Isms CRM Manual
Isms CRM Manual
Isms CRM Manual
Rev No. : 3
Date : 15-Dec-22
APPROVAL Page : 1 of 1
Approved By:
Issued By:
DOCUMENT SUMMARY:
Revision History
SL Ver
Document Reference No Document Name Dated Category
No.
3 ISMS_Man_003 ISMS Policy & Objectives 2.0 30th Sep 2019 Public
5 ISMS_Man_005 ISMS Roles, Responsibility and Authority 2.1 23rd Dec 2019 Restricted
9 ISMS_Man_009 Backup & Restoration Policy 2.0 30th Sep 2019 Restricted
13 ISMS_Man_013 Customer Data & Information Handling Policy 2.0 30th Sep 2019 Restricted
22 ISMS_Man_022 Internet Access and Security Policy 2.0 30th Sep 2019 Restricted
24 ISMS_Man_024 Log and Audit Trail Policy 2.0 30th Sep 2019 Restricted
25 ISMS_Man_025 Logical Access Control Policy 2.0 30th Sep 2019 Restricted
27 ISMS_Man_027 Network and Telecommunication Security Policy 2.0 30th Sep 2019 Restricted
29 ISMS_Man_029 Physical and Environment Security Policy 2.0 30th Sep 2019 Restricted
32 ISMS_Man_032 Social Media Usage Policy 2.0 30th Sep 2019 Restricted
34 ISMS_Man_034 Third Party Security Policy 2.0 30th Sep 2019 Restricted
36 ISMS_Man_036 Procedure for Control of Documents 2.1 23rd Dec 2019 Restricted
38 ISMS_Man_038 Procedure for corrective Action 2.1 23rd Dec 2019 Restricted
39 ISMS_Man_039 Procedure for Internal Audits 2.1 18th Dec 2020 Restricted
40 ISMS_Man_040 Procedure for Management review 2.0 30th Sep 2019 Restricted
42 ISMS_Man_042 Business Continuity / Disaster Recovery Plan 2.0 30th Sep 2019 Restricted
47 ISMS_SOP_002 IT Asset Procurement & Deployment Procedure 2.0 30th Sep 2019 Restricted
48 ISMS_SOP_003 Logical Access Control Procedure 2.0 30th Sep 2019 Restricted
49 ISMS_SOP_004 Physical Access Control Procedure 2.0 30th Sep 2019 Restricted
ISMS Manual
DOCUMENT SUMMARY
Revision History
TABLE OF CONTENTS
1.0 Scope
This Manual of Security Policies (“Policy Manual”) prescribes the policies that govern the
management and administration of the Information security management system covers
the location at Synergy Maritime Private Limited 4th Floor, AKDR Towers, Door No. 3/381,
Rajiv Gandhi Salai (OMR), Chennai – 600097, India.
The purpose of this document is to provide management direction and control to address
information security needs in accordance with the relevant laws, regulations & contractual
obligations. This document lays down the processes for security enhancement and
recommends best practices to be followed at Synergy Maritime, (hereinafter referred to as
“Synergy”)
1.1 Audience
This document is written for personnel covered by information security policy at three distinct
levels:
High-level managers who need to understand some of the risks and implications
associated with security breach and so that they can appropriately allocate resources
and delegate responsibility,
Mid-level managers who will need to set company-specific policies, and
Administrators and technical people who need to understand the technical controls
they will have to implement along with implications of the same.
End users who are to maintain actions in line with the acceptable usage policy for
all company resources and are to assist in all forms of security related to the company
functioning.
1.2 Ownership
CISO is the owner of the Information Security policy and will drive all reviews and
changes in conjunction with the other representatives involved in creation of the policy
that will collectively formulate a Security Organisation within Synergy.
Primarily these representatives are
1. Information System Security Manager
2. System Engineers/Administrators
3. Network Administrators
4. Database Administrators
3. Effect of changes to technology, which will lead to changes in the policy in terms
of operation of components such as
a. Servers
b. Desktops,
c. Applications,
d. Links of connectivity
e. Security devices
f. Risk assessment results
g. Personnel additions and resulting training
h. Any other component that may be deemed to form a critical part.
5 July 2017
Authentication: To positively verify the identity of a user, device, or other entity, often as
a prerequisite to allowing access to resources.
Authenticity: Determining that information is in its original form and that it has come from
the appropriate party.
Availability: The Property of being accessible and usable upon demand by an authorized
entity.It means that access to information and information systems is not denied to
authorized users when required.
Least Privilege: The concept of least privilege dictates that individuals are given only those
accesses and rights necessary for job completion, and no more.
Policy: Established compulsory guidance that provides high-level goals and objectives.
Privacy: As used in this policy, security provides enforcement of privacy policies. This policy
does not define privacy or provide guidance for privacy policies; those are found in
administrative rules, state and federal laws, and other state and federal policies and
standards.
Risk Management: The total process to identify, control, and minimize the impact of
uncertain events. The objective of the risk management program is to mitigate risk as much
as possible and identify residual risk.
Security: The ability to protect the integrity, confidentiality, and availability of information
processed, stored, and transmitted by an agency and to protect information technology (IT)
assets from unauthorized use or modification and from accidental or intentional damage or
destruction.
Security Requirements: Types and levels of protection necessary for equipment, data,
information, applications, and facilities.
Threat: A potential cause or an unwanted incident that may result in harm to a system or
organization
Abbreviations
AV Anti-Virus
CA Certifying Authority
DR Disaster Recovery
H/W Hardware
IP Internet Protocol
IS Information System
IT Information Technology
MD Managing Director
Mgmt Management
PC Personal Computer
Location:
Synergy Maritime Private Limited
4th Floor, AKDR Towers,Door No. 3/381, Rajiv Gandhi Salai (OMR), Chennai – 600097, India
Location:
Synergy Navis Marine Private Limited
Onyx, 3rd Floor, N Main Rd, Koregaon Park, Pune, Maharashtra 411001.
Location:
Synergy Maritime Recruitment Services Private Limited
601, Prudential Building, Central Ave, HiranandaniGardens, Powai, Mumbai, Maharashtra 400076.
Location:
Synergy Marine Germany GmbH
Überseeallee 3, 20457 Hamburg, Germany.
Location:
Synergy Maritime Pte Limited
1 Kim Seng Promenade, #10-11/12 West Tower, 237994
Location:
Synergy Yangon Private Limited
No.25, Shwe Taung Kyar Street, Quarter No.2, Bahan Township, Yangon, Myanmar.
Location:
Synergy Denmark A/S
Kay Fiskers Plads 10,
2300 Copenhagen S, Denmark.
Note: The scope statement has been defined, so as to provide maximum flexibility after
adapting. The scope will be reviewed, and appropriate changes will be incorporated based on
the business needs, Mission, vision and Belief - https://www.synergymarinegroup.com/mission-
vision-beliefs/
5.0 Leadership
5.1 Leadership and commitment
Information Security Steering Committee (Hereafter referred as ISSC) is directly involved and
committed to implement Information Security Management System at Synergy. To show direct
involvement and strong commitment towards Information Security Management System, ISSC has
established information security policy and objectives, Integrated information security
management system requirements into the organization’s process and the formed the Information
Security Team, Business Continuity Management Team and Security Maintenance Team and
defined the roles and responsibilities for these teams. Synergy is conducting periodic Internal
Audits, Conducting periodic Management Review Meetings. To show the continual improvement
of the Information Security Management System, ISSC has set some measurable objectives to
achieve the goals.
5.2 Policy
Synergy has established the information security policy and objectives, approved by the top
management and communicated to the employees and other relevant interested parties.
Refer: ISMS_Man_003
Refer: ISMS Roles, Responsibility and Authority ( ISMS_Man_005) and CRM Manual (ISMS_Man_48)
6.0 Planning
6.1 Actions to address risks and opportunities
6.1.1 General
Synergy has determined the risks and opportunities for issues and requirements identified in 4.1
and 4.2 sections and this will address to
a) ensure the information security management system can achieve its intended outcome (s)
b) Prevent, or reduce, undesired effects; and
c) achieve continual improvement
Synergy will plan to take actions to address these risks and opportunities and integrate and
implement the actions into its information security management system processes and evaluate
the effectiveness of these actions
Refer: ISMS_Man_003
7.0 Support
7.1 Resources
Synergy has determined and provided the necessary resources needed for the establishment,
implementation, maintenance and continual improvement of the information security
management system
7.2 Competence
a) Synergy determined the necessary competence of employees doing work under its control
that affects its information security performance.
b) Synergy ensures that these employees are competent on the basis of appropriate education,
training, or experience
c) Where applicable, take actions to acquire the necessary competence and evaluate the
effectiveness of the actions taken
d) retain appropriate documented information as evidence of competence .
7.3 Awareness
Synergy provides trainings to all its employees regularly on information security management
system.
a) Training is managed by the training function, which coordinates the training needs and
maintains the records of all the training conducted.
b) Training courses and programs are conducted to meet the needs of all personnel in the
respective functions both at the entry stage and on a continual basis.
c) Training calendar maintained by HR manager is revised as and when new technology and
concepts are introduced, and is made available to all affected people.
d) ISMS concept and process awareness training is conducted to all the personnel’s in the
organization.
e) The HR manager maintains records of education, previous training and experience.
f) The HR manager maintains the training records for all internal and external training.
g) The training function based on a feedback sought from the participants evaluates the training
programs conducted internally and performs a feedback analysis. Based on this analysis,
corrective actions are identified and taken.
7.4 Communication
Synergy determines the need for internal and external communications relevant to information
security management system.
Internal communication regarding the ISMS flows two ways:
Management will communicate to the organization about the ISMS policy and objectives, set of
information security policies, procedures, customer’s legal and regulatory requirements,
contractual obligations etc.
The organization ISMS committee communicates about ISMS performance, the effectiveness of
the ISMS, customer feedback, and opportunities for improvement.
Information is communicated through:
Paper or electronic documents, such as manuals, procedures, policies, isms records, reports,
etc.;
E-mails, memos, and meetings;
Training and awareness programs.
Each Operational heads have the overall responsibility for ensuring that all pertinent documents,
reports and records are distributed to appropriate departments and functions, and that information
and data about ISMS performance and the effectiveness of the ISMS are reported to the top
management through the CISO.
Refer: ISMS_Man_043 (Communication Matrix)
For the control of documented information, Synergy will address the following activities, as
applicable:
c) Distribution, access, retrieval and use;
d) Storage and preservation, including the preservation of legibility;
e) Control of changes (e.g. version control); and
f) Retention and disposition.
8.0 Operation
8.1 Operational planning and control
Synergy will plan, implement and control the processes needed to meet information security
requirements, and to implement the actions determined in 6.1. Synergy will also implement plans
to achieve information security objectives determined in 6.2.
Synergy will keep documented information that the processes have been carried out as planned.
Synergy will control planned changes and review the consequences of unintended changes, taking
action to mitigate any adverse effects, as necessary as per change management procedure.
Synergy has not outsourced any processes.
Synergy is Monitoring & Reviewing the Information Security Management System to execute the
following
a) To detect errors in the results of processing promptly
b) To identify failed and successful security breaches and incidents promptly
c) To enable management to determine whether the security activities delegated to people or
implemented by information technology are performing as expected
d) Determine the actions taken to resolve a breach of security reflecting business priorities.
e) To undertake regular reviews of the effectiveness of the ISMS (including meeting security
policy and objectives, and review of security controls) taking into account results of security
audits, incidents, suggestions and feedback from all interested Parties.
f) To Review the level of residual risk and acceptable risk, taking into account changes to the
organization; technology; business objectives and processes; identified threats; external
events, such as changes to the legal or regulatory environment and changes in social climate.
g) To conduct internal ISMS audits at planned intervals.
h) To undertake a management review of the ISMS on a regular basis to ensure that the scope
remains adequate and improvements in the ISMS process are identified.
1) The organization’s own requirements for its information security management system; and
CISO will plan, establish, implement and maintain an audit program, including the frequency,
methods, and responsibilities, planning requirements and reporting. The audit programme(s) shall
take into consideration the importance of the processes concerned and the results of previous
audits;
CISO will define the audit criteria and scope of each audit. CISO will ensure that objectivity and
the impartiality of the audit process while selection of auditors and conduct audits.
CISO will ensure that the results of the audits are reported to relevant management; and retain
documented information as evidence of the audit programme(s) and the audit results.
b) Changes in external and internal issues that are relevant to the information security
management system;
The outputs of the management review will include decisions related to continual improvement
opportunities and any needs for changes to the information security management system.
10.0 Improvement
10.1 Nonconformity and corrective action
Synergy will handle the Nonconformities and corrective actions, as per the documented
“Nonconformity and corrective action procedure.
Annexure A
The Synergy Information Security Policies document is prepared and approved by the management. The
document is classified as public and circulated to all employees and relevant external parties.
The Information Security Policies will be reviewed yearly once or if significant changes occur to ensure
their continuing suitability, adequacy and effectiveness.
Duties have been segregated to eliminate negligent or deliberate system misuse. IT team members are
cross-trained so that expertise / access for a certain system do not lie with a single employee. Critical
servers / applications logs shall be independently verified for security breaches & hardware / software
alerts.
Synergy uses the services of law enforcement authorities to protect its assets from natural and unnatural
calamities. List of contacts of law enforcement authorities is available with IT department and Synergy
physical security team would also co-ordinate with these authorities in emergencies.
Regular fire drill exercises shall be carried out, which would be conducted by the designated fire experts
hired by the owners of the building.
All communication to external authorities shall be approved by CISO and shall designate point of contact
for defined activities or target authorities.
Synergy encourages its employees to be part of special security forums and professional associations to
keep abreast with the latest security breaches, threats and technology developments, which would
improve knowledge about the best practices ensuring the learning’s are inculcated in their function and
workplace. It has been made mandatory that no information internal to the organization shall be
exchanged in these forums. Employees will inform the CISO of their membership to such groups and
have to get approval for disclosing any non public information to such forum or group.
Information security will be addressed in all the projects which are handled by the Synergy. Project
heads will review information security during the project initiation and project heads are responsible to
address the information security requirements in the part of project plan.
Users shall take care while using mobile computing facilities in public places, meeting rooms and other
unprotected areas outside the organization’s premises as per the mobile computing Policy. When used
in public places, care shall be taken to avoid the risk of overlooking by unauthorized persons. Unattended
mobile computing devices shall be physically secured by means of lock in a desk drawer or filing cabinet,
or attached to a desk or cabinet via a cable lock system. Users shall carry the mobile computing devices
as hand baggage during travel. All mobile computing devices are insured.
A.6.2.2 Teleworking
Synergy shall allow tele-working on specific request and approval by respective reporting manager to
specific services like E-Mail, Intranet Server and not the entire network when not on local network. Alos
Synergy has established and implemented the Teleworking policy.
A.7.1.1 Screening
Background verification and screening shall be conducted as per the company HR guidelines; however,
it shall include verifying certificates, relieving letter, experience proof, Address proof, contact numbers,
email confirmation especially on experience & conduct from previous employer.
(Ref: HR Operations - Process Guideline)
While defining the terms and conditions of employment/ job contract, HR Manager, ISSM and CISO shall
ensure that employee/third party agree and sign the offer letter / terms and conditions of the
employment contract, stating clearly their responsibilities for Information security of Synergy.
Security briefings shall be given to new staff (Employee, Third party) who shall be provided access to
IT systems, information and assets. These briefings should become part of the induction program of a
new employee.
The briefing shall include:
The access requirements of their position.
Their responsibilities for safeguarding sensitive information and assets.
Relevant sections of legislation applicable to their position.
IT security policy, rules and regulations.
Procedures for reporting security breaches, violations and concerns
ISSM will conduct regular security awareness sessions (Video, Seminars etc.) as well as trainings users
as relevant to the job functions.
A formal disciplinary process is put in place to deal with employees who have allegedly violated
company security policies and procedures. A disciplinary procedure is formulated and followed.
(Ref: Disciplinary Process)
Synergy inventory is maintained for each hardware, software, personnel, People and informational asset.
Every asset is labeled as per approved naming / labeling scheme.
Inventory Audit
Inventory Audits for IT assets shall be conducted by IT team every six months.
ISSM is the sole designated owner of the current assets in the organization with User & Custodian roles
well defined by Synergy. Currently it is ISSM the owner of the assets of the organization and outsourced
partner is the custodian of the IT of Synergy.
ISSM have defined policies [internet usage, email policy, guidelines for mobile devices] for acceptable
use of information and asset issued to user. The acceptable use criteria shall be reviewed and
communicated including identification of new risks with implemented controls as per mitigation plan.
HR to ensure that staff (Employee, Third Party) returns all assets (badges, Secure ID, keys, documents,
etc.) issued to them.
Refer: Exit Form
Naming nomenclature is used for each information asset. Information asset will bear the label with Asset
name as per defined Asset naming Scheme. Asset name is used for Asset tracking purpose.
The purpose of asset classification is to help identify the assets of Synergy and their importance for
business continuity. It also helps Synergy in the creation, classification, storage, movement, handling,
reproduction, transmission, disposal and management rights of information.
All information (whether it is Synergy owned or client owned) shall be labeled as per the Classification
of Assets Procedure.
Synergy has established the Classification of Assets Procedure in the organization to handle the assets
in accordance with information classification schema.
Output from systems containing classified information shall have classification label. The labeling shall
reflect classification according to the rules established as per classification procedure defined by Synergy.
The items for classification includes printed reports, screen displays, recorded media (e.g. – tapes, cd,
DVD), electronic messages and file transfers. Information stored on computer media, systems (Servers,
Workstations, and Laptops), Mail Systems, or printed shall be stored and handled in accordance with
Security guidelines. Printed non-public information shall be locked or be under vigilance of ISSM. In
Synergy, all non-public information shall be password protected (authentication guideline), encrypted,
locked, or handled by ISSM based on sensitivity and value.
Postal & Electronic Mailing - Company Restricted printed information sent through internal mail, private
mail, or by courier should be sent by trusted liasoned courier or registered mail. Methods of mailing that
do not allow tracking are discouraged.
At Synergy all information shall be stored on enterprise server environment, which are protected against
any hardware malfunction / failure.
As a policy Synergy shall not encourage any data restoration/recovery from any hardware
malfunction/failure of user workstation hard disk. Hard disk which is found faulty shall be identified &
verified by the IT team for physical recovery (repair). If the physical recovery is not possible, then the
hard disk shall be destroyed and disposed.
Synergy has established the Media Handling Procedure to handle the media securely.
Media containing information shall be protected against unauthorized access, misuse or corruption
during transportation.
Below mentioned measures shall be considered while media transportation.
Reliable mode of transport / courier should be used
The media should be packed sufficient enough to protect from physical damage or
from environmental factors
Measures such as delivery by hand, splitting of the consignment etc. should be
followed and recorded.
Synergy has established access control policy and Access Control Procedure in the organization. Any
access to sensitive information shall be based on “need to know” principle. Any access granted shall be
based on the business requirements and necessity for the job to be carried out.
Access to networks and network services is restricted based on the business requirements and handled
in accordance with Access Control Policy and Access Control Procedure.
Human Resources Department shall forward information regarding all new employees to ISSM who in
turn coordinates with IT team. IT team after getting approvals from ISSM assigns unique ids and default
passwords to the new users with access privileges. Users are provided with the capability to change their
password on the login interface (after authentication). New users shall be acquainted with the Synergy
organisational Security policy and access procedures and violation of any shall be taken seriously. Access
privileges of users leaving the organizations shall be revoked as soon as Human Resources Department
informs IT team.
Synergy has established formal User Access Control Policy and Access control procedure to assign or
revoke access rights for all users
The privilege allocation is only on need to know basis and shall be reviewed & documented bi- annually.
