assessment process, which includes identifying, evaluating,  and addressing risks. Additionally, evaluating the status of the risk treatment plan to ensure  that identified risks are being properly managed.

● Identifying opportunities for ongoing enhancement: 

Exploring possibilities for improving the effectiveness and efficiency of the ISMS. This might  involve initiatives to streamline processes, introduce new technologies, or implement best  practices.

This comprehensive review process guarantees that the ISMS remains aligned with the  organization's strategic objectives, complies with pertinent requirements, and effectively  manages information security risks.

10.         Incident recording, monitoring, and mitigation

This section describes the process of managing recording, monitoring, and mitigation of security  incidents.

Company uses the Atlassian Jira system and IT service management specifically, to record, monitor  and handle incident monitoring and response. Company already uses other Atlassian systems like  Confluence and Bitbucket, therefore it offered a simple learning curve and did not require additional  funding and time to set up a dedicated server just for incident management. Jira offers incident  registering and handling procedures as well as various reports of incident status (open, closed,  incidents in mitigation process, incident mitigation time etc.). Incidents are registered manually by  ITSS system administrators, security specialists or their managers. There is a plan in consideration to  widen incident recording functionality and attach a separate or merge an existing IT support e-mail  (support@Exponam.com) to the incident recording system, so that everyone in the company directly  could inform about incidents they have met, sending an email. That would also help the incident  management team to register delegated information security incident related tasks more easily, using  e-mail. However, that would allow reporting also any other IT related issue this way, therefore it is yet  in process to develop a robust system on how to structure and manage all received issues and separate  them accordingly.

Description of the incident management workflow using Jira:

The IT service management template associates certain requests with an incident management  workflow. An incident management workflow helps service project agents to investigate, record, and  resolve IT service interruptions or outages and also security related issues with the aim to reduce  downtime and negative impacts on business.

Jira Service Management provides an Information Technology Infrastructure Library (ITIL) compliant  incident management workflow called ISD: Incident Management workflow for Jira Service  Management. 

Incident management includes the following high-level process:

● Service end users, monitoring systems, or internal IT members report interruptions. ● The service project agent logs the incident in the service project linking together all reports  related to the service interruption.

● The service project automatically records the date and time, reporter name, and a unique ID  for the incident.

● A service project agent labels the incidents with appropriate categorization. The team uses  these categories during post-incident reviews and for reporting.

● A service project agent prioritizes the incident based on impact and urgency.

● The team diagnoses the incident, the services affected, and possible solutions. Agents  communicate with incident reporters to help complete this diagnosis.

● If needed, the service project team escalates the incident to second-line support  representatives. These are the people who work regularly on the affected systems.

● The service project team resolves the service interruption and verifies that the fix is successful.  The resolution is fully documented for future reference.

● The service project automatically closes the incident.

11.         Continual improvement

At Exponam, the commitment to excellence is embedded in our organizational DNA. We are dedicated  to the ongoing enhancement of the suitability, adequacy, and effectiveness of our Information  Security Management System (ISMS). This process is fundamental in adapting to emerging threats,  technological advancements, and evolving business landscapes.

Integral to our continual improvement efforts are the rigorous processes related to monitoring,  measurement, analysis, and evaluation of the ISMS. This involves the systematic collection of data and  the application of analytical techniques to gain insights into the performance of our information  security practices. By examining key performance indicators, we can identify areas for enhancement  and take proactive measures to bolster our security posture.

Recognizing the significance of change management and control, our company management has  prioritized this aspect. We acknowledge the potential risks associated with ineffective change  management and control and, in response, have formulated a comprehensive Change Management  and Control Policy. This policy outlines the procedures and protocols to be followed when  implementing changes within our information security framework. It ensures that changes are  assessed, authorized, and implemented in a manner that safeguards the integrity of our ISMS.

For detailed guidance on our change management and control Policy - refer to: "P020 change  management and control policy". This document provides a thorough overview of the policy,  including specific procedures and responsibilities involved in managing changes within our  information security framework.

In addition to change management, we recognize the critical importance of Business Continuity  Management. This encompasses a comprehensive approach to preparing for and mitigating the  impact of unforeseen disruptions. Our business continuity and disaster recovery plan are outlined in  an external document - refer to: "P011 Business continuity and disaster recovery plan". It serves as a  blueprint for ensuring the resilience of our operations in the face of adverse events.

Nonconformity and corrective action.

This process of addressing nonconformities and implementing corrective actions is integral to the  continual improvement of the ISMS in line with ISO/IEC 27001:2022 standards. 

