Last updated: March 25, 2023
The purpose of this high-level Policy is to define the objective, direction, principles and basic rules for information security management.
This Policy applies to the entire Information Security Management System (ISMS), as defined in the ISMS Scope Document.
The users of this document are all ZEROD employees, as well as third parties external to the organization.
Confidentiality: Characteristic of information whereby it is only available to authorized persons or systems.
Integrity: Characteristic of information whereby it is only modified by authorized persons or systems and in a permitted manner.
Availability: Characteristic of information whereby it can only be accessed by authorized persons when necessary.
Information security: is the preservation of confidentiality, integrity and availability of information.
Information security management system: Part of the general management processes that is responsible for planning, implementing, maintaining, reviewing and improving information security.
The general objectives for the information security management system are the following: create a better market image and reduce the damage caused by potential incidents; the goals are in line with the business objectives, strategy and business plans of the organization. The Security Manager together with the ISMS Manager is responsible for reviewing these general ISMS objectives and establishing new ones.
The defined objectives as well as the metrics that will be used to measure the progress of achieving the objectives can be seen in the Objectives register.
All objectives must be reviewed at least once a year.
ZEROD will measure compliance with all objectives. The Security Committee is responsible for defining the method for measuring compliance with the objectives; the measurement will be carried out at least once a semester and the results will be analyzed and evaluated at a Committee meeting and reported to [senior management] as material for management review.
This Policy and the entire ISMS shall comply with the organization's relevant legal and regulatory requirements in the area of information security, as well as contractual obligations.
A list of contractual and legal requirements is detailed in the List of legal, regulatory, contractual and other requirements.
The process of choosing controls (protection) is defined in the Risk assessment and treatment methodology.
The selected controls and their implementation status are detailed in the Statement of applicability.
The responsibilities for the ISMS are as follows:
The ISMS Manager will ensure that all ZEROD employees as well as the corresponding external participants are familiar with this Policy and it will be his/her responsibility to publish or communicate any changes to said Policy.
Hereby, management declares that the implementation and continuous improvement of the ISMS will be supported by adequate resources to achieve all the objectives established in this Policy, as well as to comply with all the identified requirements.
To review the ISMS, management will review:
To do this, the Security Manager will provide you with a quarterly follow-up report that you can take with you to a Committee meeting.
The owner of this document is the ISMS Manager who must verify, and if necessary update, the document at least once a year.