All the privileged user passwords for Operating Systems, Databases, Applications, Network Equipment
like routers, switches etc., are sealed in an envelope and kept in custody of CISO.
The allocation of secret authentication information is handled in accordance with Password Policy and
User Password Management Procedure.
An initial password is provided to the users & the system configured to force the users to change the
initial password immediately after the first logon. Review of Users Access Rights Privileged user accounts
/ application access rights are reviewed half yearly. Application/Data owner would be responsible for
any change in access to the application/data for a user and the same change shall be communicated to
the IT team for facilitating the access control change.
Access to data, programs, and applications shall be immediately removed for employees who are
transferred from the business unit for project needs.
The access rights of all employees and external parties to information and information processing
facilities will be removed upon termination of their employment, contract or agreement or adjusted upon
change. Dept / project heads are responsible to ensure removal or adjustment of access rights upon
termination of their employment, contract or agreement or adjusted upon change.
Synergy has established the Password Policy and User Password Management Procedure across the
organization to use and handle the secret authentication information.
Access to information and application system functions shall be restricted as per the Access Control
Policy.
Synergy will ensure Password management system will be interactive and quality password and also
adopted, that meets most of the following requirements
Easy user management.
Safe and secure storage of passwords.
Encrypted password / key exchange during authentication process.
Auditable.
Automatic change of passwords.
Password policy enforcement.
The use of utility program that might be capable of overriding system and application control is
restricted and tightly controlled.
Access to the operating system commands and system utilities will be restricted to authorized personnel
for system administration and management functions. The use of these utilities will be strictly controlled.
Redundant system utilities and software, including compiler programs, must be removed.
Latest service packs and patches will be applied after adequate testing to prevent the exploitation of
the known vulnerabilities of the system utilities.
Access to program source of operational systems will be controlled and is restricted to Applications and
Service Delivery Manager to prevent any corruption of the application programs. The Synergy will use
configuration management process and identify program librarians to maintain source libraries of
operational application systems in configuration management database. All updates or issue of program
sources to developers will be carried out through an authorized request. Configuration management
database will maintain the version control of all the programs and strict change control procedures will
be followed for any modifications to the program source library.
A.10 Cryptography
Refer: Cryptographic control Policy
Cryptographic controls for protection of information is developed and implemented. This will be managed
as per the Cryptography Policy
IT team & Admin team shall ensure that the Server Room and Information Assets are protected against
unauthorized physical access, damage, and interference.
Based on the security requirement of the assets and risk assessment, the security perimeters have been
defined and shall be reviewed from time to time. All entry and exit points of Synergy have been protected
with access cards and physical security.
Synergy premises are protected by access cards to ensure that only authorized personnel are allowed
access.
Arrangement has been made to house Project/Program Teams handling sensitive projects/Programs for
clients, in separate secure areas. Access to such areas has been limited to authorized personnel only.
Physical protection against damage from physical protection against natural disasters, malicious attack or
accidents shall be designed and. The following guidelines will be considered to avoid damage from fire,
flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster:
Hazardous or combustible materials will be stored at a safe distance from a secure area.
Bulk supplies such as stationery will not be stored within the secure area.
Fallback equipment and back-up media will be sited at a safe distance to avoid damage
from a disaster affecting the main site.
Appropriate fire fighting equipment will be provided and suitably placed.
Synergy Security Personnel will undertake vigil rounds in periodical intervals and mark their
findings within the office premises.
Personnel will only be made aware of the existence of activities within, a secure area on a need to know
basis. Unsupervised working in secure areas should be avoided both for safety reasons and to prevent
opportunities for malicious activities. Vacant secure areas will be physically locked and periodically
checked. Photography, video, audio and other recording equipment shall not be used in secure areas
unless authorized by Management. The service providers / third parties working in secure areas shall
always be escorted and monitored.
All new equipment landing at the premises shall be redirected to a secure isolated room till installation.
This room shall be properly secured by lock and key and protected against environmental hazards like
sun and rain. The equipments shall be unpacked and checked for the condition of the equipments. The
IT & ISSM shall check the equipments and make note of the equipment details and quantity. An inward
entry shall be made in the register.
The servers and network devices are kept in the secure zone. All the critical servers and equipments are
placed in rack environment so that it is not easy to remove any information facilities. Moreover card
controlled gate is implemented for data center. Access is provided to data center only for authorized
users. Alarms and other precautions are in place. Proper lightning conductors are in place in the building.
The environmental condition of the secure zone is controlled. Suitable modular UPS is deployed to feed
power to the critical equipments.
IT Team shall ensure the following to protect equipments from failures or disruptions:
Redundant sources of power supply in case of power failure. IT Team and Admin team shall plan,
evaluate and make arrangements for deploying power filters and uninterrupted power supply systems
across the organization to reduce risks of equipment damage because of electric fluctuation or outage.
IT team shall ensure that uninterrupted power supply system is installed to supply power to all critical
equipment in the server room. Emergency lighting shall be readily available in case of main power
failure.
Backup telecom links wherever necessary and shall be responsible for maintenance, up-gradation
and monitoring of the same. All power and telecommunication equipments are kept in securely in
enclosed areas under lock and key. Security personnel shall also monitor these areas.
Air-conditioning shall be maintained for housed equipments to ensure the smooth cooling and
functioning less than 19-23 degree centigrade with humidity levels maintained around 35 % – 50 %.
Fire protection - All important places are fitted with fire alarms and heat sensors. Fire extinguishers
are kept at appropriate locations. Fire exits are provided. Fire drill shall be conducted regularly to check
the functionality of fire equipment. User awareness training is provided to all Synergy employees.
Cabinets & Racks - All critical equipment in the server room are installed in racks or cabinets. These
cabinets shall be equipped with power strips, monitor, keyboard & mouse switch. The cabinets chosen
shall have ventilation to ensure the dissipation of the heat generated from the components within the
rack.
All electric and telecom cables are being laid underground through internal Conduits. Power and Data
cables have been segregated and run through separate conduits.
All equipments come with 1/2/3 warranty based on the type of component to take care of preventive
maintenance, replacement and repair during warranty period of the equipment. IT Team shall
recommend preventive service maintenance schedules for all sensitive equipment and ISSM shall
oversee this activity. At the same time IT Team shall ensure that
Ensure service schedules are adhered to.
Only Authorized Maintenance Staff shall have access to sensitive equipment for preventive
maintenance, replacement or repair purpose.
Fault Logs and Maintenance Reports are up-to-date for all servers and critical network and
power conditioning equipment.
Synergy equipments that are not in use or standby equipments are kept safely in the
storeroom. This room is secured using lock and key.
Equipments carrying information and software cannot be taken off-site without the written approval
from CISO / ISSM.
Refer: Gate pass
The use of any information processing equipment outside the Synergy premises shall be authorized by
CISO. In the eventuality of misuse, the equipments shall be password protected, which shall not allow
access to it. Security checks shall be put while taking out the equipment and it shall be allowed, if
required only after the approval of CISO / ISSM. Financial risk can be handled through Insurance and
interruption to work can be minimized by maintaining backup of information.
Before disposing off, all information and software programs shall be removed from existing equipment.
All such equipment shall be removed only after necessary approval from CISO / ISSM
The disposal methods should be applicable as per the security classification of the asset or the
information; Mechanisms for disposal shall be –
Crush the equipment.
In case of outdated equipment - the data shall be destroyed/sanitized and the hard disk
is degaussed/zero filled and given to staff or charitable organizations.
Users shall be responsible for safeguarding key data by ensuring that desktop machines are not left
logged-on when unattended, by providing password protected screen-savers and by logging out or
locking the desktop.
Terminal sessions to any network devices / applications shall be terminated after 5 minutes of inactivity.
Terminal sessions to workstations/servers shall be terminated after 5 minutes of inactivity.
As per this policy no unattended documents or papers should be lying near user workspace. The users
shall shred any such document that is not of any use. Housekeeping shall shred any unattended papers
lying in work area or printer area. Staff shall be required to store any secure or sensitive information in
a secure storage if it is left unattended for more than an hour. All documents shall be kept in a secure
storage provided to the users and key shall not be left unattended in or near the secure storage device.
All systems shall have password-protected screensavers activating after 5 minutes of non-use.
A. 12 Operations security
Refer: Function specific SOP’s, change Management Policy, Capacity Management Policy, Antivirus
Policy, Backup & Restoration Policy, Application Security Policy, Logical Access control Policy , Log and
Audit Trail Policy and CRM Manual (ISMS_Man_48)
Changes to organisation, business processes and information processing facilities and systems
shall be done in controlled manner. Changes to the operational systems should only be made when
there are adequate business reasons to do so. All changes to equipment, software, application or
procedures shall be done formally by following the Change Management Procedure.
This will be applicable to critical systems and information processing facilities, and would include but not
limited to:
Changes to hardware and software configurations.
Changes to operating systems and operating system configurations.
Changes to application software programs and application or database software
configurations.
Changes to network and communication device configurations; and
Changes to configuration of physical access and environmental control devices.
Changes to Synergy processes, ISMS policies and procedures.
With the demands of business growth, Synergy shall strategize capacity planning to ensure availability
of the resources with least disruption keeping in consideration the increasing volumes of data, no of
users, network traffic, etc. CISO / ISSM shall plan along with IT Head, the future projections and
enhancements based on the business growth forecasts. CISO along with ISSM shall plan procurement
and deployment strategies based on the growth plans for information processing facilities of Synergy.
Necessary testing shall be undertaken and product suitability reports shall be prepared before final
procurement and deployment of new hardware /software would be done. These reports shall be shared
with the Top Management.
Development, test and operational environments are separated to reduce the risks of unauthorized
access or changes to the operational environment.
Synergy will ensure that information and information processing facilities are protected against malware.
Users are required to comply with software licenses and prohibiting use of unauthorized software,
obtaining software files from external sources.
Servers/applications hosting environments shall be reviewed to identify unapproved or unauthorized
files. Files received from an unknown or distrusted source are checked for virus before use. Electronic
mail attachments and file downloads from internet shall be scanned using an approved antivirus
software. Virus detection and prevention measures and appropriate user awareness procedures are
implemented to contain the virus in the network. Protection shall be based on awareness, change
management and system access controls. There are established Business continuity plans and
arrangements for recovering from virus attacks.
A.12.3 Backup
A.12.3.1 Information backup
Backup of the organization’s data files and software shall be made available following a disaster or media
failure. The backup of the information and software shall be carried out based on the documented
Backup policy of Synergy. The archiving of data shall meet the legal and regulatory requirements.
Refer: Backup and Restoration Policy (ISMS_Man_009)
All servers and systems shall be configured to log activities. All security-related events on critical or
sensitive systems must be logged and audit trails saved as follows:
All security related logs will be kept online for a minimum of 1 week.
Daily incremental tape backups will be retained for at least 1 month.
Weekly full tape backups of logs will be retained for at least 1 month.
Monthly full backups will be retained for a minimum of 3 months.
Yearly full backup will be retained for a minimum of 1 year
System logs shall be preserved for a period of 3 months and shall be available for
reference on site for checking of the logs in case of review.
Security-related events will be reported to Security team, who will review logs and report incidents to IT
management. Corrective measures shall be prescribed as needed. Security-related events include, but
are not limited to:
Evidence of unauthorized access to privileged accounts
Anomalous occurrences that are not related to specific applications on the host.
Changes to system configuration
Auditing of events on critical Windows systems such as successful logons, unsuccessful
logons
Privilege modifications
Access to log information shall be restricted to administrators only and shall be protected against
tampering and unauthorized access. System logs shall not have provisions for editing. Access to the
system log shall require privileged access and shall be protected by password control.
Operations performed on the server /applications shall be logged for reference. Enterprise servers /
applications shall be monitored for availability and performance. Discrepancies in the server / application
performance / errors shall be rectified and logged for analysis and corrective action. Logs shall be
independently verified for security breaches & hardware / software alerts. CISO shall be reviewed these
logs periodically.
Synergy shall synchronize all servers and network devices with a Timeserver. This Time server is
configured to sync with internationally used Timeservers. This helps to validate all logs and events with
accurate time stamps.
Procedures are in place to control the installation of software on operational systems and any upgrades
shall be take into account the business requirements for the change and the security of the release and
install.
IT team to implement an effective technical vulnerability management in order to minimise risks resulting
from exploitation of published technical vulnerabilities.
IT team to ensure that timely information about technical vulnerabilities of information systems being
used is obtained and organization’s exposure to such vulnerabilities evaluated and relevant measures
taken to mitigate the associated risks, which could include risk assessment, patching, asset tracking and
reconnaissance of the organisation. Half yearly audit of the technical vulnerabilities shall keep Synergy
abreast of the security breaches and published technical vulnerabilities.
Synergy- has restricted users to install any software on operating system. Only authorized users shall
install licensed software. IT Team shall maintain the software inventory.
Audit of operational system shall be planned by the ISSM and authorized by the CISO. ISSM must assess
the risks from the proposed audit on operational system and advise on necessary risk mitigating steps.
IT team shall install network management software to monitor systems or distribute software to client
systems or automate any other aspect of network management. Access to information available through
the Synergy network systems must be strictly controlled in accordance with approved access control
criteria, which is to be maintained and updated regularly.
The network shall have been designed to deliver high performance and reliability to meet the needs of
the business whilst providing a high degree of access control and a range of privilege restrictions.
Suitably qualified staff shall manage the Synergy network, and preserve its integrity in collaboration with
the nominated individual system owners. Networks administration team shall take care install structured
cabling system for both data and voice and shall comply with industry standard.
All Workstations shall be configured for a unique identity before connecting to the Local Area Network.
Access to the LAN is provided as per the Access Control Policy. The WAN links and routers shall be
managed and monitored by corporate approved vendor. Internet traffic shall flow only through the
content filtering tool. Authorized traffic from the firewall is defined on the content filtering security policy
is allowed to pass. The default firewall policies shall be configured to implicitly deny all traffic. Firewall
screens packets use stateful inspection methodology. The IDS extends the security capabilities of
firewalls by providing real time scanning of incoming and outgoing network traffic. Clocks of information
systems shall synchronized for accurate recording of instances.
Synergy uses a combination of Firewalls and Intrusion Detection tools to safeguard and monitor its
information assets. All points of entries to the Internet are protected by Firewall. The firewall is
configured with three levels of security.
Low security: External
Middle level security: DMZ (Future use)
High security: Internal
All servers are located in the High security area. The firewall is also used to provide the client with a
single NAT address. Intrusion detection systems are configured to check for untoward activities. These
activities are logged and appropriate actions are taken. All Internet accesses are monitored and
controlled using URL monitoring and filtering software’s. All incoming Emails are scanned for viruses and
attachments on the email gateway. These events are logged.
Routers are configured with access lists and login is provided based on the IP address. Terminal time
outs are configured on all routers. All events are logged on the centralized log server.
Currently Synergy architecture setup is facilitated in true concept of the network segregation. VLANs are
configured on the local LAN for Security, better performance, availability and for logical segregation.
ACLs shall be defined to ensure the authorised personnel access the informational resources.
All computer hardware, software and any data storage medium (for example, hard drives, floppy disks, CD-
ROM, videotape, cassette tape, USB etc.) and all other modes of electronic communication including the
voice mail system in Synergy are the property of the Synergy.
Synergy has a legitimate business interest in the proper utilization of its property. Therefore any use of
Synergy property, and any communication sent or received via electronic mail, the Internet, the intranet,
voice mail or otherwise, may be monitored or reviewed by persons authorized by the Company, at any
time with or without notice to employees.
Access passwords shall provide certain degree of security, however it does not guarantee complete
privacy and passwords are strictly confidential to avoid misuse of Login Ids.
Information and software shall be exchanged electronically via e-mail, external links to clients & business
associates, information networks and Internet as per the email and communication policy established
by Synergy.
E-mail, voice mail, computer files or any other communication means shall not be used to send personal
information, including any obscene information or discuss private matters about anyone, including the
self. Any defamatory, insulting or derogatory remark about any person or group of persons via any of
these communication channels shall be considered as prohibited. Any employee found, who violates this
policy shall be subjected to disciplinary action, including termination.
Business information of the Synergy will be exchanged with outside organizations as per appropriate
security clauses in the formal agreements/ contracts. The relevant information asset owners will be
responsible for ensuring that such information assets are exchanged only after signing appropriate
agreements.
Electronic Messaging Device (EMD) includes Personal computers, electronic mail systems, voice mail
systems, electronic bulletin boards, Internet services, mobile data/digital terminals, and facsimile
transmissions.
EMD's are designed and intended for conducting business of Synergy and are restricted to
that purpose.
Transmission of electronic messages and information on communications media shall be
treated with the same degree of propriety and professionalism as official written
correspondence.
Synergy encourages authorized and trained personnel with access to EMD's to utilize these
devices whenever appropriate. However, use of any of these devices is a privilege that is
subject to revocation based on breaches of this policy.
Employees are advised that they do not maintain any right to privacy in EMD equipment or
its contents. Synergy reserves the right to access any information contained on EMD's and
may require employees to provide passwords to files that have been encrypted or password
protected.
Personally owned EMD's that are used by on-duty employees must be approved by CISO.
If used on-duty and the EMD are connected to any Synergy network, the personally owned
device is subject to the same restrictions and guidelines.
Confidential, proprietary or sensitive information may be disseminated only to individuals
with a need and a right to know and when there is sufficient assurance that appropriate
security of such information will be maintained.
No employee shall access any file or database unless they have a need and a right to such
information. Additionally, personal identification and access codes shall not be revealed to
any unauthorized source.
Unless authorized by the ISSM, employees shall not install any file, software, or other
materials without System Administrator approval.
Employees shall not download any executable file, software or other materials from the
Internet or other external sources other without ISSM approval. If any employee is
uncertain whether or not a file is executable, they should contact the ISSM team for
guidance.
The size of file which can be attached to the email is restricted to 10MB.
Employees shall observe the copyright and licensing restrictions of all software applications
and shall not copy software from internal or external sources unless legally authorized.
Employees shall observe copyright restrictions of any documents sent through or stored on
electronic mail
Confidentiality or non-disclosure agreements reflecting the Synergy’s needs for the protection of
information will be identified, documented and regularly reviewed at least once in a year.
The Business Heads will ensure that appropriate Confidentiality and Non Disclosure Agreement is signed
and understood by the users before allowing access to the Synergy IT Infrastructure.
This control will be applicable to only those Synergy locations which use packed business applications.
Business requirements prepared for (1) developing new systems/ services; (2) carrying out
enhancements to systems/ services; (3) purchasing new software/ hardware/ service; and deployment
of new information technology initiatives will include requirements from a security control perspective.
Risk assessment will be performed to identify the desired security controls to be included in the security
requirements of systems to be deployed. The security control specifications will be analyzed during the
design stage, in the case of development or enhancement to application systems, and in the pre-
purchasing stage, when a product or contract is being evaluated so that they are incorporated in the
systems while they are being built/ purchased/ leased.
All new application system will be formally reviewed for compliance with security policy and verified by
Applications and Service Delivery Manager and approved by Management before being deployed in the
production environment.
The Development, Testing and Operations & Maintenance teams will be trained on security aspects of
application development and maintenance activities.
Information involved in application services passing public any network/ internet is protected from
fraudulent activity, contract dispute and unauthorized disclosure and modification.
Secure services such as https, SSH, SFTP and VPN etc. is used to access information over any public
network/internet. Access to application and data is handled as per the User Access Control Policy.
Currently ftp service and PMS application are accessible over the public network.
To control the out sourced software development activity as per Synergy requirement. This is
implemented by means of contracts as and when required.
