Purpose
This Information Security Management System (ISMS) policy establishes the framework, principles, and
responsibilities for ensuring the confidentiality, integrity, and availability of the organization's information assets.
The ISMS is designed to protect against unauthorized access, disclosure, alteration, and destruction of sensitive
information, while also ensuring compliance with relevant laws, regulations, and contractual obligations.
Scope
This policy applies to all employees, contractors, vendors, and third parties who have access to the organization's
information assets, including but not limited to electronic data, physical documents, and verbal communications.
It covers all information systems, networks, and technologies owned, operated, or used by the organization,
regardless of location or platform.
Information Security Objective
Yoeki is committed to safeguard the Confidentiality, Integrity and Availability of all physical and electronic
information assets of the organization to ensure that regulatory, operational and contractual requirements are
fulfilled.
The overall objective for information security at Yoeki are the following:
- 1. Ensure compliance with current laws, regulations and guidelines.
- 2. Information is protected against unauthorized access and confidentiality of information is maintained.
- 3. Ensure Integrity of information to maintain accuracy.
- 4. Availability of information to authorized users when needed.
- 5. Information security training is given to all employees to motivate them to maintain the responsibility
for, ownership of and knowledge about information security, in order to minimize the risk of security
incidents.
- 6. Ensure business continuity even in case of a disaster.
- 7. To ensure legal & regulation compliance and contractual requirement.
Yoeki’s top management (CEO) has established an Information Security Team to implement, maintain and continuously
improve the Information Security Management Systems (ISMS).
Information Security Governance
Information security governance consists of leadership, organisational structures and processes that
protect information and mitigation of growing information security threats Critical outcomes of information security
governance include:
- 1. Alignment of information security with business strategy to support organisational
objectives.
- 2. Management and mitigation of risks and reduction of potential impacts on information
resources to an acceptable level .
- 3. Management of performance of information security by measuring, monitoring and
reporting information security governance metrics to ensure that organisational objectives are
achieved.
- 4. Optimisation of information security investments in support of organisational Objectives.
It is important to consider the organisational necessity and benefits of information security governance. They include
increased predictability and the reduction of uncertainty in business operations, a level of assurance that critical decisions
are not based on faulty information, enabling efficient and effective risk management, protection from the increasing
potential for legal liability, process improvement, reduced losses from security-related events and prevention of
catastrophic consequences and improved reputation in the market and among customers.
Management Responsibility
Information security governance consists of leadership, organisational structures and processes that
protect information and mitigation of growing information security threats Critical outcomes of information security
governance include:
- 1. Approve policies related to information security function.
- 2. Ownership for implementation of board approved information security policy.
- 3. Ownership for establishing necessary organisational processes for information security.
- 4. Ownership for providing necessary resources for successful information security.
- 5. Ownership for establishing a structure for implementation of an information security program
(framework).
Organisation Structure
Role |
Responsibilities |
Position/Individual |
Top Management |
- Ensure that the ISMS receives the necessary
resources and support.
- Provide leadership and strategic direction for
the ISMS.
- Participate in management reviews and
approve key ISMS policies.
|
CEO |
Chief Information Security
Officer (CISO) |
- Lead the ISMS team and overall responsibility for the ISMS.
- Ensure the ISMS is aligned with the organization’s business goals and ISO 27001 requirements.
- Coordinate the establishment, maintenance, and continual improvement of the ISMS.
- Ensure compliance with all legal, regulatory, and contractual obligations related to information security.
- Conduct internal and external audits of the ISMS.
- Prepare for third-party certifications and manage corrective actions from audit findings.
- Ensure compliance with data protection laws and regulations.
- Evaluate and manage third-party vendors for information security risks.
- Ensure third-party contracts contain appropriate security clauses.
|
Yogendra Tyagi |
ISMS Manager |
- Manage day-to-day activities of the ISMS.
- Monitor and measure security performance.
- Ensure risk management and compliance with security controls.
