COMPLIANCE
RISK-BASED APPROACH TO PROTECT YOUR DATA
InfoBridge information security compliance framework is based on the ISO 27001 standard. The ISO 27001 standard is an information security standard published by the International Organization for Standardization and currently the most widely used standard in the world.It is a specification for an information security management system (ISMS) including comprehensive coverage with recommended security controls. These controls help to address the risks that are identified and measured within InfoBridge.
InfoBridge 3 Lines of Defense strategy is based on the risk management principles adapted from ECIIA/FERMA Guidance on the 8th EU Company Law Directive, article 41, InfoBridge has focused its responsibilities to 3 key segments for effectively managing information security risks: 1 – operation, 2 – compliance, and 3 – assurance.
SECURITY GOVERNANCE BOARD
InfoBridge Security Governance Board consists of InfoBridge executive management team reporting to the CEO. They are responsible for the assurance function and all assets within the organization.
INFORMATION SECURITY STEERING COMMITTEE
InfoBridge Information Security Steering Committee is an appointed group of leaders from the respective business divisions within the organization. This team is responsible for the overall programs for our risk management as well as carrying out the protection of assets with an Information Security Management System.
InfoBridge security controls are based on a Risk Management Methodology that accounts for assets used and handled by InfoBridge. This framework appoints ownership assignment and responsibilities for all assets as well as any associated risks. As risks are addressed in several effective ways, a measurement system helps understand the key impact, likelihood, and overall score. This score is carefully assessed against our tolerance set by the asset and risk owners for each. The outcome is a decision on how to handle the risk in the form of a risk treatment plan.Risk treatment plans are intended to reduce the likelihood or impact of threats by better handling specific aspects that can be measured, monitored, and controlled.
InfoBridge incident management policies and procedures are based on the goals of quickly and efficiently dealing with information security incidents while maintaining optimal integrity of services. Based on ITIL Incident Management as well key concepts from the NIST service publication 800-61, the workflow and logic of the InfoBridge Incident Management Framework is focused on identifying and managing information security incidents. While the goals of our incident management framework are focused on identification and maintaining integrity of services, our program also accounts for corrective action and preventative actions to continuously make improvements.
Detection and reporting
Identification and classification
Investigation and AssessmentResolutionRecording / tracking
Closure
Continuous improvement
InfoBridge cloud services leverages the Microsoft Azure platform, therefore the underling infrastructure follows Microsoft Azure compliance standards, certifications, and supporting processes.
Microsoft Azure is compliant with more than fifty (50) of the top global compliance programs.
The primary landing pages for Microsoft Azure compliance information are the Trust Center https://azure.microsoft.com/en-us/support/trust-center/ and the compliance landing page https://www.microsoft.com/en-us/TrustCenter/Compliance/default.aspx
A recent white paper on Azure Security, Privacy and compliance is also available here: http://download.microsoft.com/download/1/6/0/160216AA-8445-480B-B60F-5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf
Azure certifications include
ISO/IEC 27001/27002 - https://www.microsoft.com/en-us/TrustCenter/Compliance/ISO-IEC-27001
PCI-DSS - https://www.microsoft.com/en-us/TrustCenter/Compliance/PCI
FISC - https://www.microsoft.com/en-us/TrustCenter/Compliance/FISC
BITS Shared Assets Program - https://blogs.microsoft.com/cybertrust/2013/09/17/financial-services-a-survey-of-the-state-of-secure-application-development-processes/
ENISA - https://www.enisa.europa.eu/
FIPS-140-2 - https://www.microsoft.com/en-us/TrustCenter/Compliance/FIPS
SSAE 16 – SOC1, SOC2, SOC3 -
https://www.microsoft.com/en-us/trustcenter/Compliance/SOC
ISO/IEC 27018 - https://www.microsoft.com/en-us/TrustCenter/Compliance/ISO-IEC-27018