Test data used for testing purpose is selected carefully, protected and controlled.
Production data is not used for the testing purpose. Once testing is done test data will be removed
from the testing environment.
Third party/supplier security policy is established and documented to capture information security
requirements to mitigate the risks associated with third party/suppliers access to the organization assets.
A formal contract document with all necessary security controls shall be entered with the Third Party
and outsourced service provider.
Synergy as an organization has signed SLAs and Service agreements with all outsourced
party / Service vendors, with whom Synergy work and have liasoned.
Non-disclosure agreements have been signed up with third parties, preventing them from
revealing any information learned about Synergy assets, technology architecture or
operational methodology with specific stress on their information security responsibilities and
issues including the indemnification for copying and disclosing information.
Liabilities of either party in relation to the contract are mentioned in all contracts and all
contracts have been ratified by the legal department for completeness of legal clauses and
compliance.
Synergy will address the information security risks associated with information and communications
technology services and product supply chain in supplier agreements.
Third party services shall be governed through service level agreements and service levels shall be
monitored on a quarterly basis and penalty clauses invoked as appropriate. The uptime terms as per the
agreed SLA shall define the action thereof. Synergy shall review the contingency plans and test the
procedures to ensure the uptime is guaranteed and competitive strategic advantage is maintained.
Any changes implemented and incorporated by Synergy in security policies and procedures, new controls
to enhance the protection levels to minimize the security incidents including reassessment of risks,
deployment of new technologies and network enhancements, etc. shall be communicated and shall be
agreed by 3rd party and the service level agreements amended accordingly.
Incident Management Procedure is established in the organization to ensure a quick, effective and
orderly response to information security incidents.
Any security incidents coming to the notice of Synergy employees has to be reported to
IT Helpdesk
Information security Manager/Officer
CISO
by the following modes of communication
Email to IT helpdesk
Orally in person or phone to ISSM/ISSO/CISO
SRP Ticketing System
The person receiving the information shall fill the incident report form and forward to ISSM/ISSO for
necessary action. The ISSM/ISSO must notify the same to the CISO and corrective action must be
initiated with the help of IT Dept. / Administration team / Security Incident Response Team.
Information Security events shall be reported to outside authorities whenever this is required to comply
with legal requirements or regulations. This shall only be done by the ISSM or persons authorized by
ISSM in consultation with the legal department.
Suspected Information Security events shall be reported promptly to the IT team or directly to ISSM if
found critical.
Information Security events shall be reported to outside authorities whenever this is required to comply
with legal requirements or regulations. This shall only be done by the ISSM or persons authorized by
ISSM in consultation with the legal department.
Security weaknesses shall be reported without any delay to the ISSM to speed up the identification of
damage caused, its containment and restoration, repair and to facilitate the collection of associated
evidence and shall be recorded and processed for corrective action. Breaches of confidentiality shall be
reported to the ISSM as soon as possible. It shall include breaches of confidentiality arising from a
breach of an employee's NDA.
Assessment of and decision on information security events will be handled in accordance with Incident
Management Procedure
Information security Incidents are responded in accordance with Incident Management Procedure
Incident Management Procedure shall assist Synergy to learn from incidents and take preventive actions
to avoid the occurrence of that category of incidents. An Incident Tracker shall be maintained to track
all information security incidents.
Information Security incidents arising from system failures shall be investigated by competent and skilled
personnel.
During the investigation of Information Security incidents, dual control and the segregation of duties
shall be included in procedures to strengthen the integrity of information and data. Staff shall be advised
for assistance and collective action, through defined security incident checklists, etc., to handle and
respond effectively to an Information Security incident.
An abnormal high risk from the threat of electronic eavesdropping and / or espionage activities be
identified, all employees shall be alerted and reminded of the specific threats and the specific
countermeasures to be deployed.
Information relating to Information Security incidents may only be released by ISSM.
Synergy is determined its requirements for information security and continuity of information security
management in adverse situations. E.g. during crisis or disaster.
Synergy is established, documented, implemented and maintaining process, procedure and controls to
ensure the required level of continuity for information security during an adverse situation
The Business Continuity Plan shall be periodically tested to ensure that the management and staff
understands, how shall it be executed. All staff shall be made aware of the Business Continuity Plan and
their respective roles. Business continuity plans in conjunction with recovery plans shall be tested
regularly to ensure that they are up to date and effective. Such tests shall also ensure that all members
of the recovery team and other relevant staff / 3rd party are aware and well communicated of the plans.
A.17.2 Redundancies
A.17.2.1 Availability of information processing facilities
Information processing facilities were implemented with redundancy sufficient to meet availability
requirements of the organization
A.18 Compliance
Refer: Statutory/Legal Team Documents, NDA clauses, License Management Policy.
Relevant statutory, regulatory, and contractual requirements for all the information processing facilities
will be documented by the relevant Department Heads. Compliance of statutory/regularity framework
will be reviewed periodically (at least once a year or whenever any modification happens) by an internal
legal officer from the legal dept.
The applicable legislation which users shall be required to comply with are as listed below:
Information Technology Act, 2000
Information Technology (Amendment) Act,2006, India
The Patent Act 1970
The Indian Copyright Act 1957
Intellectual Property Rights (IPR), Patents (with respect to Software purchased and
downloaded)
Central Sales Tax Act, India
Indian Companies Act 1956
Provident Fund and ESI Acts, India
Shops & Establishment Act 1948,India
Professional Tax Act
Contract Labour Act, India
Foreign Exchange Management Act (FEMA) Guidelines, India
Customs Act, India
Contractual obligations
Indian Electronic Waste Act
Intellectual Property rights shall be honoured and protected as per international convention as India is
also a party to it.
Appropriate procedures shall have been implemented to ensure compliance with legislative, regulatory
and contractual requirements on the use of material in respect of which there shall be intellectual
property rights and on the use of proprietary software products.
Publishing an intellectual property rights compliance policy which defines the legal use of
software and information products.
Acquiring software only through known and reputable sources, to ensure that the copyright
is not violated.
Maintaining awareness of policies to protect intellectual property rights, and giving notice
of the intent to take disciplinary action against personnel breaching them.
maintaining appropriate asset registers, and identifying all assets with requirements to
protect intellectual property rights
Maintaining proof and evidence of ownership of license, master disks, manuals etc.
Implementing controls to ensure that any maximum number of users permitted is not
exceeded.
Carrying out checks that only authorized software and licensed products are installed.
Complying with terms and conditions for software and information obtained from public
networks.
Not copying in full or in part, books, article, reports or other documents, other than
permitted by copyright law.
Important records of the organization shall be protected from loss, destruction and falsification.
The procedures for the storage and handling shall be addressed in chapter on Regulatory
compliance process.
The inventory of information assets and information processing assets shall be maintained.
The ISSO & Head-IT shall ensure that the category of compliance is maintained as a part
of the checklist.
The authorized personal shall have access to relevant records and shall give access to the
relevant stake holders based on the need.
The Head-IT / ISSO shall ensure that all the master approvals and licenses are kept in a
centralized place with a lock and key and also a copy is kept in safe lockers.
On a yearly basis, a copy of all the records is kept in bank locker or an offsite location as a
BCP / DRP measure.
Records are retained based on the Regulatory compliance check list.
Organization has ensured privacy and protection of personally identifiable information as required in
relevant legislation and regulation where applicable.
Additional Ciphering / cryptographic algorithms are not used over the default ciphering /
Cryptographic Algorithms that are provided by the vendors as per regulations prescribed by applicable
regulatory bodies. Hence this control is not Applicable.
Synergy will conduct review of its security implementation by Third party auditors every half year. Review
will also be conducted in case of significant changes in the information security implementation.
Any changes and enhancements shall be made to the policy after review with the CISO, ISSM, and ISSC.
ISSM in consultation with project/Department heads will review the compliance of information
processing and procedures within their area of responsibility with the appropriate security policy,
standards and any other security requirements.
The Head IT shall prepare an annual programme for network and server security compliance inspection.
The program shall identify the area and scope to be covered during inspection and the team responsible
to conduct the inspection. The inspection shall be carried out only by competent persons authorized to
do the same or only under the supervision of such persons.
Compliance check of user responsibilities (desktops and laptops)
DOCUMENT SUMMARY:
Revision History
PURPOSE
The key objective to ensure the success of Synergy Maritime Private Limited business lies in protecting the business
information of the organization and its customers. To fulfill this strategic business objective, Synergy Maritime
Private Limited has established an Information Security Management System.
POLICY STATEMENT
The Directors, Senior Management and all other employees at Synergy Maritime Private Limited are committed to
protect the confidentiality and integrity of all the information assets, ensure availability in accordance to business
objectives and conduct business in compliance with all statutory and regulatory requirements.
ISMS OBJECTIVES
The Objective of ISMS at Synergy Maritime Private Limited is to ensure that:
The management at Synergy Maritime Private Limited ensures that this policy is communicated, understood,
implemented and maintained at all levels of the organization. The policy shall be monitored for compliance and will
be amended, if necessary.
This policy has been approved by the Board of Directors at Synergy Maritime Private Limited.
CISO / HEAD
ISMS OBJECTIVES
REVIEW UOM (Unit
S.No ISMS Objectives TARGET RESPONSIBILITY
FREQUENCY of Measure)
CISO / HEAD
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 1 of 32
DOCUMENT SUMMARY
AUTHOR Kannan
REVIEWED BY Gaurav Singh
CURRENT VERSION 2.1
DATE OF CURRENT VERSION 23-12-2019
DATE OF ORIGINAL VERSION 24TH FEBRUARY, 2015
DOCUMENT CIRCULATION ISSC TEAM
OWNER CISO
NAME: Gaurav Singh
APPROVED BY
DESIGNATION CISO
REVISION HISTORY
Version Revision Issue Date Changes
1 0 24th FEBRUARY, 2015 Initial
Reviewed Based On Gap Assessment
2 0 30-09-2019
changes made
2.1 1 23-12-2019 Changes done in A10.1.2
1.1 PURPOSE
Purpose of this document is to identify from the controls specified in ISO
27001:2013, specification of information security management system, the controls
that applicable to Synergy. Against each of these controls justification for the
inclusion or exclusion of the control, as specified in ISO 27001:2013 6.1.3(d) section,
shall be stated.
1.2 STATEMENT OF CONTROLS
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 2 of 32
A. 6 Organization of information
Security
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 3 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 4 of 32
adopted to protect
against the risk of
using mobile devices
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 5 of 32
the organization.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 6 of 32
function.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 7 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 8 of 32
scheme adopted by
the organization.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 9 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 10 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 11 of 32
employment,
contract or
agreement, or will be
adjusted upon
change.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 12 of 32
confidential.
A.10 Cryptography
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 13 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 14 of 32
information
processing facilities
are isolated, to avoid
unauthorized access.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 15 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 16 of 32
protecting
unattended
equipment.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 17 of 32
A.12.3 Backup
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 18 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 19 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 20 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 21 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 22 of 32
organization and
external parties.
To ensure the security
content of the
agreement reflects
the sensitivity of the
business information
involved.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 23 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 24 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 25 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 26 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 27 of 32
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 28 of 32
continuity
A.17.2 Redundancies
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 29 of 32
requirements of the
organization
A.18 Compliance
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 30 of 32
statutory, regulatory,
contractual and
business
requirement.
A.18.2
Information security
reviews
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 31 of 32
independently at
planned intervals, or
when major changes
to security
implementation
occur.
[Type here]
Document Ref:ISMS_Man_004
ISMS POLICIES & PROCEDURES MANUAL - OFFICE
Rev No. : 1
Date : 23-12-2019
STATEMENT OF APPLICABILITY Page : 32 of 32
[Type here]
Document Ref:ISMS_Man_004
RESTRICTED ISMS Roles , Responsibility and Authority
RECORD SUMMARY
OWNER CISO
REVISION HISTORY
Top Management
ISSC
End Users
These teams shall perform the operation of ISMS as per the responsibilities listed (not exhaustive).
Top Management
Top management demonstrates leadership and commitment with respect to the information security
management system by:
ensuring the information security policy and the information security objectives are established and
are compatible with the strategic direction of the organization;
ensuring the integration of the information security management system requirements into the
organization’s processes;
ensuring that the resources needed for the information security management system are available;
communicating the importance of effective information security management and conforming to
the information security management system requirements;
ensuring that the information security management system achieves its intended outcome(s);
directing and supporting persons to contribute to the effectiveness of the information security
management system;
promoting continual improvement; and
supporting other relevant management roles to demonstrate their leadership as it applies to their
areas of responsibility.
Responsibility for conducting management reviews.
ensuring that the ISMS conforms to requirements and assign reporting responsibilities in addition
to those listed
Management has given the authority to each team to enforce the security in their area of work.
Authority
To take financial decisions on issues related to risk
Primary Responsibility
Maintains and updates an ISMS Vulnerability dashboard to keep track or organizational weakness
and present to the management for decisions. Decisions requiring implementation are tracked with
implementation team till closure. Vulnerabilities for which there are no action taken are reported
for residual risk approval to the top management.
Enterprise project or program office – Verifies and performs risk assessment for any new
product/project/customer acquisition.
Document Controller for all ISMS related documentation. Document owner is a separate role, CISO
is not necessary the document owner for all security policy/procedures, some of which are owned
by other departments such as IT, HR. Operations, legal, physical security, application development
and top management.
Identification of new threats/vulnerabilities and reporting to relevant stakeholders in relation to
enterprise information risk.
Responsible for reporting full or part of the ISMS performance on a monthly basis.
Coordination Responsibility
Ensures policy objectives are met and responsible for supervision of records generated as per the
security operation.
Information Security budget preparation and submission to top management for approval
ISMS Annual program maintenance.
Key point of contact for day-to-day security implementation/issues.
Arranges for regular security audits as per management decision.
Provides inputs to regular internal independent audits.
Appoints Request for Comment (RFC) team for acceptance and adaptation of specific ISMS
documentation/records.
Authority
To create additional policy, procedure and metrics with respect to ISMS operation.
Certifications: preferable, not mandatory - ISO 27001 Lead Auditor, Implementation Training.
Making database backups and storing them in ways that minimize the risk that they will be
damaged or lost
Integrity - Verifying or helping to verify data integrity
Security – Authorized users can access and change data as needed Defining and/or implementing
access controls to the data
Availability - Ensuring maximum uptime
Performance - Ensuring maximum performance given budgetary constraints
Development and testing support - Helping programmers and engineers to efficiently utilize the
database.
Periodic reporting to Chief Information Security Manager.
Head of Department/Team
Head of department is responsible to ensure the following security processes (not exhaustive):
Authority
To inform management about any new risk/vulnerability.
Training: Attendance to Classroom security awareness session – once in a year. Participates in any
control specific discussion/exercise related to the area.
Certification: No security certification required, should coordinate in the risk related decisions.
ISMS End-Users
Authority
To report any new weakness/incident to the head of department/ISMS Manager.
Internal Auditors
Functions upon the directives of the top management/Security forum and carries out regular
review of ISMS, based on the defined scope.
The individuals nominated should be impartial, who has no material benefit in the outcome of
Internal audit, positive or negative.
Makes judgment on the effectiveness of the selected policies, procedures and records
Reports internal audit findings to the top management and recommends preventive and corrective
action, and
Reviews implementation of the audit findings
Additional internal audit procedure on internal audit exists to support the role.
Authority
To raise non-conformity in any aspect of ISMS operation.
Antivirus Policy
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to effective and efficient prevention of network virus outbreaks and network security
attacks involving computers associated with Synergy.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been provided
access to Network and Information at Synergy.
3. Policy
3 All systems attached to the Synergy network must have standard, supported anti-virus software
installed. This software must be active, be scheduled to perform virus checks at regular intervals,
and have its virus definition files kept up to date.
4 Any activities with the intention to create and/or distribute malicious programs onto the network
(e.g. viruses, worms, Trojan horses, e-mail bombs, etc.) are strictly prohibited.
5 If an employee receives what he/she believes to be a virus, or suspects that a computer is infected
with a virus, it must be reported to the IT Team/ ISM immediately.
6 No employee shall attempt to destroy or remove a virus, or any evidence of that virus, without
direction from the IT department/ ISM.
11 Send an alert to the IS Custodian in case of any Malware not detected or cleaned and on detecting
any new virus breakout.
12 Anti Virus Solution shall be scheduled to run to scan for Malware at defined intervals.
13 A Centralized Anti-virus server shall be deployed to check all the incoming and outgoing SMTP
traffic through Internet.
14 Anti-Malware activities shall be centrally managed. Central monitoring and logging console shall be
deployed, to monitor the status of pattern updates on all the computers and to log the activities
performed on them.
15 All computers shall be configured to generate an alert at the central Anti Malware console.
1 Anti-Malware Solutions shall be installed on, all servers including domain Servers, file and
print servers, Internet proxies, email servers, application servers and Internet gateways.
3 It should be updated regularly as and when new updates are released and should be invoked
at start-up and kept enabled all the time.
1. Besides installation of the Anti Malware Solutions on laptops with the above
configurations as in case of Desktop, the following needs to be ensured:
2. Updating the laptops with latest copy of anti-virus software on the move.
3. Laptops should be scanned for Malware Infections before connecting back to PHOTON
Network.
7. Gateway Level
Anti Malware solution should be configured at the entry point of the network to do the following
1 Scan for all files including compressed files sent as attachment in the incoming and
outgoing mail (SMTP traffic).
2 Clean the Malware detected automatically.
3 Delete the infected file to quarantine folder if unable to clean
4 Automatic Antivirus pattern update should be configured in the Software
5 Alert the Detection in the Central Console.
8. Maintenance/Updating of software
1. Malware Software signature files shall be kept up-to-date. The new virus pattern file
updating shall be immediate after the release of the signature and the Anti-Malware Server
should be configured to immediately push the updates to the clients.
2. Periodic audit on all the servers, users’ desktops and laptops shall be performed to ensure
that proper and latest version of virus engines and the definitions files are running and no
threat exists. Audit Frequency shall be 6 months.
3. Maintain Malware logs of the critical servers for at least 3 month to keep track of virus
activity.
4. The previous month’s logs shall be generated as reports and reviewed.
1. All Viruses, Trojan and other Malware incidents should be reported by users to the IT
Team.
2. Malware-infected computers shall be removed from the network or placed in a quarantine
segment as soon as they are identified, until they are verified as virus-free.
3. Potential controls to reduce an outbreak and regain control of the environment shall
include:
Shutdown of non-essential services.
Disabling entry and exit points for viruses’ into/ from the network.
Network filtering of vectors (such as http)
Segregation of infected network sections.
Disabling of services such as file sharing.
4. All virus detection incidents shall be logged, along with the action taken;
Quarantine,
Deletion or
Successful cleaning.
5. Logs shall be maintained on the Centralized Anti-virus server.
When critical vulnerabilities are announced for Application/system software, the
patches shall be applied quickly so that the window of exposure is very small.
1 Users shall be prohibited from changing the configuration of, removing, de-activation or otherwise
tampering with any Malware prevention / detection Software that has been installed on systems
used by them.
2 Users shall report all incidences of Malware (detected by the installed anti-Virus software)
immediately to the IT team.
3 Users shall ensure that exchanges of media with other organization are checked for Viruses and
Malware.
OWNER CISO
REVISION HISTORY
2. Scope
This policy applies to all the customized applications supporting business processes.
3. Policy
(a) A formal methodology or process is used to guide the development or maintenance of application
systems.
(b) Security requirements should be analyzed and documented as part of the business requirements
specification document.
(c) Application software development and maintenance are performed using a common set of
standards approved by the management to ensure consistency of development and maintenance
activities within the organization.
(d) Development staff is adequately trained and is familiar with a common set of standards,
technology and tools approved by management.
