All pages
Powered by GitBook
1 of 5

Risk Management

Loading...

Loading...

Loading...

Loading...

Information Systems Register

  • Client instances

  • Amazon AWS (production data)

  • Google Mail (our own internal communications)

Identification

Information systems are identified as part of:

  • Supplier Review Procedure

  • Monthly security review meetings

  • Our software development lifecycle

  • Everyday working practice

Third-party vendors

This register includes information systems that FundApps depends on and that third-party vendors manage. As such, we evaluate business continuity and sufficient security controls as part of our assessment process.

Assessment

For each information system identified, we

  • Assign an owner (Supplier Relationship Manager) for the system.

  • Identify the business criticality.

  • Based on the data classification, identify information security and business continuity controls. This information is stored in our Third-Party Risk Management System.

  • Identify any specific risks relating to this third party and record them in our

    • Third-Party Risk Management System,

    • The Information Security Risk Register,

    • Business Continuity Risk Register, or

    • DPIA.

Review

Information systems are reviewed as part of our monthly security review meetings.

Information Asset Register

  • Client support queries

  • Internal communications

  • Server logs

  • Development source code

Identification

Information assets are identified as part of:

  • Monthly company-wide security awareness sessions

  • Monthly security review meetings

  • Our software development lifecycle

  • Everyday working practice

Assessment

For each information asset identified, we

  • Assign an owner for the information

  • Identify if it falls under any specific regulation (primarily General Data Protection Regulation)

  • Identify an appropriate data classification from these ratings

Any changes to the register results in:

  • updates to our data classification policy with regards the information systems and asset information falling under each classification

Review

Information systems are reviewed as part of our monthly security review meetings.

FundApps' information systems register [] contains any system (internal or external) that holds or permits access to information assets in our . For example, this includes:

Identify the the system falls under based on the maximum data classification of the information stored.

Our contains every information asset of value to FundApps. For example, this includes:

Assess CIA ratings in accordance with our process

Identify the that contain this data

Identify any specific information risks relating to this information and record it in our

Identify any specific business continuity risks relating to this information and record it in our

updates to our with regards the classification of information they hold

updates to our requiring us to record privileges granted to this systems and ensuring revokation during the offboarding process

Restricted to FundApps staff
information asset register
data classification
information asset register [Restricted to FundApps staff]
risk management
information systems
infosec risk register
BC risk register
information systems register
access control register

Risk Management Framework

Overview

FundApps approaches both information security and business continuity from risk based principles. Each identified information security or business continuity risk is reviewed with regard to Likelihood (the possibility of a risk happening), and Impact (the consequence of a risk happening).

Risks can be identified by any member of staff, and, staff members are encouraged to contribute. Once risks are identified and reviewed for Likelihood and Impact, an appropriate remediation plan can be formulated.

The key is that risk management drives activity to resolve identified risks, and is the responsibility is that of each employee of FundApps.

Risk Appetite

FundApps has no appetite for safety risks that could result in the injury or loss of life of FundApps staff, clients or partners.

FundApps has no appetite for information security risks that could result in unauthorised or accidental disclosure of, client or other sensitive information.

FundApps has a low appetite for business continuity risks which prevent the ability to provide service to clients.

Risk Tolerance

It is important to note that following the risk management framework, any risk that equals or exceeds a risk rating of twelve (12) will exceed the FundApps Risk Tolerance level and therefore will require a risk treatment plan to lower the risk profile. See the FundApps Risk Management Matrix at the bottom of the page for further information.

Risk Management Process

A- Risk Identification

Potential information security risks and business continuity risks are identified through both formal and informal channels:

  1. Monthly security review meetings

  2. Incident response and reviews

  3. As part of the Software Development Lifecycle

  4. As part of the continuous release management

  5. As part of everyday working practice

B- Risk Assessment

Likelihood and impact

Potential risks are recorded in the risk register and assigned an owner. Risks are assessed on two criteria with regards to any current controls that may already be in place:

  • Likelihood, according to the FundApps Risk Management Matrix (cf. bottom of the page). Likelihood should consider the specific vulnerability or threats that may exploit this vulnerability.