A nonconformity arises when there is a deviation from the established requirements of the  Information Security Management System (ISMS) within Exponam. When such a situation occurs, it is  imperative to react promptly. This involves acknowledging the nonconformity, documenting the  specifics, and initiating a response strategy.

The response strategy may encompass immediate measures to contain and mitigate the impact of the  nonconformity. For instance, if a breach is identified, steps will be taken to halt any further  unauthorized access and assess the extent of the incident. Simultaneously, consequences will be  assessed, which may include notifying relevant parties, initiating legal procedures, or implementing  compensatory measures.

After the initial reaction, a comprehensive evaluation of the nonconformity is conducted. This involves  a multifaceted approach:

Reviewing: Thoroughly examining the circumstances surrounding the nonconformity. This includes  scrutinizing relevant documentation, interviews, and any available electronic records. Determining the Causes: Identifying the root causes that led to the nonconformity. This involves a  systematic analysis to pinpoint the underlying factors contributing to the deviation.

Assessing Similarities and Potential Recurrence: An assessment is made to determine if similar  nonconformities have occurred in the past or if there is a likelihood of similar incidents happening in  the future. This foresight is essential for proactively preventing future occurrences.

Based on the evaluation, a corrective action plan is devised. This plan outlines specific steps to rectify  the nonconformity and prevent its recurrence. This could involve revising processes, enhancing  controls, providing additional training, or implementing technological safeguards.

Once the corrective actions are implemented, their effectiveness is rigorously reviewed. This entails a  careful examination to ensure that the corrective measures have effectively addressed the  nonconformity and that there are no unintended consequences.

If necessary, adjustments to policies, procedures, or controls may be made based on the lessons  learned from nonconformity.

The incident recording, monitoring, and mitigation process is described separately according to this  external policy - refer to: “P018 Information Security Incident Management Policy”.

12.         Documented information on ISMS performance

The organization has determined the following points that need to be monitored and measured,  including information security processes and controls:

● Context of the Organization

● Leadership and Commitment

● Planning

● Support

● Operation

● Performance Evaluation (This process involves evaluating the performance of the ISMS and  determining if it aligns with the organization's objectives and requirements):

○ Monitoring, Measurement, Analysis, and Evaluation: Review the processes for  monitoring and measuring information security performance.

○ Internal Audit

○ Management Review

● Improvement

● Documentation and Records

● Compliance

● Third-Party Relationships

● Business Continuity and Disaster Recovery

● Cybersecurity

The evaluation process should be systematic, and findings should be thoroughly documented.

13.         Legal and regulatory compliance

Documents related to compliance with legal and regulatory requirements, including privacy laws and  industry-specific standards.

The information security policy applies to all users of Exponam information including employees,  students, volunteers, and outside affiliates. Failure to comply with Information Security Policies and  Standards by employees, volunteers, and outside affiliates may result in disciplinary action up to and  including dismissal in accordance with applicable Exponam procedures, or, in the case of outside  affiliates, termination of the affiliation. Failure to comply with Information Security Policies and  Standards by students may constitute grounds for corrective action in accordance with Exponam  procedures. Further, penalties associated with state and federal laws may apply.

Possible disciplinary/corrective action may be instituted for, but is not limited to the following: ● Unauthorized disclosure of a sign-on code (user id) or password.

● Attempting to obtain a sign-on code or password that belongs to another person. ● Using or attempting to use another person's sign-on code or password.

● Installing or using unlicensed software on Exponam computers.

● The intentional unauthorized destruction of Exponam information.

● Attempting to get access to sign-on codes for purposes other than official business, including  completing fraudulent documentation to gain access.

● Discovering internal and external non-public projects information.

At each entity and/or department level, additional policies, standards and procedures will be  developed detailing the implementation of this policy and set of standards, and addressing any  additional information systems functionality in such an entity and/or department. All departmental  policies must be consistent with this policy. All systems implemented after the effective date of these  policies are expected to comply with the provisions of this policy where possible. Existing systems are  expected to be brought into compliance where possible and as soon as practical.

The purpose of this policy is to provide high-level guidance regarding key aspects of human resource  management, including work health and safety, anti-discrimination and harassment measures,  attendance and absence rules, work performance management and evaluation approach, as well as  overall key roles in the Company and their contact information.

Human resources policy has been described in this external document - refer to: “P050 Human  Resources Policy”.

These are active human resource guidelines and rules described in these external documents: ● Communication guidelines - refer to: “Communication guidelines_v1.0”.

