The IOTICS ISMS
Leadership
Security at IOTICS starts with the commitment of our leadership team to support the operation, and enforcement of, the ISMS. Our Information Security Policy is signed off by the Chief Executive Officer and Chairman of the Board as demonstration of that commitment.
Access Control
Access to all IOTICS' corporate systems is controlled by our Access Management Policy and Procedures, which includes enforcement of strong passwords, multi-factor authentication and regular audits of granted privileges.
All staff are bound by the policy, including permanent employees, contractors, advisors and consultants.
We apply the principle of least privilege across all our systems.
Asset Management
IOTICS devices are controlled under our Asset Management Policy and procedures, which includes the use of endpoint security to provide automated OS patching, anti-virus, website filtering and encryption.
Training
All IOTICS staff, including permanent employees, contractors or consultants are required to complete mandatory Information Security training as part of their onboarding or return-to-work. Thereafter, all staff complete an annual refresher course to reinforce security procedures.
Training includes awareness of phishing and social engineering techniques, effective password management, and account protection.
Supplier Management
To protect our supply chain, IOTICS assesses the risk associated with all third party suppliers during onboarding, and annually thereafter.
We ensure that all critical suppliers can provide security assurances to the standard of ISO27001 as a minimum, and we verify the security processes in place for all other suppliers as appropriate for the services they provide and information they store or process for us.
Verification
The ISMS Management team assess the effectiveness of our controls through regular measurement of ISMS objectives, and these are further assessed by internal and external audits.
Information transfer
IOTICS leverages tier-1 cloud providers for the storage and processing of corporate data. We have implemented an Information Transfer Policy and procedure which aims to ensure that information relating to our business, customers, partners and suppliers is handled safely and appropriately according to its information security classification.
We do not store or transfer data on physical media (such as memory sticks) and instead use best-of-breed secure sharing capabilities provided by our corporate systems.
Secure Development
Our Product Engineering teams adhere to the Secure Development Policy and procedure, which ensures that our product is developed, tested and deployed in line with the best industry practice.
Our Product team regularly assesses vulnerabilities and threats which have been identified through threat analysis, security testing, penetration testing, or code review, as part of our product roadmap prioritisation processes.
We use automated tooling as part of our CI/CD architecture to continually cross-check with the National Vulnerability Database for relevant threats to our codebase.