Information Systems Register
FundApps' information systems register [Restricted to FundApps staff] contains any system (internal or external) that holds or permits access to information assets in our information asset register. For example, this includes:
Client instances
Amazon AWS (production data)
Google Mail (our own internal communications)
Identification
Information systems are identified as part of:
Supplier Review Procedure
Monthly security review meetings
Our software development lifecycle
Everyday working practice
Third-party vendors
This register includes information systems that FundApps depends on and that third-party vendors manage. As such, we evaluate business continuity and sufficient security controls as part of our assessment process.
Assessment
For each information system identified, we
Assign an owner (Supplier Relationship Manager) for the system.
Identify the business criticality.
Identify the data classification the system falls under based on the maximum data classification of the information stored.
Based on the data classification, identify information security and business continuity controls. This information is stored in our Third-Party Risk Management System.
Identify any specific risks relating to this third party and record them in our
Third-Party Risk Management System,
The Information Security Risk Register,
Business Continuity Risk Register, or
DPIA.
Review
Information systems are reviewed as part of our monthly security review meetings.
Last updated