● Time - off policies and instructions - refer to: “Time-Off_Policies_Instructions_082020”. ● Internal working rules - refer to: “Internal working rules_v1.0_ENG_LV_2020”. ● Kitchen usage guidelines - refer to: “Kitchen usage guidelines”.

Personal data protection policy

The Personal Data Protection Policy outlines the company's commitment to protecting personal  information that it collects, processes, and stores. The policy specifies the responsibilities of  employees and contractors, and provides guidance on the appropriate use, retention, and destruction of personal data. It also addresses the rights of data subjects, including access, correction, and erasure,  and establishes procedures for responding to data breaches. The policy emphasizes compliance with  relevant laws and regulations related to data protection and privacy, and the importance of  maintaining trust and confidence with stakeholders regarding the company's handling of personal  data.

Personal Data Protection Policy has been described in this external document - refer to: “Personal  data protection policy”.

Anti-bribery and anti-corruption policy

The Company is committed to upholding all laws relevant to countering bribery and corruption in each  of the jurisdictions in which it operates, conducting all its business in an honest and ethical manner.  Exponam takes a zero-tolerance approach to bribery and corruption in any form (including, but not  limited to direct and indirect bribes, inducements, kickbacks, extortion) and is committed to acting  fairly and with professional integrity in all its business dealings and relationships. It is the goal of  Exponam to avoid acts which might reflect adversely upon its integrity and reputation.

Anti-Bribery and Anti-Corruption Policy has been described in this external document - refer to:  “P021 Anti-Bribery and Anti-Corruption Policy”.

Background check policy

The purpose of this policy and performing background checks is to determine and or confirm the  qualifications and suitability of a job candidate for the position for which the candidate is being  considered, and to help ensure the safety of our work environment. The Company reserves the right  to perform background checks in any situation when it is deemed appropriate to protect the interests  of the Company or address client requests.

Background check Policy has been described in this external document - refer to: “P055 Background  check Policy”.

Code of conduct

The purpose of this corporate Code of Conduct (the “Code”) is to articulate the fundamental ethical  and professional standards and principles that are to guide the employees as well as to all individuals  who perform services for Exponam pursuant to a consulting agreement or similar arrangement  (including full and part-time employees, temporary employees, independent contractors, consultants,  advisors and third-party service providers). Accordingly, all references herein to “employees” shall  apply to all employees and individuals who perform such or similar services described in the foregoing  sentence.

The Code includes affirmations of policies contained in greater detail in Exponam’s policy manuals and  procedures. All references herein to any policies, procedures, and standards shall apply to such  policies and procedures as the same may be amended from time to time and/or replaced by applicable  Exponam-wide policies, procedures, and standards.

Code Of Conduct has been described in this external document - refer to: “P110 Code of conduct”.

13. Supplier and third-party management

Procedures for assessing, selecting, and managing third-party vendors with access to sensitive  information.

This policy outlines responsible sourcing of products and services from its suppliers, including  subcontractors. In today’s global market, products and services are typically sourced from a variety of  locations nationally and internationally, thus emphasizing the importance of adhering to clear  guidelines, to ensure that:

● Exponam is sourcing all products and services in a responsible, ethical manner;

● Exponam works towards improving its social and environmental practices;

● Exponam commits to working with suppliers that maintain the same high standards; ● Exponam corporate and brand reputation is adequately protected.

Responsible Sourcing Policy has been described in this external document - refer to: “P022  Responsible Sourcing Policy”.

Exponam carefully investigates terms of services whenever using third party services (AWS, Google  Workspace, Azure), so that they are following all necessary legal and regulatory requirements.

14.         Communication and reporting

The following core principles will guide information security matters processing activities:

● All employees and contractors of the Company shall be made aware of the procedure for  reporting information security matters and their responsibility to report such.

● All information security matters shall be reported promptly to the helpdesk  (support@exponam.com).

● The severity of the information security matters shall be assessed, and the Company  management response shall be proportionate to the threat.

● Key information about serious information security matters (i.e., those of severity High or Very  high), including the impact of the incident (financial or otherwise), shall be formally recorded  and the records shall be analyzed to assess the effectiveness of information security controls.

● New risks identified because of an incident shall be assigned to the relevant risk owner and  processed further in accordance with the Company’s “P030 Corporate Risk Management  Policy”.

● Incidents should be reported through the chain of command (employee to manager), so the  incident may be properly recorded and analyzed and shall be further reported to higher  management or the appropriate external authorities where relevant.

● Management should decide whether the external parties need to be informed about  information security matters.