- Coordinate incident response activities and reporting.
- Prepare documentation and reports.
- Act as the main point of contact for information security.
- Conduct internal and external audits of the ISMS.
- Manage data privacy risks and breaches.
- Liaise with regulators and stakeholders for privacy-related issues.
- Conduct third-party risk assessments and audits.
- Manage vendor-related incidents.
|
Vishal Verma |
HR Manager |
- Oversee the integration of information security policies into the employee lifecycle (on boarding, training, and off boarding).
- Ensure employees are trained on ISMS policies and security awareness.
- Manage the disciplinary process for non compliance with security policies.
|
Naina Chauhan |
Risk Manager |
- Conduct and coordinate regular risk assessments.
- Manage the risk treatment plan and ensure that mitigation measures are implemented.
- Identify and evaluate new risks as they emerge.
- Ensure continual monitoring of risk across the organization.
- Implement and maintain technical security controls (e.g., firewalls, antivirus, encryption, etc.).
- Conduct vulnerability assessments and penetration testing.
- Ensure secure configurations for IT infrastructure.
- Investigate and resolve technical security incidents.
- Manage the incident response process.
- Coordinate detection, reporting, and resolution of security incidents.
- Document lessons learned from security incidents.
- Update incident response procedures regularly.
|
Default HOD |
Internal Auditor |
- Conduct internal audits to assess compliance with the ISMS.
- Provide recommendations for corrective actions and improvements.
- Track and verify that corrective actions are implemented.
|
|
Business Continuity Manager |
- Ensure the ISMS supports business continuity and disaster recovery plans.
- Test and review business continuity and recovery plans regularly.
- Ensure that critical systems and data remain available during incidents.
|
Vasant Kumar & Divyansh Singh |
Developer |
Software Team will ensure the following.
- Secure Coding Practices: Developers should follow the best practices in secure coding to minimize the risk of vulnerabilities (e.g., SQL injections, cross-site scripting, etc.).
- Testing and Validation: Regular security testing,
including vulnerability assessments and penetration
testing, should be performed during the
development and maintenance phases. This also
includes code reviews to spot potential security
flaws.
- Change Management: Any changes to the software
or underlying systems must be controlled and
documented in accordance with ISO 27001's
change management procedures.
|
Software Development Team |
Role & Responsibility
Information security organisation shall comprise of the following:
- 1. Chief Executor Officer
- 2. Chief Information Security Officer (CISO)
- 3. Information Security Manager(ISM)
- 4. Risk Manager
- 5. IT Operation
- 6. Information Asset Owner
- 7. Asset Custodian
- 8. Internal Audit
Risk Management
- Conduct regular risk assessments to identify, analyze, and evaluate information security risks and vulnerabilities.
- Develop risk treatment plans to mitigate identified risks to an acceptable level, considering cost, feasibility, and
impact on business operations.
- Monitor and review the effectiveness of risk mitigation measures and update risk assessments as necessary.
User Access Control
- Implement access control mechanisms, such as user authentication, authorization, and accountability, to prevent
unauthorized access to information assets.
- Enforce the principle of least privilege, granting users access only to the resources necessary for their roles and
responsibilities.
- Monitor user activity and enforce access controls using audit logs, intrusion detection systems, and security
incident monitoring.
- Access to Yoeki’s information, information systems (Infrastructure, applications, source code repositories) and
information processing facilities shall be controlled to prevent unauthorized access.
- Access shall be granted considering least privilege principle and on need to know basis only.
- Logs/records should be maintained for access granted to critical systems.
- Refer ‘User Access Management Process’ for further details.
Information Security Awareness and Training
- Provide regular training and awareness programs to educate employees about information security risks, policies,
and procedures.
- Encourage a culture of security awareness and accountability throughout the organization.
Incident Management
- Establish incident response procedures to detect, assess, and respond to information security incidents in a timely
and effective manner.
- Designate an incident response team and define roles and responsibilities for responding to security incidents.