(e) Application systems are developed, modified and tested in an environment separate from the
production environment. Access to these environments must be appropriately restricted,
including segregation of duties between development/test environments and production.
(f) Application stakeholders keep and approve the application test plan. They conduct testing of the
application following the approved test plan, ensuring that it meets the defined and approved
requirements. The final test results are kept and approved by the application stakeholders.
Defects and/or deficiencies are to be corrected before production implementation.
(g) IT staff, along with the application stakeholders ensure that all pertinent information related to
the implementation of the new application is communicated to all interested parties prior to the
implementation date.
(h) All changes to the applications are performed as per the change control procedures.
(i) Application source code version control should be managed through automated systems such as
SVN, etc. These systems should be backed up as per the backup policy and procedure.
(j) Access to source code repositories should be controlled to prevent unauthorized access.
(k) Applications should be tested for security vulnerabilities. Reported vulnerabilities should be
mitigated as per the application change control procedures.
5. References
a) Change management policy
b) Incident management policy
c) Backup and restoration policy
DOCUMENT SUMMARY
REVISION HISTORY
1. Purpose
This policy aims to protect the integrity and availability of all IT assets at Synergy.
2. Scope
This policy applies to all the Synergy IT assets.
3. Policy
a) Department head has approval authority for the procurement of all assets and services, and
approval must be granted prior to procurements.
b) Sourcing agreements for IT assets and services are approved by CISO. A copy of every such
agreement is maintained by Synergy and monitored for conformance.
c) Requests to procure assets that are unacceptable are subject to review and validation by CISO
prior to purchase.
d) ISM ensures that assets meet all applicable security requirements throughout their service life.
e) New products or services are introduced in conformity with the Change Management policy.
f) Inventory of all assets is maintained along with their ownership assigned to each of the newly
introduced assets.
g) A formal asset disposal process is used for assets that have exceeded their usefulness and are
deemed no longer necessary for corporate use.
h) The disposal process shall address the removal of corporate information from the asset.
i) Inventory of all assets (software and hardware) should be maintained by the Synergy IT
Department.
j) Acceptable usage of IT assets should be followed as per the acceptable usage policy.
4. Policy enforcement
Management reserves the right to audit asset inventories to ensure compliance to the above mentioned
policy statements. Any non-compliance found during the audit would be reported to the management and
acted upon case to case basis.
5. References
a) Asset Disposal Process
b) Change Management Policy
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of the Policy is to provide for the continuity, restoration and recovery of crucial business
data and systems.
2. Scope
The data backup section of this policy applies to all entities and third parties who use computing
devices connected to networks and users are responsible for arranging adequate data backup
procedures for the data held on IT systems assigned to them.
3. Policy
3.1 General
(a) Backup operations shall be performed regularly in accordance with business, legal, regulatory and
contractual requirements and as per the agreed backup plan maintained by the IT Team.
(b) Data backup strategy and data retention periods should be documented and validated with the
process owners of each business unit and respective business or contractual data retention
requirements. Retention periods should be defined for information.
(c) Backups are sent to an offsite storage facility on a regular basis to minimize the risk of data loss,
and are in accordance with the Business Continuity Plan.
(d) Backup media is stored both in-house/ locally and offshore locations. Removable media is
adequately labeled to enable data classification, identification, and traceability.
(e) Backup restoration exercises should be performed regularly to validate the integrity of the backed
up data from the backup media without risk to the data or business operations.
(f) Review of backup logs is performed daily to verify the successful completion of backup and/or
restore operations.
(g) It should be ensured that the media is regularly examined for readability of the data. The backup
media should be replaced immediately after encountering the error or at predefined time intervals
whichever is earlier.
(h) Rules for rotation of the media should be maintained by the IT team.
(i) The backup media must be appropriately labeled and numbered.
(j) Information to be backed up should be as follows:
i. File Server (includes departmental and individual data)
ii. Server Configurations (e.g. system state backups, etc)
iii. Network & Security Device Configurations (primarily during major IT changes)
iv. Business Applications, Source Codes & Databases (As applicable)
Following format is maintained by the ISM, which covers the details of the frequency of backup; backup
content & retention.
The data on workstations and laptops should be backed up by the respective users on the network share/
file server.
It is the responsibility of IT users to decide on the criticality, backup and frequency of backup of
the information with respect to the application systems managed by the user departments. The
IT users/ operations team should formally inform the ISM about any new applications and its
data to be backed up. Similarly, the ISM should be informed about discontinuing the backup of
the applications systems no longer in use at the unit.
The IT Users are responsible for taking and maintaining the backup of all data residing on their
individual workstations, desktops and laptop computers. They should take help of the IT
department/ ISM for taking these backups on the selected backup media.
The ISM in consultation with CISO and individual departments or process owners should formulate plans
for revising the backup strategy on a periodic basis (e.g. quarterly or half yearly basis). Necessary
capacity planning should be done to accommodate all the backup information within the existing
infrastructure setup. Additional storage requirements should be identified and discussed with CISO and
Directors. In exceptional cases, ISM/ CISO also reserve the right to optimize the backup plan in line with
the capacity requirements.
If any information that is no longer required to be backed up, the concerned Department Head/
Manager must send in an email to the ISM, giving details about the information that is to be
excluded from the backup. The backup operator must then be instructed to carry out the requested
action.
The concerned user should make an application through an email/ ticket to their Department
Head/ Line Manager (stating the reasons for restoration) for approval of restoration of data. The
Department Head/ Line Manager should ensure that the user has the right to access the data
required for restoration prior to granting the approval.
Upon receiving the authorization, the data should be restored by the System Administrator /
Backup Operator.
A log has to be maintained by the System Administrator / Backup Operator which should contain
date and time along with name of the person who required / requested for the restored data. The
Log should also include number of backup media used for restoration.
To verify the readability of backup media, mock restoration tests should be carried out at least
once in a year on the identified test servers. The restored data has to be checked for its
readability and usability.
It should be ensured that the restored data is deleted after successful completion of testing.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
policy should be reported to the ISM and acted upon based on this policy. All necessary records (emails,
etc) for demonstrating the compliance to the enforcement of this policy should be retained as an audit
trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
Advance planning and preparation are required to ensure the availability of adequate capacity and resources
to deliver the required system performance. Projections of future capacity requirements should be made,
to reduce the risk of system overload.
2. Scope
This policy applies to all the employees, contractors and third parties who have been provided access to
Network and Information at the organization.
3. Policy
3.1 General
(a) All services required for the normal execution of business processes or supporting the
achievement of strategic business objectives are governed by the Capacity and Availability
Management policy.
(b) Information Security Organization defines the capacity and availability requirements of each
service, identified by the Process Owners as required for normal business operation or supporting
the achievement of strategic business objectives, reflecting both current and future business
requirements and with consensus of the process owners.
(c) ISM document, maintain and review the capacity and availability requirements of each service
identified. This could also be done with the help of monitoring tools.
(d) ISM allocates sufficient resources to meet, or exceed, the capacity and availability commitments
of each service identified.
(e) ISM reports to Process Owners and CISO on measured capacity and availability proactively.
(f) CISO & ISM remediates deficiencies in measured capacity and availability.
The Systems Administrators should monitor the systems and capture the technical information. The data
collected must be in conjunction with the following:
The Helpdesk personnel may be consulted to understand any complaints from users regarding
the degradation of performance of systems / applications.
The Application Group must be consulted to gather information regarding the performance of the
servers under their purview.
The Systems Administrator must provide a record of the identified performance indicators on
their respective servers.
An acceptance criterion for new critical information systems, upgrades and new versions should be
established by the IT team and suitable tests of the system carried out prior to acceptance. The IT team
ensures that the requirements and criteria for acceptances of new systems will be as per the requirements
stated in the related purchase order for the equipment. The following controls may be verified:
Confirm that installation of the new system will not adversely affect existing systems.
To verify on the impact of the overall security of the company by the installation of the new
system/equipment.
Vendor Service Level Agreements should be defined and enforced during the provision of their services.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as an
audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of this policy is to ensure that all protected information’s used in the Synergy Work Areas
are secured from the risk of unauthorized access, loss of, or damage during and outside normal working
hours or when areas are unattended.
2. Scope
This policy applies to all Synergy, contracted personnel and any third parties representatives who have
been provided access to the information assets of Synergy. This policy covers all the employees of
Synergy.
3. Policy
3.1 Secured Work Area
a. Documents classified as Confidential should be stored in locked cupboards when not in use,
especially beyond work hours.
b. Employees should not leave the documents or removable media that may contain business
information unattended.
c. Computer terminals should not be left logged and unattended. Users should lock the workstation
using Ctrl+Alt+Del key when they are not present in the work area.
d. All active application sessions should be terminated upon completion of the work.
e. Equipment, information in any form or software should not be taken off-site without authorization
from the Asset Owner.
3.2 Printer
a. Confidential/ Restricted information should never be sent to a network printer, without an
authorized person retrieving it so as to safeguard its confidentiality during and after printing.
b. Documents when printed in the network printer should be cleared/collected by the user
immediately.
c. Printers used for the production of output having direct financial value or confidential information
must be kept in a secure location
a. Following security safeguards will be observed by users when using Telephones and Fax:
Fax machines should be protected in a secured area. In case of Common fax machines an
Owner should be identified for each Fax machine and the owner shall ensure that the
documents faxed are delivered to the appropriate person as soon as fax is received. The owner
should be made responsible for the information received till it is delivered to appropriate
person.
3.4 Photocopier
a. Personnel using photocopiers must ensure that the documents (both original, copiers and jammed
ones) are not left at the photocopier after the copying work.
b. Copying must be made only by persons with a need to know. Reproduced documents must bear
the same Security markings/classification as originals. When copies are made using outside
facilities, care must be taken to protect the information security.
c. When using the photocopiers employees will ensure that they do not make any copies of controlled
documents. Any such copies will be made after prior approval and authorizations from the
Department head.
a. The information in Hard disks, Floppy disks and CD RWs should be completely erased before
disposal. In the case of CDROM disks, the CDs should be broken before disposing and Hard Disks
degaussed.
b. All documents in paper classified above ‘Public’ when disposed should be shredded to pieces
using Paper shredders.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to human resources should be reported to the CISO and acted upon based on this policy. All
necessary records (emails, etc) for demonstrating the compliance to the enforcement of this policy
should be retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of the policy is to ensure the customer information, message are concealed and protected
as applicable within the Synergy operations and while transmitting the information.
2. Scope
This policy applies to all data managed by synergy that are identified as protected information.
3. Policy
The policy of Synergy is to ensure:
(a) Before cryptography is employed, a business requirement must exist and exact functional
requirement must be identified.
(b) Encryption is used to conceal the content of the message where preserving the confidentiality of
customer information in electronic form is required during transmission.
(c) Where applicable, cryptographic methods and data encryption products, approved by CISO/ISM,
should be used in handling critical information that must be protected while in transit or at rest.
(d) Cryptographic methods and data encryption products, recommended explicitly by a regulators/
customers/ any other interested party shall be given highest priority.
(e) Necessary security controls should be considered in order to safeguard the interests of the
customer and Synergy such as protecting the encryption passwords and keys, wherever applicable.
E.g. physical/ logical access controls and awareness on secure handling of keys.
(f) Synergy shall use cryptographic controls in compliance with all relevant agreements, laws, and
regulations.
(g) When identifying the level of cryptographic protection following shall be taken into consideration:
b. Length of Keys
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as an
audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of this policy is to ensure all relevant legislative statutory, regulatory, contractual
requirements and the organization’s approach to meet these requirements are explicitly identified,
documented and kept up to date for each information system and the organization and to ensure
compliance with legislative, regulatory and contractual requirements related to intellectual property
rights and use of proprietary software products.
2. Scope
This policy applies to all employees who have access to customer data access, server access, data
handling and storage.
3. Policy
3.1 Customer Data Protection Policy
Customer data and server is considered essential, and its quality and security must be ensured to comply
with legal, regulatory, and administrative requirements. Authorization to access customer data and
server varies according to its sensitivity (the need for care or caution in handling). This policy sets forth
the Synergy Standards with regard to the handling of sensitive customer data.
a. Customer server access and information/data access should be given based on “need to know” or
“need to use” basis.
b. Only authorized users should access, or attempt to access, customer servers and information/data.
c. Authorization for access to customer servers and information/ data comes from the department head,
and is typically made in conjunction with an acknowledgement or authorization from the requestor’s
department head, supervisor, or other official authority.
d. User should access the customer data with proper valid authentication
e. Users should not access the customer servers from outside the Synergy's Network, if users need to
access the customer servers from outside the Synergy's network, they should connect Synergy's
network through VPN and then must use the customer servers.
f. User access to production servers and confidential/restricted data has to be authorized, use of such
data and servers shall be limited to the purpose required to perform the business task.
g. User access that is having access to “customer servers and information/data” shall be reviewed every
quarter by the Department Head.
i. Users shall respect the confidentiality and privacy of individuals whose information/data they access,
observe ethical restrictions that apply to the information they access, and abide by applicable laws
and policies with respect to accessing, using, or disclosing information.
3.3 Data Collection, Data Storage, Data Handling and Data Transfer
a. Users should collect only the minimum necessary customer information/data required to perform the
business task.
b. Users should not carry any customer provided information/data outside the Synergy, without prior
approval from the department head.
c. Users should not store customer provided information/data (Real data or Test data) beyond project
requirement in user’s desktops. If any users need to store beyond project requirement, they should
take approval from the department head or application owner and data has to encrypt.
d. Users are responsible to protect customer information/data from the misuse, theft or disclose to
unauthorized users, any third party or competitors.
e. Customer provided user “credentials” should not be stored in clear text format and shall be
encrypted.
f. Customer provided user “credentials” should be shared only with authorized group members and
should not be shared with different group members.
g. Department heads must ensure that all decisions regarding the collection, deletion and use of
customer data are in compliance with the law and with Synergy's Policy.
h. Confidential/ Restricted information must not be transferred by any method to persons who are not
authorized to access that information.
i. Users must ensure that adequate security measures are in place at each destination when
Confidential/ Restricted data is transferred from one location to another.
j. Confidential/ Restricted data must be protected from unintended access by unauthorized users.
k. Users must guard against unauthorized viewing of such information which is displayed on the user’s
computer screen.
l. Users must not leave Confidential/ Restricted information/data unattended and accessible.
m. Confidential/ Restricted information/data must not be taken off-campus unless the user is authorized
to do so, and only if encryption or other approved security precautions have been applied to protect
that information.
n. Confidential/ Restricted data should not be transmitted through electronic messaging even to other
authorized users unless security methods, such as encryption, are employed.
o. Physical protection from theft, loss, or damage must be utilized for mobile devices that can be easily
moved such as a PDA, thumb drive or laptop.
p. Physical protection must be employed for all devices storing restricted data. This shall include physical
access controls that limit physical access and viewing, if open to public view when not directly in use,
office, lab, and suite doors must be locked and any easily transportable devices shouldbe secured in
locked cabinets or drawers.
q. Users of lap-top and other mobile computing devices need to be particularly vigilant and take
appropriate steps to ensure the physical security of mobile devices at all times, but particularly when
travelling or working away from Synergy.
r. Synergy managed servers storing Confidential/ Restricted information shall be regularly scanned for
vulnerabilities, patched, and backed-up.
t. Compliance with this customer data protection policy is the responsibility of all members of the
Synergy; Violations of this policy are dealt with seriously and include sanctions up to and including
termination of employment. Users suspected of violating these policies may be temporarily denied
access to Synergy and customer information/data during investigation of an alleged abuse. Violations
can also be subject to prosecution by state and Government authorities.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to Customer Data should be reported to the CISO and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
OWNER CISO
Revision History
2. Scope
This policy covers appropriate use of any email sent from a Synergy email address and applies to all
employees, vendors, and agents operating on behalf of Synergy.
3. Policy
3.1 General
1. Security patches and upgrades should be applied as and when they are released by the vendor.
These patches should be tested before being deployed on the production environment.
2. All unnecessary services and applications should be removed or disabled on the server.
It is preferable to use separate hosts for Web servers, directory servers, and other
services.
3. User authentication mechanisms on the server operating system should be configured by:
Removing or disabling unneeded default accounts and groups.
Disabling non-interactive accounts.
Creating the user groups for the particular computer.
Creating the user accounts for the particular computer.
Checking the organization’s password policy, and set account passwords appropriately
(e.g., length, complexity) .
Installing any other security mechanisms to strengthen authentication.
4. Access controls to files, directories, devices and other resources of the mail server should be
configured appropriately.
5. Privileges for the use of system related tools should be limited to the authorized system
administrators only.
Access controls for the operating system and mail server should be configured appropriately
1. Limit the access of the mail server application to a subset of computational resources .
2. Limit the access of users through additional access controls enforced by the mail server, where
more detailed levels of access control are required.
3. Configure the mail server application to execute only under a unique individual user andgroup
identity with restrictive access controls.
All the incoming as well as outgoing emails should be protected from malware
1. Determine which types of attachments to allow. Mail server should be configured accordingly.
2. Consider restricting the maximum acceptable size for attachments .
3. Determine if having access to personal email accounts from organizational computers is
appropriate .
4. Determine which types of active content should be permitted within email messages .
5. Centralized malware scanning mechanisms should be implemented either internally or outsourced
to a security vendor/partner (on the firewall, mail relay, mail gateway, and/or mail server) .
6. Install malware scanners on all client hosts .
7. Implement centralized content filtering.
8. Configure content filtering to block or tag suspicious messages (e.g., phishing, spam) .
9. Configure content filtering to strip suspicious active content from messages.
10. Take steps to prevent address spoofing, such as blocking emails from external locations using
internal “From” addresses.
11. Add a legal disclaimer to emails, if required .
12. Educate users on the dangers of malware and how to minimize those dangers .
13. Notify users when an outbreak occurs.
14. Configure mail server to block email from open relay blacklists or DNS blacklists, if required .
15. Configure mail server to block email from specific domains, if required.
16. Configure mail server to use encrypted authentication.
17. Configure mail server to support Web access only via SSL/TLS and only if such access is deemed
necessary.
18. Spam filter engine scan all outgoing / incoming mails and keep spam manager manages email
threats and spams
19. End users will be notified with spam notification
1. Firewall should control all traffic between the Internet and the mail server.
3.7.1 Logging
1. All security events in the email server should be logged. The logs should be stored in a separate
partition in the server.
2. Logs should be protected from unauthorized access.
3. Logs should be reviewed by system administrators regularly.
3.7.2 Backups
1. Cloud Based mailboxes and always retain a copy of message policy enabled in O365 server
2. Litigation hold policy applied for all mailboxes which means always a copy available on server
even if users delete mails for client end
1. All incidents, whether suspected or actual should be reported to ISM and acted as per the
Incident Management Policy and Procedure.
The Synergy email system shall not to be used for the creation or distribution of any disruptive or
offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual
orientation, pornography, religious beliefs and practice, political beliefs, or national origin. Employees who
receive any emails with this content from any Synergy employee should report the matter to their
supervisor immediately.
Using Synergy email resources for personal needs is not acceptable. Sending chain letters or joke emails
from a Synergy email account is prohibited. Virus or other malware warnings and mass mailings from
Synergy shall be approved by ISM before sending. These restrictions also apply to the forwarding of mail
received by a Synergy employee.
4.3 Monitoring
Synergy’s employees shall have no expectation of privacy in anything they store, send or receive on the
company’s email system. Synergy may monitor messages without prior notice. Synergy is not obliged to
monitor email messages.
4.4 Backup
Emails which are business critical or required by the business units/ managers should be retained as long
as they are required. Necessary backup arrangements should be made by the IT team. During exit of an
employee, this process should be governed under the exit process for all the exit employees.