Residual risk

The assessment of likelihood and impact places the risk within risk tolerance levels defined in the Risk Management Matrix (cf. bottom of the page).

Each risk level consists of

  • the likelihood and impact levels

  • a timeframe for review while the risk is open

  • a timeframe for review once the risk is closed

C- Risk Response

Based on this categorization we can then design a risk response in order to reduce our residual risk.

Strategies for responding to the risk can include:

  • Avoid risk – activities with a high likelihood of loss and large business impact. The best response is to avoid the activity.

  • Mitigate risk – activities with a high likelihood of occurring, but business impact is small. The best response is to use management control systems to reduce the risk of potential loss.

  • Transfer risk – activities with low probability of occurring, but with a large business impact. The best response is to transfer a portion or all of the risk to a third party by purchasing insurance, hedging, outsourcing, or entering into partnerships.

  • Accept risk – if cost-benefit analysis determines the cost to mitigate risk is higher than cost to bear the risk, then the best response is to accept and continually monitor the risk.

Our risk response may generate information security or business continuity controls which could be technical, procedural or policy based.

D- Risk and Control Monitoring

Identified risks and their mitigating controls are monitored and reviewed at least annually in order to ensure the residual risk is within the risk appetite. Should the residual risk change, either due to a change in the intrinsic risk, or due to the control effectiveness, the risk response will be reviewed.

Risk Management Matrix

Data Classification and Protection Standard

In order to preserve the appropriate confidentiality, integrity and availability of FundApps information assets, we must make sure they are protected against unauthorized access, disclosure or modification. This is critical for all personal data, client data and FundApps proprietary data we deal with across the FundApps business.

This standard applies to all FundApps information, irrespective of the data location or the type of device it resides on.

Approach

As a result, we can see at a glance

  • What information assets fall under which data classification

  • What information systems hold data falling under those classifications

  • The controls that we expect each system to have in place

Responsibilities

FundApps & third parties

All FundApps employees, contractors and third parties who interact with information held by and on behalf of the FundApps are responsible for assessing and classifying the information they work with and applying the appropriate controls. Individuals must respect the security classification of any information as defined and must report the inappropriate situation of information to the Information Security Manager or Head of Security as quickly as possible.

System Owners

Each System has an owner (Supplier Relationship Manager) responsible for assessing the information it contains and classifying its sensitivity. Systems owners are then responsible for ensuring the appropriate controls are in place in conjunction with the Head of Security.

Security Team

Responsible for advising on and recommending information security standards on data classification and ensuring these are regularly reviewed.

Classification and Protection Guidance

The latest classification guidance can be found below.

Reporting Violations

Report suspected violations of this policy to the Head of Information Security, the CTO or the CEO. Reports of violations are considered Restricted data until otherwise classified.

Impact, according to the FundApps Risk Management Matrix (cf. bottom of the page). Further guidance must be taken from the FundApps Data Classification and Handling when referring to impact. This will take into account the Confidentiality, Integrity and Availability requirements of any data asset.

Use of definitions based upon ISACA’s

We maintain an detailing all key information assets at FundApps, who owns them, the business processes they are used in, and any external service providers that may utilise or store the information.

Public
Open
Restricted
Confidential
Policy
standard Glossary of Terms

Description

Publicly available data.

Accessible only to FundApps staff, authorised clients and partners.

Access restricted to specific FundApps teams. Data which the data owner has not decided to make public; data that is legally regulated and requires some level of access control, and data protected by contractual obligations.

Access restricted to specific FundApps staff on a ‘need to know’ basis. Data which if disclosed publicly could cause significant financial or reputational damage to FundApps or our clients; data which is legally regulated requiring an extremely high level of protection; data protected by contractual obligations.