- Document and report security incidents to senior management, legal counsel, regulatory authorities, and affected
parties as required by law or regulation.
Physical Security
- Implement physical security controls, such as access controls, surveillance cameras, and environmental controls,
to protect physical assets and facilities.
- Restrict access to sensitive areas, server rooms, and data centers to authorized personnel only.
- Regularly review and update physical security measures to address emerging threats and vulnerabilities.
Human Resource Security
Based on proper education, training, abilities, and experience, Yoeki will ensure that all personnel involved in information
security are competent. The required skills will be determined and assessed regularly, as well as an assessment of current
skill levels within Yoeki. This Training will be done by all Yoeki employees in order to ensure a level of information
awareness. The HR department will keep track of training, education, and other necessary data to document individual
skill levels.
- Screening or background checks will be performed at time of hire.
- Employees shall sign the organization’s terms and conditions of employment that includes the employee’s and the
organization’s responsibilities for information security, at the time of hire.
- Employees must take Information security and Data Privacy training at the time of hire and annually thereafter, or
as per the business needs.
Assets Management
Yoeki’s information assets must be appropriately protected from theft, loss or any unauthorized access. Assets may
include but not limited to:
- Documented business processes and activities (electronic or physical)
- Electronic information (data, spreadsheets, presentations, documents, notes, email etc.)
- Physical information (papers, signs, posters, etc.)
- Hardware (servers, laptops, desktops, printers, photocopiers, routers, switches, firewalls, mobile phones,
tablets, computing devices, etc.)
- Software (databases, applications, utilities, productivity software, cloud services, etc.)
- Network (communication links, wired network, wireless network, etc.)
- People (employees, contractors, interns, etc., as defined in this policy)
- Facilities (offices, network rooms, wiring closets, storage facilities etc.)
- An accurate and up-to-date inventory of critical assets shall be maintained. Critical assets are those, which
if compromised or lost, could cause significant business disruption or revenue loss. An asset owner must
be designated for each inventoried critical asset, though assets remain Yoeki’s property.
Acceptable Use
- Yoeki’s proprietary information shall be used or shared only to the extent it is authorized and necessary to
fulfill the assigned job duties of employees.
- Only Yoeki’s provided systems and laptops shall be used to access Yoeki’s emails and applications. The use
of a personal device is not recommended until approved.
- Any related data breach, credentials sharing and all related unwanted consequences will be treated under
Code of Conduct.
Cloud Infrastructure Security
- Yoeki’s IT infrastructure is set up on Yotta Data Center with own infra and ensures high availability,
scalability and security of its application and data.
- All access to the servers and managed services is private, unless proxied through a public secure resource.
- Internal vulnerability assessment is performed at regular intervals.
- Only authenticated users are allowed to access Yoeki’s Cloud Infra.
Equipment Security
- Equipment must be protected to minimize potential risks such as theft, fire, explosives, smoke, water,
dust, vibration, electrical supply interference, electromagnetic radiation, vandalism and unauthorized
access.
- Equipment must be protected from power failures and other disruptions caused by failures in electricity,
telecommunications, ventilation, air conditioning, etc.
- Appropriate protection must be applied to protect laptops, mobile phones, tablets, etc., while working
remotely from home or other offsite locations.
Business Continuity Management
Business continuity, within the context of an Information Security Management System (ISMS) policy, refers to
the strategies, plans, and procedures put in place to ensure the organization can continue its critical operations
and minimize the impact of disruptions or incidents that may threaten the availability of its information assets.
It involves proactive measures to identify potential risks, develop resilience capabilities, and establish effective response and recovery mechanisms. Yoeki defines business continuity as a fundamental aspect of the
organization's information security strategy, highlighting the commitment to maintaining the continuity of
business operations, safeguarding critical assets, and minimizing the impact of incidents. Yoeki shall take
following steps for the business continuity management;
- Yoeki shall plan for and implement the controls to mitigate the impact of disaster and timely resumption
of business activities and information security.