The responsibility for defining the backup requirements lies on the line managers.
Restoration of these backups would be done based on request from the line managers.
The following disclaimer shall be displayed on all e-mails send outside Synergy domain:
This email and any files transmitted with it are confidential and intended solely for the use of the individual
or entity to which they are addressed. Please notify the sender immediately by e-mail if you have received
this e-mail by mistake and delete this e-mail from your system. If you are not the named addressee you
should not disseminate, distribute, copy this e-mail distributing or taking any action in reliance on the
contents of this information is strictly prohibited.
5. Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment.
6. References
Logical Access Control Policy
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to describe how the Firewalls will filter Internet traffic to mitigate the risks and possible
losses associated with security threats to the networks and information systems.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been provided
access to information or information processing facilities at Synergy.
3. Policy
A Firewall will be installed at any location of Synergy sitting at the perimeter of internal and public network.
This will ensure only authorized and pre-defined entries will be allowed into the internal network. Similarly,
outside public access will be permitted with restrictions (Content filtering service shall be enabled in the
firewall).
Firewall compromise would be potentially disastrous to internal network security. The IT Department will
adhere to the detailed procedures during configuration and subsequent use of firewall.
3.1 General
All Internet activity must pass through Synergy Firewall installed on the network perimeter. All users
should be authenticated based on Source/Destination IP addresses and services at the gateway. All
Internet connections to and from the internal computers must be authenticated at the firewall. The
firewall connecting the internal network to the Internet should restrict all services except minimum
required for web browsing and to accomplish business requirements.
Any remote access over untrusted networks to the firewall for administration is not allowed at
Synergy.
Firewall administration should be directly from the attached terminal from within Synergy LAN.
Physical access to the firewall terminal is limited to the System Administrator, Network
Administrator and ISM.
All firewall administration must be performed from the local terminal - no access to the firewall
operating software is permitted via remote access.
All VPN connections created at Firewall must be approved and managed by the ISM. Appropriate means
for distributing and maintaining login credentials must be established prior to operational use of VPNs.
To support recovery after failure or natural disaster, backup of data files as well as system
configuration files must be done. The firewall (system software, configuration data, database files,
etc.) must be backed up during configuration change so that in case of system failure, data and
configuration files can be recovered.
Another backup alternative would be to have another firewall configured as one already deployed
and kept safely so that in case there is a failure of the current one, this backup firewall would simply
be turned on and used as the firewall while the previous one is undergoing a repair. At leastone
firewall shall be configured and reserved (not-in-use) so that in case of a firewall failure, this backup
firewall can be switched in to protect the network.
The firewall shall be configured to log all reports on daily basis so that the network activity can be
analysed when needed.
Firewall logs should be examined on a daily basis to determine if attacks have been detected.
Critical, warning, alerts and information in the firewall logs should be carefully examined by the
network administrator and acted accordingly.
The ISM shall be notified immediately of any security issue by email or other means so that he can
immediately respond to such incident.
The firewall shall reject any kind of probing or scanning tool that is directed to it so that information
that is protected is not leaked out by the firewall. The firewall shall block all software types that
are known to present security threats to a network to better tighten the security of the network.
Once an incident has been detected, the firewall may need to be brought down and reconfigured. If
it is necessary to bring down the firewall, Internet service should be disabled or a secondary firewall
should be made operational - internal systems should not be connected to the Internet without a
firewall. After being reconfigured, the firewall must be brought back into an operational and reliable
state. In case of a firewall break-in, the network administrator is responsible for reconfiguring the
firewall to address any vulnerability that was exploited. The firewall shall be restored to the state it
was before the break-in so that the network is not left wide open. While the restoration is going on,
the backup firewall shall be deployed.
Firewall security policies should be reviewed on a regular basis or whenever major changes are
incorporated in the Network or Firewall configuration. Change management procedure should be
followed for all such changes.
Firewall should not be used as general-purpose server. The only user accounts on the firewall should
be those of the IT Administrators who have been authorized by ISM.
Connections will be allowed only with external networks that have been reviewed and found to have
acceptable security controls and procedures. All connections to approved external networks will pass
through Synergy firewall.
3.2.3 Documentation
The operational procedures for the Firewall and its configurable parameters should be documented,
updated, and kept in a safe and secure place. This ensures that if the responsible person resigns or is
otherwise unavailable, the backup administrator can read the documentation and rapidly pick up the
administration of the firewall. In the event of a break-in such documentation also supports trying to
recreate the events that caused the security incident.
Physical access to the firewall must be tightly controlled to preclude any unauthorized changes to the
firewall configuration or operational status, and to eliminate any potential for monitoring firewall
activity. Synergy Firewall should be located in a controlled environment, with access limited to the IT
Administrators.
The firewall software and hardware components should be upgraded with the necessary modules
to assure optimal firewall performance. The Administrator should be aware of any hardware and
software bugs, as well as firewall software upgrades that may be issued by the vendor. If an
upgrade of any sort is necessary, certain precautions must be taken to continue to maintain a high
level of operational security. To optimize the performance of the firewall, all vendor
recommendations for processor and memory capacities shall be followed.
Hardware and software components shall be obtained from a list of vendor-recommended sources.
Any firewall specific upgrades shall be obtained from the vendor. FTP to a vendor's site should be
used for upgrades.
The Administrator shall monitor the vendor's firewall mailing list or maintain some other form of
contact with the vendor to be aware of all required upgrades. Before an upgrade of any of the
firewall component, the Administrator must verify with the vendor that an upgrade is required.
After any upgrade the firewall shall be tested to verify proper operation.
Firewall capabilities for logging traffic and network events should be enabled. Firewall audit trail logs
should cover hardware and disk media errors, login/logout activity, connect time, use of system
administrator privileges, inbound and outbound e-mail traffic, TCP network connect attempts and in-
bound and out-bound proxy traffic type.
All connections from Synergy network to external networks must be approved by the ISM
Regular review of Audit trails and system logs for external network connections.
The firewall's system integrity database shall be updated each time the firewall configuration is
modified. System integrity files must be stored on file servers or off-line storage.
The Administrator must evaluate each new release of the firewall software to determine if an
upgrade is required. All security patches recommended by the firewall vendor should be
implemented in a timely manner.
Periodic Upgrading of the firewall, firewall backup, Incident handling and restoration procedures
should be carried out.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records (emails,
etc) for demonstrating the compliance to the enforcement of this policy should be retained as an audit trail.
5. References
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of this policy is that Synergy will maintain a track of all software that is installed on the
servers, workstations and laptops.
2. Scope
It shall be the policy of Synergy that each employee shall work diligently to prevent and combat
Computer Software Piracy in order to comply to intellectual property rights associated with computer
software.
3. Policy
3.1 Software Inventory
Synergy will have a centralized system to keep a track of all software that is installed on the servers
/ workstations. It is the responsibility of the IT Team / ITM to maintain this inventory.
The IT Team will maintain a log for the installation and un-installation of all evaluation software,
used at Synergy.
An approved list of software authorized to be used at Synergy should be evaluated against the
business and security requirements and published to the company employees. This list should
continue to evolve with changing business requirements.
Necessary capacity projections for procurement of new/additional licenses should be made well in
advance to avoid bottleneck situations and non-compliance to licensing agreements.
3.4 Monitoring
The IT Team should monitor all servers and workstations for the software that are installed on them.
Any software found to be installed without proper authorization should be immediately uninstalled.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to human resources should be reported to the CISO and acted upon based on this policy. All
necessary records (emails, etc) for demonstrating the compliance to the enforcement of this policy
should be retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of the change management policy is to control the risks due to changes in the IT
Infrastructure.
2. Scope
This policy applies to all the changes related to critical IT Infrastructure.
3. Policy
(a) All IT services required for the normal execution of business processes, supporting the achievement
of strategic business objectives are governed by Change Management Policy.
(b) All requests to modify an IT service or the underlying technical infrastructure are submitted through
a formal Change Request Form and approved by CISO/ ISM and the Process Owner.
(c) A risk assessment appropriate to the size and complexity of the change request is performed and
documented in conformity with the approved risk assessment methodology.
(d) ISSM shall review and prioritize change requests identified as a high risk and monitor the overall
change process and provide feedback to CISO.
(e) CISO shall ensure that all security related risks are properly identified and mitigated by including
the Information Security Steering Committee in their Change Management process and procedures,
if it is found to be necessary.
(f) CISO communicates to all affected parties of the risk and impact of all change requests.
(g) CISO defines and ISM documents procedures to address emergency change requests, including
authority for authorizing such requests.
(h) Where ever possible, changes are developed and tested in an environment separate from
production environment.
(i) All changes to IT services are approved by the process owners prior to implementation into the
production environment whenever possible.
(j) Backups of configuration, application, and data are performed, to the thoroughness warranted by
the identified risk of the change request, in order to restore the IT service to its previous functional
condition, if it is found to be necessary.
(k) For every change request, CISO identifies any supplemental training requirements for IT personnel
and end-users of the IT service. CISO ensures IT personnel are adequately trained to support the
affected IT service, or the underlying technical infrastructure. CISO forward end-user training
recommendations to business management, if it is found to be necessary.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as
an audit trail.
5. Reference
Change Management Procedure
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Introduction
The standard depreciation time for computer hardware (viz., Desktop, Laptop and printers) is three
years. However even when it is fully depreciated, it is still an asset, so no item should be disposed of
without going through the full disposal procedure.
2. Purpose
This procedure is to define the practice of the disposal and data cleansing of computer Hardware
equipment.
As the equipment is typically owned by the originating purchasing cost centre is also responsible for
attracting the best disposal sale price as well as the removal of any proprietary information and software.
3. Background
IT equipment items must be disposed of according to IT Department procedures.
The PIPL must ensure that no equipment contains restricted, confidential, proprietary or other sensitive
information when sold or otherwise disposed. This includes any equipment being re-allocated to other
departments within the PIPL.
Computer software is provided by the PIPL for use on PIPL equipment by staff. It must be removed prior
to disposal of the equipment to avoid breach of copyright or software licensing agreements.
4. Procedure
Cleansing Removal of PIPL Information: All equipment must have all PIPL related information removed
prior to disposal. This is to be done by physically reformatting any hard disks on the Desktops or laptops.
Where there is a large number of PC’s being disposed of and the media and OEM license is available,
then the operating system can be reinstalled after formatting. For individual disposals the PC will simply
have a C:\ prompt on start-up but with no operating system unless there is an explicit requirement for
the OEM licensed software to be reloaded.
Where the PC or Laptop is severely damaged, and cannot be operated to achieve the removal of
software, any storage media must be either removed and physically reformatted on another PC or
physically destroyed.
The PIPL must retain relevant documentation and licensed software media unless allowed by the license
conditions, for example, software used under a site license.
4.2 Server
Backup Information, as servers often contain data and information used by the whole PIPL community it
is vital to ensure that this is archived at the time the machine is taken out of production service.
Document Ref. No. ISMS_Man_018 Version No. 2.0
Any such equipment must have all privacy protected information removed prior to disposal. This is to be
done by physically reformatting any hard disks on the server. If the operating system software license
permits then the operating system can be re-installed.
Erase other non-volatile memory If a purchaser requires the presence of the operating system to verify
the working condition of the hardware, the operating system must be set to its original default
distribution state by removing all VU generated data, applications, personal files of users and cleaning of
selected files relating to passwords, groups, logs, mail boxes, print queues etc. After such a
demonstration, to maintain security of the network infrastructure, the disks must be erased.
Where the server is severely damaged, and cannot be operated, any storage media must be either
removed and physically reformatted on another machine or physically destroyed.
PIPL must retain relevant documentation and licensed software media unless allowed by the license
conditions.
Where required all disposals are to be recorded on the “Assets Disposal Register” and forwarded to the
responsible Finance Officer.
5. Definitions
5.3 Servers
5.5 Policy
Where an external vendor or outsourced arrangement is in place that includes proper disposal of IT
equipment, the PIPL community is encouraged to take advantage of it.
6. Implementation Plan
The Information Technology Department will be responsible for the overall implementation of this policy.
Asset Type:
Asset Description:
PC/Laptop
Servers
Printers
Note IP Address
7. Point Of Contact
Chief Information Security Officer /Designated Authority
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to describe the requirements for dealing with information security incidents. Security
incidents include, but are not limited to: virus, worm, and Trojan horse detection, unauthorized use of
computer accounts and computer systems, as well as complaints of improper use of Information
Resources as outlined in the Email Policy, the Internet Policy, the Acceptable Use Policy, etc. associated
with Synergy.
2. Scope
This policy applies to all the Synergy Services, infrastructure, employees, contractors and third parties
who have been provided access to Information and Information Processing Facilities at Synergy.
3. Incident Classifications
All incidents are classified according to the following criteria. An incident may fit into more than one
defined type. A 'security incident' can be defined as any security related event that has an actual or
potential adverse effect on any computing resource or the data contained therein; or the violation of an
explicit or implied security policy.
4. Policy
(a) ISSC shall formalize processes and procedures that are used to support the resolution of
Incidents.
(b) ISSC shall define procedures for Incident Management that ensures sufficient information is
recorded to ensure the effective execution of all related incident management procedures.
(c) CISO/ISM ensures the approved method, or methods, for reporting incidents are published and
made available to all end-users.
(d) CISO/ISM ensures analysis of incidents occurs on a periodic and regular basis to determine if there
exists a persistent and recurring defect in information processing facilities. If a persistent and
recurring defect found to exist, then a defect/ weakness will be recorded for resolution.
(e) CISO/ISM ensures all incidents reported or identified are prioritized for resolution based upon their
impact to the normal execution of business processes.
(f) CISO/ISM ensures the impact of incident on service performance or availability is made available
to the concerned people.
(g) CISO/ISM ensures the implementation of solutions is done in accordance with the Change
Management policy, wherever applicable.
5. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the CISO/ISM and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
OWNER CISO
REVISION HISTORY
2. Scope
This Plan applies to all the Synergy Services, infrastructure, and Incident Response Team. The Incident
Response Team act according to the plan when an incident is reported .
The Incident Response Team is authorized to take appropriate steps deemed necessary to contain,
mitigate or resolve a computer security incident. The Team is responsible for investigating suspected
intrusion attempts or other security incidents in a timely, cost-effective manner and reporting findings
to management and the appropriate authorities as necessary. The Chief Information Security Officer will
coordinate these investigations.
The Incident Response Team will subscribe to various security industry alert services to keep abreast of
relevant threats, vulnerabilities or alerts from actual incidents.
Each of the following areas will have a primary and alternate member:
Analyzes network traffic for signs of denial of service, distributed denial of service, or other
external attacks.
Runs tracing tools such as sniffers, Transmission Control Protocol (TCP) port monitors, and
event loggers.
Ensures all service packs and patches are current on mission-critical computers.
Ensures backups are in place for all critical systems.
Examines system logs of critical systems for unusual activity.
Monitors business applications / Online Sales and services for signs of attack.
Reviews audit logs of mission-critical servers for signs of suspicious activity.
Contacts the Information Technology Operations Centre with any information relating to a
suspected breach.
Collects pertinent information regarding the incident at the request of the Chief Information
Security Office.
Reviews systems to ensure compliance with information security policy and controls.
Performs appropriate audit test work to ensure mission-critical systems are current with
service packs and patches.
The Information Technology Operations Centre will be the central point of contact for reporting
computer incidents or intrusions. The Operations Centre will notify the Chief Information Security
Officer (CISO).
All computer security incidents must be reported to the CISO. A preliminary analysis of the incident
will take place by the CISO and that will determine whether Incident Response Team activation is
appropriate.
4. Types of Incidents
There are many types of computer incidents that may require Incident Response Team activation.
Some examples include:
This Incident Response Plan outlines steps our organization will take upon discovery of unauthorized
access to personal information on an individual that could result in harm or inconvenience to the
individual such as fraud or identity theft. The individual could be either a customer or employee of
our organization.
In addition to the internal notification and reporting procedures outlined below, credit card companies
require us to immediately report a security breach, and the suspected or confirmed loss or theft of any
material or records that contain cardholder data. Specific steps are outlined in Appendix A. Selected
laws and regulations require the organization to follow specified procedures in the event of a breach
of personal information as covered in Appendix B.
Personal information is information that is, or can be, about or related to an identifiable individual. It
includes any information that can be linked to an individual or used to directly or indirectly identify an
individual. Most information the organization collects about an individual is likely to be considered
personal information if it can be attributed to an individual.
For our purposes, personal information is defined as an individual’s first name or first initial and last
name, in combination with any of the following data:
Likewise, all authorized users who access or utilize personal information on individuals should be
identified and documented. Documentation must contain user name, department, device name (i.e.,
workstation or server), file name, location, and system administrator (primary and secondary contacts).
Data owners responsible for personal information play an active role in the discovery and reporting of
any breach or suspected breach of information on an individual. In addition, they will serve as a
liaison between the company and any third party involved with a privacy breach affecting the
organization’s data.
All data owners must report any suspected or confirmed breach of personal information on individuals
to the CISO immediately upon discovery. This includes notification received from any third party
service providers or other business partners with whom the organization shares personal information
on individuals. The CISO will notify the Chief Privacy Officer (CPO) and data owners whenever a
breach or suspected breach of personal information on individuals affects their business area.
6. Incident Handling
The CISO will determine whether the breach or suspected breach is serious enough to warrant full
incident response plan activation (See “Incident Response” section.) The data owner will assist in
acquiring information, preserving evidence, and providing additional resources as deemed necessary by
the CPO, CISO, Legal or other Incident Response Team members throughout the investigation.
1. Preparation: Preparation has to be completed before effective response to an incident can occur.
Different incident types require different preparation. For each incident response, several things need to
be in place prior to the occurrence of an incident such as: contact information and methodologies for
command staff and team members; facilities for meetings, work, storage, and other activities related to
the incident response; hardware and software tools needed for the recognition and handling of the
incident; as well as documentation and other knowledge bases needed for effective response to the
incident.
2. Detection and Analysis: First reports of an incident – may come from a customer complaint or
report, monitoring tools or other methods. At this step the incident is vetted for validity and categorized
for type and severity. Preliminary notifications and communications are established. Appropriated
response procedures, personnel, and tools are assembled.
4. Post Incident Activity: Report of the incident from start to conclusion is finalized. Updated incident
response procedures, lessons learned, and documentation of any permanent changes to systems as a
result of the incident are generated. Incident data collected is analyzed to determine such things as the
cost of the incident in money, time, etc. Evidence retention policies and procedures are implemented
For the purposes of the Incident Response Plan, the following terms have been defined
Access – The ability or the means necessary to read, write, modify or communicate
data/information or otherwise use any system resource.
Access Control – The process that limits and controls access to resources of a computer system;
a logical or physical control designed to protect against unauthorized entry or use.
Access Control Mechanisms – Hardware, software, or firmware features and operating and
management procedures in various combinations designed to permit authorized, and detect and
prevent unauthorized access to a computer system.
Access Rights – Also called “permissions” or “privileges”, these are the rights granted to users by
the Organization. Access rights determine the actions users have been authorized to perform
(e.g., read, write, execute, create and delete).
Consultant Security Official – The individual designated by the organization who is responsible
for the development and implementation of the policies and procedures.
Application – A computer program or set of programs that processes records for a specific
function.
Application Controls – These refer to the transactions and data relating to computer-based
applications whose purpose is to ensure the completeness and accuracy of records and the validity
of the entries in the records. Applications controls may be manual or programmed, and the
records and entries may result from both manual and programmed processing. Examples of
application controls include, but are not limited to, data input validation, agreement of batch totals
and encryption of data transmitted.