Impact

None

Low

Medium

High

Current data in this classification

- Regulatory information - Publicly available information on a company.

- FundApps policies, - List of clients, - Development and test data, - Prospective client visitor data and analytics, - Task lists, potential future work - FundApps ISMS and asset register.

- Employee contracts, passports, salaries, bank records, - Engineering Source Code, - FundApps’ rule package, - Client portfolio, structures, - Client queries, - Server event logs, application logs, exception logs.

- Client positions - Client results (disclosures, breaches etc) and data overrides - Encryption keys and infrastructure credentials

Current services included in this classification

- OneLogin - Aosphere.

- Amazon AWS Development, - OneDrive, - HubSpot, - GitBook, - Bonusly, - Google Analytics.

- GitHub, - Intercom, - Google Mail, - Google Drive, - Slack, - Kingston Smith, - HSBC, - Datadog SIEM, - Sentry.

- Amazon AWS Production, - Octopus, - Client environments.

Data access & control

No access restrictions. Data is available for public access.

Available to FundApps prospects and clients (under NDA) and staff.

Available only to specified FundApps staff.

Access is controlled and restricted to specific FundApps staff, following a 'need to know' and 'least privilege' basis.

Legal requirements

Protection of data is at the discretion of the owner or custodian.

Protection of data is at the discretion of the owner or custodian.

Protection of data is required by law or at the discretion of the owner or custodian.

Protection of data is required by law or at the discretion of the owner or custodian.

Transmission

No other protection is required for public information.

Data must be shared through systems which restrict access to the intended audience. If this is not possible (e.g. data needs to be shared through internal chat or email), data must be sent encrypted (e.g. password protected encrypted archive where password is sent through unrelated channel) or through the means of a link to a system which implements the appropriate access control (link to Google Docs drive).

Data must be shared through systems which restrict access to the intended audience. If this is not possible (e.g. data needs to be shared through internal chat or email), data must be sent encrypted (e.g. password protected encrypted archive where password is sent through unrelated channel) or through the means of a link to a system which implements the appropriate access control (link to Google Docs drive).

Transmission through email, support tickets, internal chat tools is prohibited. Transmission may only be made through approved channels that are authenticated and encrypted (HTTPS or VPN).

Audit controls

No audit controls required.

Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access.

Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.

Systems must be actively monitored and reviewed for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.

Storage

No restrictions.

No restrictions. Care must always be taken when storing this information on mobile devices.

Encryption is required if stored on a system without access control.

Encryption at rest mandatory for all data not within a physically secure ISO 27001 environment. Storage is prohibited on unapproved computing equipment.

Backup & Recovery procedures

Not required.

Documented backup and recovery procedures are required in line with FundApps' Service Levels.

Documented backup and recovery procedures are required in line with FundApps' Service Levels.

Documented backup and recovery procedures are required, including automated failover wherever feasible in order to achieve FundApps' Service Levels.

Disposal (digital file)

No restrictions.

Standard deletion from media

Standard deletion from media

Delete all files or data using a secure delete tool (such as Eraser).

Disposal (physical medium)

No restrictions.

Media must be erased before disposal

Media must be erased before disposal. Cryptographic keys must be deleted for encrypted media. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).

Media must be erased before disposal. Cryptographic keys must be deleted for encrypted media. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).

Transport

Normal mail service

Normal mail service

Must never be printed. Transport of media or devices containing such data must be done through a trusted courier.

Must never be printed. Transport of media or devices containing such data must be done through a trusted courier.

Storage

No requirements

Secure office or other location. Room need not be locked if access to the building or floor is restricted to employees and authorised non-employees.

Must never be printed

Must never be printed

Disposal

No requirements

Information must be disposed of securely using strip-cut shredders or confidential waste bins which are certified for secure destruction.

Must never be printed

Must never be printed

information asset register
258KB
Risk Management Matrix.png
image
Risk Management Matrix 2019