- Yoeki shall provide direction and support for business continuity
- Set the organizational requirements and expectations for business continuity
- Guide the implementation of appropriate policies, standards, processes, procedures, plans and
controls necessary to recover functions within the organization
- Define the roles and responsibilities of employees towards business continuity
- Perform annual mock drills of the business function to keep the Business Continuity measures up to
date.
Personal Data Protection
A. Privacy Notice
Where Yoeki collects Personal Data of an individual a privacy notice must be provided to the Data Subjects prior
to collection. All privacy notices should be approved by the top management before being published.
B. Consent Management
Data Subjects should be required to provide an explicit consent (such as selecting a checkbox) prior to submitting
their Personal Data to Yoeki. Consents provided by the Data Subject should be logged along with the date and
timestamp.
C. Records of Processing Activities
When a team at Yoeki processes Personal Data for performance of their activities, they must ensure that details
of such activities are captured in the Records of Processing Activities document. The records should be reviewed
annually to ensure that updates to the data processing activities are accurately reflected.
D. Manual Data Handling Guidelines
Where possible Personal Data should not be processed manually. For activities where Personal Data needs to be
processed manually an approval must be obtained from the top management.
E. Privacy Impact Assessment
A Privacy Impact Assessment (PIA) should be performed for all processes and applications relying on Personal
Data. The risk levels of an activity must be determined by the top management.
Related Standards, Policies and Processes
The following detailed policies provide principles and guidance on specific aspects of information security.
List of all Related Standards, Policies and Processes refer the 62. Document and Record Control.
Policy Violation
Failure to observe this policy may expose Yoeki to breaches of relevant laws, the loss of vital information or the
impairment of business operations, and cause significant damage to the public image and reputation of Yoeki. The
employees not complying with this policy may be subject to disciplinary action, up to and including termination of
employment.
Compliance and Monitoring
The organization is committed to complying with all applicable laws, regulations, and contractual requirements
related to information security, privacy, and data protection. Any deviations from this policy must be authorized
by senior management and documented appropriately.
18.1 Compliance Framework
- Definition: Establishing a framework for ensuring compliance with laws and regulations.
- Application: Yoeki will have a robust compliance framework from FY 24-25 onwards to ensure
adherence to applicable laws and regulations.
18.2 Monitoring and Reporting
- Definition: Monitoring compliance and reporting to relevant stakeholders.
- Application: Regular monitoring and reporting mechanisms will be in place from FY 24-25 onwards to
track and report on compliance with corporate governance standards.
18.3 Internal Audit
- Definition: Conducting internal audits to ensure adherence to policies and procedures.
- Application: Yoeki will conduct regular internal audits from FY 24-24 to assess compliance with
corporate governance policies and identify areas for improvement.
Continual Improvement
Yoeki policy about continual improvement is to:
- Increase the level of proactivity (and stakeholder perception of proactivity) about information security,
according to the Yoeki Policy on continuous improvement.
- Make information security processes and controls more measurable so that informed decisions may
be made
- Evaluate important metrics yearly to see if they should be changed based on historical data.
- Collect ideas for continuous improvement through regular meetings and communication with
stakeholders.
- In evaluating improvement recommendations, the following criteria must be used:
- Cost
- Business Benefit
- Risk
- Timeline for Implementation
- Resources required
Policy/Document approval
The ISO 27001 document/policy is approved or reviewed by the following persons/individuals;
Prepared By |
Yogendra Tyagi (CISO) |
Approved By |
Varun Burman (Director and CEO) |
Exemptions and exceptions
Any exceptions to this policy shall be approved by the CEO and documented.
Review and Amendments
- Regular Review: The policy will be regularly reviewed to ensure its effectiveness and relevance.
- Amendments and Updates: Amendments to the policy will be made as necessary, and updates will be
communicated to all employees/stake-holders.
Contact Information
Email: legal@yoekisoft.com
Published on – 24 December 2024
Version 1.1