Audit – A methodological examination and review of an organization implementation of Security
Policies and Procedures, including but not limited to SOC2, HIPAA, PCI, ISO 27001 ,etc
Authentication – The corroboration that a person is the one claimed. Authentication is the act of
verifying the identity of a user and the user’s eligibility to access computerized information.
Backup – Exact copies of files and data, and the necessary equipment and procedures available
for use in the event of a failure of applications or loss of data, if the originals are destroyed or
systems are not functioning.
Business Continuity Plan – Also known as contingency plan. A document describing how an
organization responds to an event to ensure critical business functions continue without
unacceptable delay or change.
Business Continuity Planning – Business continuity is the ability to maintain the constant
availability of critical systems, applications, and information across the enterprise.
Data Owners – Individuals employed by organization, who have been given the responsibility for
the integrity, accurate reporting, and use of computerized data.
Disaster Recovery Plan – A documented plan that provides detailed procedures to facilitate
recovery of capabilities at an alternate site.
Disaster Recovery Planning – Disaster recovery refers to the immediate and temporary
restoration of critical computing and network operations after a natural or man-made disaster
within defined timeframes. An organization documents how it will respond to a disaster and restart
the critical business functions within a predetermined period of time; minimize the amount of loss;
and repair, or replace, the primary facility to resume data processing support.
Encryption – A technique (algorithmic process) used to transform plain intelligible text by coding
the data so it is unintelligible to the reader.
Information Technology (IT) Resources – IT resources are tools that allow access to
electronic technological devices, or are electronic technological devices themselves that service
information, access information, or are the information itself stored electronically. These resources
include all state-supplied computers and servers; desktop workstations, laptop computers,
handheld computing and tracking devices; cellular and office phones; network devices such as
data, voice and wireless networks, routers, switches, hubs; peripheral devices such as printers,
scanners and cameras; pagers, radios, voice messaging, computer generated facsimile
transmissions, copy machines, electronic communication including email and archived messages;
electronic and removable media including CD-ROMs, tape, floppy and hard disks; external network
access such as the Internet; software, including packaged and internally developed systems and
applications; and all information and data stored on State equipment as well as any other
equipment or communications that are considered IT resources .
Logical Access Control – The policies, procedures, organizational structure and electronic access
controls designed to restrict access to computer software and data.
Malicious Software – Software, for example, a virus, designed to damage or to disrupt a system.
Password – A protected, generally computer-encrypted string of characters that authenticate an
IT resource user to the IT resource.
Preparation for Incidents - The time prior to the incident that is spent planning for a potential
event. For each incident response, several things need to be in place prior to the occurrence of an
incident such as: contact information and methodologies for command staff and team members;
facilities for meetings, work, storage, and other activities related to the incident response;
hardware and software tools needed for the recognition and handling of the incident; as well as
documentation and other knowledge bases needed for effective response to the incident.
Preventive Controls – Controls designed to prevent or restrict an error, omission or unauthorized
intrusion to IT resources.
Risk Analysis – An assessment of the potential risks and vulnerabilities to the confidentiality,
integrity and availability of IT resources.
Risk Management – The process of identifying, measuring, controlling and minimizing or
eliminating security risks that may negatively affect information systems.
Unique User Identifier – A unique set of characters assigned to an individual for the purpose of
identifying and tracking user identity.
a) Incident Commander/Lead - Management level person(s) with the authority to make high level
decisions and approve actions to be taken by the incident response team.
b) Information Officer – Person who disseminates public and non-sensitive information to interested
parties.
c) Liaisons – Persons who are the point of contact for other governmental and non-governmental
agencies and organizations.
d) Safety Officer – Person who monitors incident operations and advises on matters related to
operational safety.
e) Legal - Advises incident command on legal matters
2) General Staff
a) Operations staff – responsible for the functional aspects of the incident command structure
(b) Security analysts and specialists – team members with incident analysis and
handling skills and experience.
(i) Intrusion and Monitoring SME and Analysts – Person(s) with firewall, IPS, and
monitoring tool experience.
(ii) Forensic SME - Person(s) with systems analysis and forensic ability and
experience
Network Group – Incident response team responsible for functional aspects of network
management
(b) Network SMEs (local area networks, area specialists) – Persons with
experience and authorization necessary to manage affected local area networks.
(i) Oracle
(iii) DB2
Platform Group – Incident response team responsible for functional aspects of server
and workstation platforms
(i) Windows
(ii) Linux
(b) Web Application SMEs - person(s) with experience and authorization necessary to
manage affected web server applications
(i) Antivirus
(ii) Patch Management
(iii) Email
b) Planning staff
Oversees all incident related data gathering and analysis regarding incident operations
and assigned resources, develops alternatives for tactical operations, conducts planning
meetings, and prepares the incident action plan for each operational period.
ii) Resources Unit – Team responsible for assuring that all assigned personnel and other
resources are available at the incident
Resource Managers
(a) Human resource manager – responsible for human resource availability
iii) Situation Unit – Team responsible for collecting, preparing, organizing, processing, and
disseminating ongoing incident information
iv) Documentation Unit – Team responsible for maintaining accurate and complete incident
records including major steps taken to resolve an incident. Also maintains and stores
incident information for legal, analytical, and historical purposes
Incident documenters
v) Demobilization Unit – Team responsible for the creation and dissemination of an incident
wide demobilization plan.
Demobilization planner
vi) Technical Specialists – Team responsible for advising other incident response personnel
on their respective areas of expertise, including but not limited to:
Legal specialist
IT specialists
Medical / healthcare specialist
c) Logistics staff – Responsible for providing all support needs for the incident.
Responsible for all support needs for the incident, including coordination of procurement
for required resources, providing facilities, transportation, supplies, food service,
communications, and medical services for incident personnel.
ii) Supply Unit – Team responsible for receiving, storing, and processing all incident related
resources, personnel, and supplies.
Supply specialist
Human Resources specialist
Procurement specialist
iii) Facilities Unit – Team responsible for set-up, maintenance, and demobilization of all
facilities used in the support of incident operations including food and water service,
sleeping, sanitation and showers, and staging.
Facilities manager
Facilities specialist
iv) Communications Unit – Team responsible for developing, implementing, and maintaining
a communication plan for the incident.
Communications specialist
v) Food Unit – Team responsible for determining food and water requirements, developing
menus, ordering food, providing cooking facilities, cooking, serving, maintaining food service
areas, and managing food security and safety concerns.
Medical specialist
ii) Time Unit – Team responsible for ensuring proper daily recording of personnel time.
Accountant
OWNER CISO
REVISION HISTORY
2. Scope
This policy applies to all Synergy employees who create, modify, access, process, or store sensitive
organization data both in electronic and non-electronic formats.
3. Policy
(a) When an item of Data is created or procured by Synergy, it is classified using its Information
Classification Matrix mentioned in the Asset Management policy.
(b) Individuals with access to data processing facilities are properly instructed to contact the ISM for
instructions on current policy and protection requirements if they are unsure of how to properly
classify, or handle protectively marked data/information.
(c) Recipients of Data must handle it with due care and must respect the classification established by
the originator of the information.
(d) When handling customer or third party proprietary information, personnel understand any
differences in terminology with respect to how their information is classified, and affecting how the
data/information is to be handled or transmitted, to ensure that the information is protected to no
less than the same level as the customer’s or third party’s classification.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as an
audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This document defines the policy for security related to internet services at Synergy.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been
provided access to Network and Information at Synergy.
3. Policy
The policy of Synergy is to ensure the appropriate protection of Synergy’s information transmitted
over the Internet and through emails and to ensure proper availability of internet services for effective
continuity of business operations.
(a) Company employees are encouraged to use the Internet responsibly and productively. Internet
access is limited to job-related activities only and personal use is not permitted.
(b) Availability of internet is very critical for the continuity of business operations. To ensure continued
availability, all employees, who need internet access continuously during business hours, should be
provided with alternate mechanisms to access internet especially when the primary internet
connection in the office is unavailable. E.g. Data Cards
(c) All Internet data that is composed, transmitted and/or received by Synergy’s computer systems is
considered to belong to Synergy and is recognized as part of its official data. It is therefore subject
to disclosure for legal reasons or to other appropriate third parties.
(d) The equipment, services and technology used to access the Internet are the property of Synergy
and the company reserves the right to monitor Internet traffic and monitor and access data that is
composed, sent or received through its online connections.
(e) All sites and downloads may be monitored and/or blocked by Synergy if they are deemed to be
harmful and/or not considered to be valuable/productive to the business.
(f) The installation of software is restricted to authorized people only based on specific business needs.
Unacceptable use of the Internet by employees includes, but is not limited to:
(a) Access to sites that contain obscene, hateful, pornographic, unlawful, violent or otherwise illegal
material.
(b) Sending or posting discriminatory, harassing, or threatening messages or images on the Internet
or via Synergy’s email service.
(c) Using computers to perpetrate any form of fraud, and/or software, film or music piracy.
(e) Downloading, copying or pirating software and electronic files that are copyrighted or without
authorization.
(f) Sharing confidential material, trade secrets, or proprietary information outside of the
organization.
(h) Sending or posting information that is defamatory to the company, its products/services,
colleagues and/or customers.
(i) Introducing malicious software onto the company network and/or jeopardizing the security of the
organization's electronic communications systems.
(j) Sending or posting chain letters, solicitations, or advertisements not related to business purposes
or activities.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as
an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Overview
Access to the Internet through Synergy is a privilege provided to only select personnel. Users granted
this privilege must adhere to strict guidelines concerning the appropriate use of this information
resource. Users who violate the provisions outlined in this document are subject to disciplinary action
up to and including termination. In addition, any inappropriate use that involves a criminal offense will
result in legal action. All users are required to acknowledge receipt and understanding of guidelines
contained in this document.
2. Purpose
To define policies and procedures for access to the Internet through the company network
infrastructure. Appropriate use exposes Synergy to risks including virus attacks, compromise of
network systems and services, and legal issues.
3. Scope
This policy applies to all personnel with access to Internet and related services through the Company
network infrastructure. Internet Related services include all services provided with the TCP/IP
protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), and World
Wide Web (WWW) access.
4. Definition
Company: Referred to Synergy here
Blogging: Writing a blog. A blog (short for weblog) is a personal online journal that is frequently
updated and intended for general public consumption
5. Policy
Access to the Internet is specifically limited to activities in direct support of official Company
business.
In addition to access in support of specific work related duties, the Company Internet
Connection may be used for educational and research purposes.
If any user has a question of what constitutes acceptable use he/she should check with their
supervisor for additional guidance. Management or supervisory personnel shall consult with the
Information Services Manager for clarification of these guidelines.
The Company, Internet access shall not be used for any illegal or unlawful purposes.
Examples of this would be the transmission of violent, threatening, defrauding, pornographic,
obscene or otherwise illegal or unlawful materials.
Use of Company electronic mail or messaging services shall be used for the conduct of company,
business only. These services shall not be used to harass, intimidate or otherwise annoy another
person.
The Company, Internet access shall be responsibly used for private, recreational or other non-
Company related activity.
The Company Internet connection shall not be used for commercial or political purposes.
Use of the Company, Internet access shall not be used for personal gain such as selling access of
a Company user login. Internet access shall not be used for or by performing work for profit with
Company resources in a manner not authorized by the Company.
Users shall not attempt to circumvent or subvert security measures on the Company's network
resources or any other system connected to or accessible through the Internet.
Company users shall not use Internet access for interception of network traffic for any purpose
unless engaged in authorized network administration.
Company users shall not download inappropriate software/other materials which can lead to
virus, spyware attacks.
Company users shall not make or use illegal copies of copyrighted material, store such copies on
company equipment, or transmit these copies over the Company network.
Company employees shall ensure all communication through Company e-mail or messaging
services is conducted in a professional manner. The use vulgar or obscene language is prohibited.
Company users shall not reveal private or personal information without specific approval from
management.
Users should ensure that e-mail messages are sent to only those users with a specific need to
know. The transmission of e-mail to large groups or messages with large file attachments should
be avoided.
Electronic Mail is not guaranteed to be private. Messages transmitted through the Company e-
mail system or network infrastructure are the property of Company and are therefore subject to
inspection.
5.4 Blogging
Blogging by employees, whether using Company’s property and systems or personal computer
systems, is also subject to the terms and restrictions set forth in this Policy. Limited and
occasional use of Company’s systems to engage in blogging is acceptable, provided that it is
done in a professional and responsible manner, and is not detrimental to Company policy and
interests.
Company’s confidential Information policy also applies to blogging. As such, Employees are
prohibited from revealing any Company confidential or proprietary information, trade secrets or
any other material covered by Company’s confidential Information policy when engaged in
blogging.
Employees shall not engage in any blogging that may harm or tarnish the image, reputation
and/or goodwill of Company and/or any of its employees. Employees are also prohibited from
making any discriminatory, disparaging, defamatory or harassing comments when blogging.
Employees may also not attribute personal statements, opinions or beliefs to Company when
engaged in blogging. Employees assume any and all risk associated with blogging.
Irrespective of using company infrastructure or otherwise, blogging, micro-blogging or posting of
short messages or status messages on social media sites or instant messengers, referring to
company confidential information is prohibited.
6. Security
Company users who identify or perceive an actual or suspected security problem shall
immediately contact the Compliance Team.
Users shall not reveal account password or allow another person to use their account. Similarly,
users shall not use the account of another user.
Access to Company network resources shall be revoked for any user identified as a security risk
or a demonstrated history of security problems
7. Penalty
Any user violating these policies is subject to the loss of network privileges and any other
Company disciplinary actions deemed appropriate.
8. Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of this policy is to record the activity or “audit trail” of system and application processes at
Synergy for monitoring purposes.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been provided
access to Network and Information at Synergy.
3. Policy
Logs and Audit trails are a means of recording a user’s or system activity as it happens. This helps in
tracing out system generated faults or errors that are caused by users. However, logs and audit trails
do not prevent the events from occurring. If publicized as an on-going security practice, this may deter
the misuse of system resources.
3.1 Auditing
Auditing is a means of tracing the activities carried out by users and application events. Operating
systems, applications, databases must be configured to audit the transactions that meet exception
criteria. It must be ensured that these transactions are completely and accurately highlighted.
Adequate audit trails shall be captured and certain information that is needed to determine sensitive
events and pattern analysis that would indicate possible fraudulent use of the system (e.g. repeated
unsuccessful logons, access attempts over a series of days) shall be analysed.
This audit trail must include information as who, what, when, where, and any special information such
as
Any user who is carrying out critical activities or is accessing systems that hold sensitive information
must be identified and tracked.
The ISM will define the period for which auditing needs to be enabled on a system.
Auditing and logging for the identified events and activities should be enabled on
Domain Controller
Network Devices
Databases
Proper selection of audit events requires a careful balance between capturing all the information that
may provide clues to user actions and system performance.
If too many events are captured, system performance may be too slow and the audit logs will be
larger. If enough events are not captured, a critical piece of information required to identify an event,
attacker, or even to notice a system break-in may be missed.
User ID
System login/logoff
Successful sign-on by authorized users and failed sign-on attempts
The specific list of events to be audited will depend on the security requirements that get identified
during the system setup process as defined in the operating system security policy. At a minimum, the
system should audit all user logins and any privileged activities.
The database log should record the user ID of the operator and the type of transaction
executed at the database.
Firewall Logs:
Log file media do not get exhausted, fail to record events and over write itself.
The manual reviews will be conducted on a periodic basis and a report of the findings must be sent to
the ISM/CISO.
All events that indicate a security breach must be acted upon as per the incident management policy.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as an
audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to describe authentication, authorization and accountability in Information Systems by
the employees.
2. Scope
This policy applies to all the Synergy employees who have been provided access to information or
information processing facilities at Synergy.
3. Policy
3.1 General
“Access to the information and business processes shall be controlled on the basis of business and
security requirements”
Access given to all Synergy information resources should be restricted and governed by the principle of
‘least privileges’
Access privileges shall be granted based on ‘authorized to know’ and ‘need to know’ basis.
Periodic reviews of access rights shall be conducted to ensure the above principles are adhered.
All unauthorized/ unwanted access privileges should be revoked upon discovery/ detection or
notification.
Acceptable usage policy plays a critical role in the overall success of security architecture and
organization. Management shall ensure that this policy is followed across the organization without any
exceptions. IT team shall organize surprise checks to ensure compliance and any violation shall be dealt
with strongly.
Access given to third parties for Synergy’s information resources should be restricted and governed
by the same principle of ‘least privilege’ and ‘need to know’ basis. The Synergy’s employee
coordinating with the respective third party consultants, engineers, vendor’s representatives etc.
are responsible for justifying and authorizing the access rights granted to third parties.
Remote connectivity from third party representative’s office to Synergy’s network should not be
allowed without permissions from CISO or ISM.
Access rights to the external agencies should be formally granted and monitored. The relevant
rights should be revoked once the required assignment is over. System Administrator should review
activity logs generated at the System level to monitor activities performed by such external
agencies.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as
an audit trail.
5. References
Logical Access Control Procedure.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The policy of Synergy is to ensure that all the Laptops/ mobile computing equipment and the
information on those systems shall be protected from theft, mishandling and environmental threats.
2. Scope
This policy applies to all mobile computing equipment including laptops, PDAs, Smart phones, etc.
3. Policy
(a) The physical and logical controls that are available within Synergy environment are not
automatically available when working outside of that environment. There is an increased risk of
information being subject to loss or unauthorized access. Mobile computing users shall take special
measures (as per the guidelines given to them during the awareness sessions) to protect sensitive
information in these circumstances.
(b) Sensitive data stored on laptops and other mobile storage devices should be kept to a minimum to
reduce risk and impact should a breach of security occur.
(c) Loss of any mobile device containing sensitive data, or any other security breach, should be
reported immediately to ISM/CISO.
(d) Laptops and home personal computers should not be used for business activities without
appropriate security measures, including up to date security “patches” and virus protection.
(e) Sensitive information held on any mobile device must be securely erased before the device is
reassigned to another user or to another purpose.
(f) All the critical information contained in the laptop shall be backed up periodically with the help of
IT department as per the backup policy.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
mobile computing devices should be reported to the ISM and acted upon based on this policy. All
necessary records (emails, etc) for demonstrating the compliance to the enforcement of this policy
should be retained as an audit trail.
5. References
Backup Policy and Restoration Policy
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to protect the confidentiality, integrity and availability of data and telecommunications
networks.
2. Scope
The scope of this policy includes network architecture, network security management, network
technology, email security, third-party network connection security, telecommunications security, and
wireless security.
3. Policy
In order to safeguard Synergy information system network, from various business and environmental
threats, systems and procedures will be developed and implemented for usage of telephones, facsimiles
and also by providing network security resources at a level that is appropriate for the nature of the data
transmitted to protect all business data, related application systems and operating systems software
from unauthorized or illegal access. In order to determine the appropriate level of security, data
owners whenever required should perform a risk analysis on the data transmitted every time the nature
of the data changes significantly.
Minimize single points of failure and the number of entry points into the network
Allow the network to be remotely configured
Network design should take care of users’ service requirements. The IT Department should prepare,
update and maintain the diagrams showing the entire network connectivity in Synergy.
Networks should be segregated into VLANs based on the business and security requirements Sensitive
systems within the network should be isolated in a separate environment.
De-Militarized Zones should also be considered for securing the network.
Access to local system control utilities (e.g. Remote desktop control software, Batch Files, Unix Scripts
etc.) should be controlled. These utilities should be installed on local PCs and should be intended for
use by the Systems Administrator / help desk to assist end-users resolve problems. Access to the
utilities should be limited to Systems Administrator / authorized helpdesk support personnel only. They
should only be used after IT team has informed the user of this capability.
Synergy does allow use of Modems within Synergy Network. All data communication should occur
through the installed leased lines only.
Synergy does not allow any remote connection to its network via dial in method. No modem servers
are implemented which can allow this type of communication.
The CISO/ ISM should impose adequate security controls for protecting the network so that users
cannot attach hardware and install remote control communications software (software that allows a
remote user to dial into a PC attached to the network and issue commands from it as if it were attached
to the network itself). The use of personal communications equipment (modems, ISDN cards, etc.)
attached directly to personal computers with remote control software is strictly prohibited.
All network equipment default passwords (e.g., routers) should be changed by the IT personnel, when
installed.
External connections should be allowed only after proper authentication in the network.
All the equipments in the network should be uniquely identified within the network. Unauthorized
devices should not be assigned IP addresses prior to identification and authorization in the network.
All unwanted and unused ports/ services/ functionalities should be disabled on the devices. Enabling
network ports and services should be done through an authorization and approval process from CISO.
Systems Administrator should require the operating system to validate each user prior to allowing
network access.
Synergy computers should be used for valid business reasons only. The protection of information
contained on Synergy networks is therefore the responsibility of the management and the activity and
content of user information on Synergy computer networks is within the scope of review by
management. To maintain the privacy of Synergy employees, Synergy networks should not be used
for personal and / or private information, unrelated to job functions.
All employees should avoid accessing areas on Synergy networks for which they do not have a valid
business need. While networks are intended to share information, it is each user's responsibility to
exercise judgment over the information they access.
All hosts that run applications or contain data that are non-public should be isolated behind a
firewall from public external networks.
All outbound traffic from Synergy India to external networks and vice-versa should pass through
a gateway (or firewall). The firewall should not serve as a general-purpose host or have features,
which weaken security (e.g., rlogin, etc.).
The firewall should be installed on gateway PC connected to Internet to control the Internet traffic
(outgoing and incoming) and allow only desired packets to pass through. The firewall should also
perform packet filtering to verify the source and destination IP address.
IT Personnel should use access control lists on routers. Access control list on all routers should be
defined and documented.
A greeting on any external network connections should not be displayed until the user is authenticated
through a sign-on sequence that requires a unique user ID and password.
A message should be displayed on all external network connections warning potential users that
unauthorized use is prohibited (e.g. Unauthorized access to the network is prohibited).
Software that performs unattended file transfer to or from other systems should be used to
authenticate the origin and destination file names as well as any user submitting the request unless
the information being transferred is classified as Public.
Security-related event logging should be done for all system platforms and all applications, which
utilize restricted information.
Wherever possible system platforms should have log file access controls enabled that restrict create,
write, and modify capabilities to the application or platform Operating System. Users and Systems
Administrator should be restricted to read-only access.
Important and critical log files should never be overwritten or deleted until they are backed up.
Login failures
Account lockouts
System or application start, stop, re-initialization (with user identity and time of action)
Log files should be reviewed daily or not less often than log file rotation or overwrite.
Copies of log files and system administrator records should be provided to CISO upon request.
Access to log files in both electronic and hard copy form should be limited as per “need-to-know”
basis.
Log files should be retained for three months and copied to a disk for key systems like servers,
firewalls, application gateways, routers and other network devices.
Monitoring of activity on the network environment should be performed using network-monitoring tools.
The system administrator should review the logs and reports generated by the network- monitoring tool
regularly and incidents, which cannot be resolved by him, should be immediately escalated to the CISO.
Availability and Capacity Monitoring is done for Critical Servers and all Network Devices.
CISO/ ISM should ensure that all network components are uniquely identifiable and restricted for
their intended business function. This includes protection for all vulnerable points in the network.
Vulnerability Assessment and Penetration Testing should be conducted periodically to understand the
vulnerable points.
All network and server equipment including LAN-servers, routers, switches, hubs etc. should be
physically secured from unauthorized access by placing them in locked rooms and closets.
Access to such rooms should be provided only to IT personnel and other personnel on approval from
CISO.
All cable and line facilities for both voice and data should be located in secured areas. If the lines
cannot be secured, the personnel responsible for telecommunications should document the reasons
and submit them to the CISO/ISM.
Where technically feasible, access to highly sensitive processing functions should be secured by limiting
the terminals from which these functions should be executed and physically and / or logically restricting
these terminals. These terminals should be secured by physical (e.g., keyboard locks) and / or logical
(access control software) means when unattended.
The physical component and, where possible, the location of the logical access request should be
identified to the system being accessed. Devices may include terminals, lines, communication nodes,
controllers, remote processors and personal computers.
Hardwired communication lines (e.g., network lines, telephone lines, etc.) should be catalogued and
uniquely identifiable to the system being accessed to facilitate the discovery of wiretaps. The network
diagram should be kept with the location and a copy should be sent to the CISO and ISM. Wherever
changes are made, they should be appended to the file.
3.7.3 Responsibility
Network/Systems Administrator (at Server Room) is responsible for maintaining network and
telecommunication security controls of all data, applications and operating systems on the server.
It is the responsibility of IT users at each location to rigorously follow the network and
telecommunication security policy. The IT users should formally inform the Systems Administrator
about any lapse on the network and telecommunication security either orally or immediately by
mail.
When using the telephones, especially a speakerphone or public phone, to discuss sensitive information,
users will ensure that their conversations cannot be overheard. This is especially a problem in public
places such as railway platforms, airports etc. where people are attempting to conduct business and can
be overheard by many people.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
human resources should be reported to the ISSC and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
5. References
Log & Audit Trail Policy
Logical Access Controls Policy
Change Management Policy
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The purpose of this policy is to establish a standard for security of passwords.
2. Scope
The scope of this policy includes all personnel who have or are responsible for an account (or any form of
access that supports or requires a password) on any system that resides at any Synergy facility, has
access to the Synergy network, or stores any non-public Synergy information. This also includes all the IT
Infrastructure devices at Synergy.
3. Policy
User passwords should remain confidential and not shared, posted or otherwise divulged in any manner.
Passwords should consist of at least one alphanumeric character with special character. The first alphabet
should be in upper case minimum 8 characters
Passwords should expire within 45 days for domain login and 90 days for Email account, an OTP must be
generated for email password reset to users office mobile number Users would be prompted on their
individual systems on expiration of the passwords at least 5 days in advance. Additionally, the same
password should not be repeated within a cycle of 3 password changes.
After 5 unsuccessful login attempts account shall be locked out. Subsequently user needs to raise a
request to the IT team for unlocking the account.
If the administrator provides a user with an initial password, the user should change it immediately after
the first time log – in to the system. (One-time password).
Users should be provided with the capability to change their password on the login interface (after
authentication).
User password resets will be performed when requested by the user, after verification of identity. The
‘Password reset request’ should be send by the user to the IT team. The new password should be a one-
time password. Only the individual to whom the user-ID is assigned should request for user password
reset. IT Administrators should be informed whenever a password is reset for a particular user. In case of
request for change of password sent through another user’s login ID, a copy of the mail needs to be sent
to the person whose password is being reset.
All users should use the screen saver with password, which should be activated after a defined period of
inactivity i.e. 5 minutes.
3.1.9 Responsibility
It is the responsibility of IT users to rigorously follow the password security policy. The IT users should
formally inform the Administrators about any lapse on the password security either orally or by e-mail.
Wherever possible systems/servers should be configured to enforce the above mentioned password
policy through automated techniques. E.g. GPO in Windows Active Directory.
a) enforce the use of individual user IDs and passwords to maintain accountability;
b) allow users to select and change their own passwords and include a confirmation procedure to
allow for input errors;
3.1.11 Limitations
Wherever the system does not enforce the policy automatically, the users should be advised to change
the passwords manually.
Users should be encouraged to create passwords that will prohibit easy guessing (i.e., passwords such as
spouse's first name, Children name, etc.).
3.2.2 Passwords should not be based on any of the following: (Best practices)
All users should ensure that they do not use any of the following to create their individual passwords, as
these are easily guessable by any person with malicious intent.
Months of the year, days of the week or any other aspect of the date (like date of birth, date of
joining etc.)
Passwords for privileged accounts should be changed more frequently than normal passwords
Users should not use the same password for business and non-business purposes
Set up specific password policies via GPO for Windows systems. Password complexity should be enforced
via group policies. Password minimum length should be 8 characters, with a forceful change after every
45 day cycle. Last 3 passwords should not be usable. The system should prompt wherever possible to the
user for expiring password at least 4 days in advance at logon.
Database user names and passwords may be stored in a file separate from the executing body of
the program's code. This file must not be world readable.
Database credentials may reside on the database server. In this case, a hash number identifying
the credentials may be stored in the executing body of the program's code.
Database credentials may not reside in the documents tree of a web server.
Pass through authentication (i.e., Oracle OPS$ authentication) must not allow access to the
database based solely upon a remote user's authentication on the remote host.
Passwords or pass phrases used to access a database must adhere to the password policy
If stored in a file that is not source code, then database user names and passwords must be read
from the file immediately prior to use. Immediately following database authentication, the
memory containing the user name and password must be released or cleared.
The scope into which you may store database credentials must be physically separated from the
other areas of your code, e.g., the credentials must be in a separate source file. The file that
contains the credentials must contain no other code but the credentials (i.e., the user name and
password) and any functions, routines, or methods that will be used to access the credentials.
For languages that execute from source code, the credentials' source file must not reside in the
same browseable or executable file directory tree in which the executing body of code resides.
Every program or every collection of programs implementing a single business function must have
unique database credentials. Sharing of credentials between programs is not allowed.
Database passwords used by programs are system-level passwords as defined by the password
policy
Developer groups must have a process in place to ensure that database passwords are
controlled and changed in accordance with the password policy
This process must include a method for restricting knowledge of database passwords to a need-
to-know basis.
4. Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment. Password cracking or guessing may be performed on a periodic or random
basis by the Information Security Department or its delegates. If a password is guessed or cracked
during these exercises, the user/owner will be required to change it.
5. Password Deletion
All passwords that are no longer needed must be deleted or disabled immediately. This includes, but is
not limited to, the following:
Access to the other networks via remote access is to be controlled by using either a Virtual Private
Network or a form of advanced authentication (i.e., Tokens, Public Key Infrastructure (PKI), Certificates,
etc.).
8. Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Objective
The objective of this policy is to ensure safety and security of Synergy information processing facilities.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been provided
access to information or information processing facilities.
3. Definitions/Glossary
Term/Abbreviation Definition/Expansion
Mobile devices Laptop, Blackberry, Palmtop, Tablet Pc, Smart Phones, Mac Mini, MacBook
Pro
Media CD, Pen Drive, External Hard Disk ,Memory Card etc.
4. Policy
The security perimeter shall be clearly defined and will be physically sound.
Project level physical security aspects shall be considered, if required.
A manned reception area shall be established to control physical access.
A manned Building Management System shall be established to monitor physical access.
BMS room should monitor all entry and exit doors including fire exit and service doors.
All fire doors on a security perimeter shall be access controlled and in case of fire alarm same will
open automatically.
All windows of the entire premises are locked after office hours.
Buildings shall be unobtrusive and give minimum indication of their purpose, with no obvious
signs, outside or inside the building identifying the presence of information processing activities.
Support functions and equipment shall be sited to avoid demands for access, which could
compromise information.
Doors and windows shall be locked when unattended
External protection shall be considered for windows, particularly at ground level.
Suitable intruder detection systems shall be installed to cover all external doors and accessible
windows.
Unoccupied areas shall be manned at all times. Security cover shall also be provided for other
areas, e.g. computer room or communication room.
Visitors are allowed into premises only after showing any Govt. issued Photo IDs at the reception.
After verification, Information is recorded in Visitors Register (Name, Date, In/Out Time, ID
Details, Purpose, Badge , Laptop, etc) and Visitor Badge & Visitor Slip are issued and diverted to
respective floor.
All the visitors or vendor entering inside the premises need to be reminded by the Security
guards to ensure that they don’t carry any personal laptops, media or electronic devices inside
the premises. Any exception should be authenticated only by Location Head/Compliance Head.
Prohibit items ie. Gun, Knife, Crackers, Petrol, Pepper spray, non-Synergy Laptops, External Hard
drive, Pen Drive, etc. are no allowed to carry inside Synergy facilities , security guard should
check all Baggage at entry doors to ensure it not contains any prohibited items.
Visitor / Employee bags will be checked by security of each floor at the time of exit and ensure
bags does not contain any Synergy assets or Synergy Computing Peripherals like Memory Stick,
Hard Disks, Laptop ,Mac Machine, Tablets& Smart Phones etc which they are not authorized to
carry .
Visitors will be educated by the security on what they should do in case of an emergency and to
get the sign off from the employee in the entry pass slip.
Visitors shall be granted access for specific, authorized purposes only and their activities in
secured areas are supervised.
Visitors are issued with instructions on the security requirements of the area and on emergency
procedures.
For all the other visitors, the Front office executive/Security will call out the respective employee
to the reception for the meeting and ensure he/she is not getting inside the work area without
Synergy employee escort.
All the employees should have access for all entry and exit doors.
All personnel shall wear clearly visible Synergy ID card inside Synergy Premises.
Tailgating a person or allow someone to tailgate is strictly prohibited and penalty will be levied
against the person tailgating. Punitive action will be taken if mistakes are repeated
In case of tailgating, the concerned employee will be verbally warned by security team. Incident
will be raised in which employee will sign off for acceptance. If it is repeated, the same will be
escalated to HR by email for necessary action.
Access to sensitive information and information processing facilities shall be controlled and will be
restricted to authorized persons only.
An audit trail of all access shall be maintained.
Employee can verify own access details through Access Log Tool.
Access rights to secure areas shall be regularly reviewed and updated.
Anyone coming as visitor for more than 3 days will require an approval from Synergy Location
head.
Security should verify the asset tag employee ID and carrier employee ID’s are should be same.
If the employee is identified with unregistered personal belonging while exit, the respective
device/asset will be withheld by the Security and the same will be handed over subject to
verification, post approval from their functional head, Admin department and IT Department.
Electronic device like (Mobile Phones, VPN tokens provided by Client, Bluetooth hand free are
exceptional)
Equipment shall be protected from power failures and other electrical anomalies. Options for
continuity can include multiple feeds, UPS, and back-up generator. PS shall be tested regularly to
maintain its operational efficiency
5. Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to describe the disciplinary process necessary to control the information security risks
posed by the employees, contractors or third parties.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been
provided access to information or information processing facilities at Synergy.
3. Policy
In order to safeguard its values, Synergy has developed Information Security Policies & Procedures
with which every one under the scope of this policy must comply. Synergy has also established a
mechanism to detect and report violations to the corporate information security policy and define
punitive actions to be initiated for such violations.
The punitive actions shall be governed by the extent and level of severity of violation as classified by
this policy and related business impact, risk assessment of any such violation.
The formal disciplinary process would ensure correct and fair treatment for employees, contractors or
third parties who are suspected of committing breaches of security. The formal disciplinary process
would provide for a graduated response that takes into consideration factors such as the nature and
gravity of the breach and its impact on business, whether or not this is a first or repeat offence,
whether or not the violator was properly trained, relevant legislation, business contracts and other
factors as required.
In serious cases of misconduct the process would allow for instant removal of duties, access rights
and privileges, and for immediate escorting out of the site, if necessary.
Compliance to the information security policy is mandatory. In order to ensure that the policy is
effective and enforceable, an effective mechanism shall be put in place to ensure compliance. All
violations of the information security policy shall be reported to the CISO/ISM and the ISSC.
Violations must be categorized into various levels as described in the Disciplinary procedure. Punitive
actions must be laid down for each category of the violation. The punitive action may be decided on a
case-to-case basis depending on the impact of the violation on the information systems resources of
Synergy.
The list mentioning the type of violation shall be maintained and updated by CISO, HR and IT teams
and should be reviewed and approved by ISSC.
For all new type of violation, punitive actions must be defined by CISO, HR and IT teams in
consultation with ISSC.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to this policy should be reported to the ISSC and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy establishes requirements for internal server equipment to help minimize the exposure of
Synergy’s critical infrastructure and information assets to threats that may result from unprotected
hosts and unauthorized access.
2. Scope
This policy applies to server equipment that is owned, operated, and maintained by Synergy.
3. Policy
3.1 General
(a) All changes to server infrastructure should be done as per the change management policy.
(b) Any deviations from the compliance to be above policy should be authorized by the ISM.
(c) All critical servers should have necessary redundancies to support the business in the event of a
disaster.
(d) Power supply requirements to the servers should be evaluated and appropriate controls applied.
(e) IT shall develop and maintain server hardening checklists and monitor the health of the servers
regularly. Necessary records shall be maintained as an audit trail.
(f) To ensure high availability, advanced security controls shall be considered as and when deemed
to be necessary based on the risk assessments i.e. Advanced RAID configurations, Hot swap
mechanisms, Redundant Power Supply (RPS), additional NIC cards, etc.
(g) Vendor support for the entire server infrastructure should be maintained at all times.
(h) Contact with vendors and other special interest groups providing specialist advice on the
management of the servers should be maintained.
3.2.1 Hardware
(a) Configuration details of the server hardware should be maintained in the hardwareinventories.
(b) Physical access to the server should be restricted only to the authorized personnel.
(c) Port access to the server must be configured in a secured manner.
(d) Unused ports in the server should be disabled from the BIOS.
(e) Server maintenance shall be scheduled and performed at regular intervals.
3.2.2 Software
a) Operating system configuration must be done according to the services operated in the Server.
b) Services and applications not serving business requirements must be kept disabled mandatorily.
c) Access to services should be logged and protected through access control methods, if possible.
d) The most recent security patches must be installed on the system as soon as practical, the only
exception being when immediate application would interfere with business requirements.
e) All the security patches should be tested before being applied on the servers.
f) Trust relationships between systems are a security risk and their use must be avoided. Do not
use a trust relationship when another method of communication is sufficient.
g) Always use standard security principles of least privilege access to perform a function. Do not
use root when a non-privileged account access is sufficient.
h) If a methodology for secure channel connection is available, privileged access must be
performed over secure channels (for example, encrypted network connections using SSH or
IPSec). Use of insecure protocols such as Telnet should be restricted.
i) Servers should be physically located in an access-controlled environment. Servers are
specifically prohibited from operating from uncontrolled cubicle areas.
j) All servers must have authorized and supported antivirus software installed and scheduled to
run at regular intervals.
k) System state/ configuration backups of the servers shall be taken regularly.
l) Remote access to servers for specific maintenance purposes should be provided in a secure
manner. Server administration and maintenance activities should be logged and monitored for
compliance. Limitation of connection time to the servers shall be considered depending on the
risk implied. Remote locations/IP addresses for such connections should be restricted to reduce
the risks of unauthorized access.
3.3 Monitoring
(a) All security-related events on critical or sensitive systems must be logged and audit trails saved
as follows:
a. All security related logs must be kept online for a minimum of one week.
b. Weekly full backups of logs must be retained for a minimum of one month.
c. Monthly full backups must be retained for a minimum of six months.
(b) Security-related events must be reported to ISM, who will review logs and record the incidents.
Corrective measures must be prescribed as needed. Security-related events include but are not
limited to the following:
a. Port-scan attacks
b. Evidence of unauthorized access to privileged accounts
c. Anomalous occurrences that are not related to specific applications on the host.
d. Unexpected shut down or restart
e. CPU/ memory utilization
f. Performance issues
(c) Periodic vulnerability assessment and penetration testing shall be conducted for all the servers
4. Policy Enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as
an audit trail.
5. References
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
Synergy recognizes that there are legitimate business and personal reasons for using social media at
work or using corporate computing resources. To enable employees to take advantage of the business
value of these sites and to promote an open, trusting, collaborative workplace, Synergy policy allows all
employees to use social media within the Policies & guidelines specified below.
2. Scope
This policy is applicable to all the employees of the Synergy.
3. Policy
3.1 Social Media Definition
Social media includes any Web site in which visitors are able to publish content to a larger group.
Content shared may include (but is not limited to) personal information, opinions, research,
commentary, video, pictures, or business information. Examples of such destinations include large
branded entities such as Facebook, Twitter, YouTube, and LinkedIn. However, blogs, special interest
forums, user communities are also considered social media.
a. Posting of content to corporate sponsored social media (e.g. the corporate Facebook page) is
permitted only for the following employees authorized to publicly represent the company.
a. Inappropriate content should not be accessed by employees while at work, or while using
company resources.
b. Content that is inappropriate for the workplace including nudity, violence, abused drugs, sex, and
gambling.
c. Inappropriate content policy that applies to the broader Web, also applies to content found within
social media.
d. In addition to these guidelines, employees should use common sense and consideration for
others in deciding which content is appropriate for the workplace.
e. The company employs technical controls to provide reminders, monitor, and enforce this policy.
a. Synergy recognizes that employees have a need, at times, to conduct personal business within
social media while at work or using company resources.
b. Therefore, Synergy allows limited access to non-business social media content. For example,
employees are allowed to access personal communications applications, email, and blog content
within social media for limited time by not impacting business activities
c. It is the responsibility of the employee to ensure that personal business Does not affect work
quality or productivity.
a) These policy guidelines apply to all social media communications whether personal or company-
sponsored.
b) Employees are responsible for content they publish in social media and can be held personally
liable for content published.
c) Employees also can be subject to disciplinary action by respective regulatory authorities for
publishing inappropriate or confidential content.
You may not sell any product or service that would compete with any of your company's products or
services without permission in writing from the Management. This includes, but is not limited to
training, books, products, and freelance writing. If in doubt, talk with your manager.
Social media is commonly used by the online criminal community to deliver malware and carry out
schemes designed to damage property or steal confidential information. To minimize risk related to
such threats, adhere to the following guidelines. While these guidelines help to reduce risk, they do
not cover all possible threats and are not a substitute for good judgment.
a) Do not use the same passwords for social media that you use to access company computing
resources.
b) Do not follow links or Download software on social media pages posted by individuals or
organizations that you do not know.
c) If any content you find on any social media Web page looks suspicious in any way, close your
browser and do not return to that page.
d) Configure social media accounts to encrypt sessions whenever possible. Facebook, Twitter and
others support encryption as an option. This is extremely important for roaming users who
connect via public Wi-Fi networks.
a) Ensure that your communication with any of Synergy leads, clients or any other business contact
is restricted to Synergy email id, Synergy Skype id, Synergy phone.
b) It is recommended not to give your personal email id, Skype/MSN id, personal phone/cell
numbers etc. to Synergy leads, clients or any other business contact.
c) It is your responsibility to let management know if you find anyone on the floor indulging in
communications with Synergy clients in violation of this policy.
a) Do not accept tasks from people who have approached you based on your social media profile
(Twitter, Facebook, LinkedIn, etc.) where you have given in your profile that you are an REA, EA,
VA, etc. Instead direct them to GBD team.
b) Do not accept work from existing or past clients who have approached you after they saw your
profile.
c) Do not post testimonials and feedback that you received from your clients on your personal
profiles and blogs.
d) Do not solicit or accept any assignments that are competing with the work that Synergy does.
b) Make sure you do not disclose or use Synergy confidential or proprietary information including
pricing
c) Do not comment on confidential financial information such as future business plans, prospects,
strategy, research reports, templates, internal mails, management or HR messages, processes
and data, website and other content, etc.
b) Do not mention the project details, including the analysis, research reports, certain data etc..
e) Do not sell client deliverables even with alterations. It belongs to Synergy or its clients.
a) Speak respectfully about the company and our current and potential employees, customers,
partners, and competitors. Do not engage in name calling or behavior that will reflect negatively
on your company's reputation. Note that the use of copyrighted materials, unfounded or
derogatory statements, or misrepresentation is not viewed favourably by Synergy and can result
in disciplinary action up to and including employment termination.
b) Honor the privacy rights of our current employees by seeking their permission before writing
about or displaying internal company happenings that might be considered to be a breach of
their privacy and confidentiality.
d) Respect your audience. Don't engage in any conduct that would not be acceptable in Synergy
workplace. You should also show proper consideration for others' privacy and for topics that may
be considered objectionable or inflammatory—such as politics and religion.
e) Don't pick fights. When you see misrepresentations made about Synergy by media, analysts or
by other bloggers, inform the Management about such issues to get the right response. Always
respond to any Doubts, complaints etc. with respect.
g) Synergy brand is best represented by its people and what you publish may reflect on Synergy
brand.
a) Please note that every employee has signed a legal non-disclosure and confidentiality agreement,
which if violated can be legally enforced.
b) Recognize that if you violate any of the clauses which have legal complications for Synergy, it
can have legal repercussions for you as well
c) Recognize that you are legally liable for anything you write or present online.
d) Use your best judgment. Remember that there are always consequences to what you publish. If
you're about to publish something that makes you even the slightest bit uncomfortable, review
the suggestions above and think about why that is. If you're still unsure, and it is related to
Synergy business, feel free to discuss it with your manager.
e) If you make an error, be up front about your mistake and correct it quickly. In a blog, if you
choose to modify an earlier post, make it clear that you have Done so.
f) Identify yourself—name and, when relevant, role at Synergy—when you discuss company-
related matters. And write in the first person. You must make it clear that you are speaking for
yourself and not on behalf of Synergy if you have not taken our permission.
g) Use a disclaimer. Whether you publish to a blog or some other form of social media, make it
clear that what you say there is representative of your views and opinions and not necessarily
the views and opinions of Synergy. At a minimum in your own blog, you should include the
following standard disclaimer: "The postings on this site are my own and Don't necessarily
represent Synergy positions, strategies or opinions."
a) Do know and follow all privacy and confidentiality guidelines in the Employee Handbook. All
guidelines in the employee handbook, as well as laws such as copyright, fair use and financial
disclosure laws apply to social media.
b) Do not disclose or use Synergy classified information or that of any other person or company.
For example, ask permission before posting someone's picture in a social network or publishing in
a blog a conversation that was meant to be private.
c) Do not comment on company stock price or confidential financial information such as future
business performance or business plans.
d) Do not cite or reference customers, partners or suppliers without their written approval.
e) Do identify yourself. Some individuals work anonymously, using pseuDonyms or false screen
names. Synergy discourages that practice.
f) Do be professional. If you have identified yourself as a Synergy employee within a social
website, you are connected to your colleagues, managers and even Synergy customers. You
should ensure that content associated with you is consistent with your work at Synergy.
g) Do ask permission – to publish or report on conversations that are meant to be private or internal
to Synergy and when in Doubt, always ask permission from the Synergy legal department or
CISO office.
h) Do speak in the first person when engaging in personal social media communications. Make it
clear that you are speaking for yourself and not on behalf of Synergy.
i) Do use a disclaimer – If you publish personal social media communications and it has something
to Do with the work you Do or subjects associated with Synergy
j) Use a disclaimer such as this: "The postings on this site are my own and Don't necessarily
represent those of Synergy”.
k) Do link back to the source – When you Do make a reference to a customer, partner or supplier,
where possible link back to the source.
l) Do use your best judgment – Remember that there are always consequences to what you
publish. If you're about to publish something that makes you even the slightest bit
uncomfortable, review the suggestions above and think about why that is. If you're still unsure,
and it is related to Synergy business, feel free to discuss it with your manager or simply Do not
publish it. You have sole responsibility for what you post to your blog or publish in any form of
social media.
m) Do not use ethnic slurs, personal insults, obscenity, or engage in any conduct that would not be
acceptable in the Synergy workplace.
n) Do not conduct confidential business with a customer or partner business through your personal
or other social media.
o) Do not register accounts using the Synergy brand name or any other unregistered or registered
trademarks.
All employees should be notified of this Document upon creation or whenever modifications are
made.
These guidelines only cover a sample of all possible content publishing scenarios and are not a
substitute for good judgment.
Synergy employs technical controls to provide reminders, monitor, and enforce these guidelines.
The Synergy social media usage policy described above is monitored and enforced by a Secure Web
Gateway system. The Secure Web Gateway must secure all Synergy Internet connected, company-
owned employee computers including mobile laptop computers with direct Internet connections. The
Secure Web Gateway should include the following capabilities.
Context-Aware Confidential Data Detection – The ability to account for the context of
confidential data strings when identifying outbound data confidentiality violations. For example,
the solution should differentiate between an employee social security number posted alone (not a
violation), and a social security number posted in combination with an employee name (a
violation). Keyword dictionaries and regular expression matching capabilities Do not meet this
requirement.
Customer Document and Database Fingerprinting – The ability to identify customer
database records (e.g. customers records) and Documents (e.g. business plans).
Incident Response- Such cases will be considered as Information Security Incidents and
appropriate incident response plan will be activated.
4. Policy Enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related to
this policy should be reported to the ISM and acted upon based on this policy. All necessary records
(emails, etc) for demonstrating the compliance to the enforcement of this policy should be retained as
an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims at controlling the risks related to Teleworking.
2. Scope
This policy applies to all the employees or third parties having Teleworking privileges.
3. Policy
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to teleworking should be reported to the ISSC/ISM and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This policy aims to Synergy security policies designed to safeguard Synergy assets, as well as
information belonging to these Third Parties, from unauthorized or accidental modification, damage,
destruction, or disclosure.
2. Scope
This policy applies to all the Synergy employees, contractors and third parties who have been
provided access to Network and Information at Synergy.
3. Policy
(a) To maintain security of organizational information processing facilities and information assets
accessed by third parties.
(b) All third parties who are given access to Synergy’s information systems, whether suppliers,
customers or otherwise, must agree to follow Synergy’s information security policies.
(c) Synergy will assess the risk to its information, where deemed appropriate because of the
confidentiality, sensitivity or value of the information being disclosed or made accessible, Synergy
will require external suppliers of services to sign a confidentiality agreement / Non disclosure
agreement to protect its information assets.
(d) Persons responsible for agreeing maintenance and support contracts will ensure that the contracts
being signed are in accordance with the content and spirit of Synergy’s information security policies.
(e) All contracts with external suppliers for the supply of services to Synergy must be monitored and
reviewed to ensure that information security requirements are being satisfied.
(f) Contracts shall include appropriate provisions to ensure the continued security of information and
systems in the event that a contract is terminated or transferred to another supplier.
(g) Any facilities management, outsourcing or similar company with which Synergy may do business
must be able to demonstrate compliance with the Synergy’s information security policies and
enter into binding service level agreements that specify the performance to be delivered and the
remedies available in case of non-compliance.
4. Policy enforcement
Management reserves the right to monitor the compliance to this policy. All reported incidents related
to third parties should be reported to the ISSC and acted upon based on this policy. All necessary
records (emails, etc) for demonstrating the compliance to the enforcement of this policy should be
retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
To ensure and maintain the security of the organization’s information processing facilities from external
parties, who can access, process, communicate to or manage these facilities.
2. Scope
This policy applies to all purchases that relates to items that relevant to Synergy's core operation.
3. Policy
Risk based approach shall be followed to identify the potential risks to Synergy Information
Security as a result of Supplier or third party access to Synergy Assets.
These risks shall be appropriately controlled through effective controls that need to be
implemented to regulate and monitor the confidentiality, integrity and availability of the
information accessed by the supplier or third parties.
All supplier or third party access to Synergy Information Systems, LAN infrastructure shall be
formally authorized.
Outsourcing of information or data processing functions or services to Supplier or third party
organizations shall be formally authorized by the CISO.
During the Risks Identification, that are related to External Party access Synergy shallconsider:
Possible Impacts to the controls of the information processing facilities involved
The classification of the information assets.
Process for identifying, authorizing, authenticating and reviewing access rights of the
supplier or third parties.
Security Controls to be used by the supplier or third parties when storing, processing,
communicating, sharing or exchanging information.
Possible Impact to both parties resulting from assets being unavailable.
Prior to authorizing access to supplier or third parties to access information and information
assets, Information Owners and Information Custodians must confirm that:
The terms and conditions of access are documented (E.g. Service Level Agreement (SLA),
Contracts, and Memorandum of Understanding).
Responsibilities for managing and monitoring the supplier or third party access have been
assigned and documented.
Security Controls have been implemented and tested against identified risks.
All System accessed by supplier’s or third parties such as contractors, customers, consultants
or other external staff must be based on a formal contract and Non Disclosure Agreement
(NDA).
Access to Synergy Systems or other IT resources by suppliers or Third parties must be
restricted to the services and information they are explicitly authorized to access.
All suppliers or Third parties shall be provided with a Separate User Account for access and
this account shall expire on completion of the business requirement.
Supplier or Third party requesting internet access shall accept ownership of account allocated
and is responsible for all actions performed with the Account.
The Supplier or Third Party Account allocated shall be used only for the business purpose
defined and by the assigned individual.
The Supplier or Third Party account shall be disabled when not in use and password shall be
managed as per Synergy Password Management Policy.
All Supplier or Third Party users utilizing Synergy Internet connectivity shall read and
understand the Synergy Internet Policy.
If the Supplier or Third Party Personnel uses his/her Personal Laptop it must be checked to
be updated with the latest Anti Virus Software, OS Patches, Network and Security Baselines
of Synergy .
No supplier or third party shall be granted remote access unless prior approval and
authorization is granted from the CISO.
Supplier or Third Party Access to Synergy Information Systems shall be provided based on a
formal contract and Non Disclosure Agreement (NDA) between Synergy and the Third party.
As a minimum, contracts with supplier or third parties for provision of access to Synergy
information systems shall include (but not be limited to) Confidentiality clauses, Non-
disclosure clauses and Acceptable Usage along with complying to Synergy Access Control
and Acceptable Usage clause.
Contracts with supplier or third parties for provision of access to Synergy information systems shall
be consistent in all aspects with Synergy Information Security Policies, Procedures and Standards.
Outsourcing contracts shall address the following in any form : -
The level of physical and logical security that shall be provided to maintain the
confidentiality and integrity of Synergy information / data processed.
The service level to be provided and the level of availability in the event of a disaster.
Provision for confidentiality, non-disclosure and acceptable use relating to the
information /data processed by the outsourced function or service.
4. Elements of Risk
When using the services of various third-party or outsourcing entities, a certain element of risk arises
as responsibilities for critical initiatives are now in the hands of another organization. It’s important to
understand these risks, what are they, and how Synergy can readily identify any issues, concerns, or
constraints pertaining to these risks. Failure to mitigate and prevent these risks can result in
significant financial loss, legal issues and public opinion misconceptions, ultimately damaging the
organization.
These are risks arising from violation of applicable laws, rules, and regulatory mandates and along
with other issues, such as non-compliance of internal operational, business specific, and information
security policies, procedures and processes. Regulatory compliance is a large and critically important
component of vendor management, requiring constant monitoring and oversight of third parties for
ultimately ensuring the safety and security of services being provided to Synergy by such entities.
Common compliance initiatives for which third-parties are to including numerous laws, legislative
mandates, and industry specific requirement, including, but not limited to, the following: CE mark,
FDA clearance, SOC 2,PCI DSS, ISO and many other.
These are risk arising from negative public perception and opinion of a third-party outsourcing entity
for almost any imaginable reason, such as unethical business practices, data breaches resulting in
loss of sensitive and confidential information, investigation from regulator into questionable business
practices, etc.
These are risk arising from third-parties failing to implement business initiatives that align with the
overall goals and ideas of Synergy, such as not offering services that provides an acceptable return
on investment, both short term and long term. Ultimately, when the long term strategic vision of both
Synergy and the applicable third-party outsourcing entities do not align, relevant risk begin to surface
which can significantly impact the business relationship, often in a negative manner.
These are risks arising from a failed system of operational internal controls relating to individual and
the relevant policies, procedures, processes and practices. This becomes a large issue due to the fact
the many organization integrate their daily operational activities with outsourcing providers, thus a
“breakdown” on the vendor side seriously impact the organization, ultimately affecting productivity,
workflow efficiency and many other issues.
These are risks arising from a third-party failing to deliver as promised, such as product delivery,
operation efficiency or worse unauthorized transactions and theft of information due to a weak
system of operational and information security internal controls. An important component of
mitigating such risks is having comprehensive, well-documented operational and information security
policies, procedure, process and practices in place for guiding such third-parties on a daily basis.
These are risk arriving from the politic, economic and social landscape and other relevant events with
a foreign country that can impact the services being provided by the third party, ultimately affecting
operations for Synergy. Managing such risk can be extremely challenging and complex, especially
when one considers the diverse political landscape in various regions around the globe. Legal issues
also can pose significant country risks, as laws and regulations differ greatly from region to region.
These are risk arising from any number of information technology and information security issues,
such as inadequate I.T. resources (hardware and software) along with lack of manpower.
Additionally, risk can arise from abuse, misuse of information technology resources, while data
breaches and security compromises can occur because of improperly designed networks, little to no
information security policies, procedures, etc. Other serious information technology risk can include
not correctly provisioning and hardening critical system resources, failing to implement “defense in
depth” and layered security protocols, etc.
A formalized and written contracts has been produced, one that dutifully identifies roles,
responsibilities, obligations and expectations from all relevant parties.
The contract has been approved by Top management of Synergy. This also requires
addressing issues like risk, financial relationship and clear documentation.
Comprehensive and appropriate review undertaken by Top Management, with all issues,
constraints and concerns addressed as necessary.
Regulatory compliance audits and mandates, such as annual financial statements audits,
annual operational and security assessments (i.e. SOC 2, PCI DSS etc.).
Information security protection measures regarding the safety and security of sensitive and
confidential information.
Numerous other legal issues, including, but not limited to the following: resolution
measures, indemnification, continuation of service, default, intellectual property.
7. Labour standards:
Synergy is committed to developing an organizational culture which implements a policy of support
for internationally recognized human rights and labor standards. We support the principles contained
within the United Nations Declaration of Human Rights and the International Labor Organization’s
(ILO) Core Conventions on Labor Standards.
Vendors will not use child labor. The minimum age for employment will be the greater of (i) the
minimum age under local law, (ii) the minimum age pursuant to the Convention Concerning
Minimum Age to Employment adopted by the International Labor Organization or (iii) 15.
Workers below the age of 18 should not be involved in activities likely to jeopardize their health,
safety or morals or interfere with their compulsory education.
Vendors may be required to disclose any workers under the age of 18 and detail the specifics of
their job functions, including what, if any, support they may be providing to Synergy.
Vendors will not use any forced, compulsory or involuntary labor, whether bonded, indentured,
or imprisoned.
Employees shall be able to terminate their employment within reasonable notice.
7.3 Non-Discrimination
Vendors will not discriminate on the basis of race, religion, age, nationality, social or ethnic
origin, disability, sexual orientation, gender, gender identity, marital status, veteran status or
political affiliation, in its hiring or employment practices; such as, compensation and benefits,
access to training, promotion, termination and retirement.
8 Reference
List of vendors / Suppliers.
DOCUMENT SUMMARY
REVISION HISTORY
1. Purpose
The purpose of this procedure is to implement a system to control the documents and
avoid their inadvertent use in the IT department.
2. Scope
This procedure is applicable to all the documents related to the ISMS in the IT Department.
3. Responsibility
CISO is responsible for implementation of this procedure.
4. Authority
This procedure is authorized/ approved by the CISO. For any amendment in this procedure
CISO will authorize the same.
5. Definitions
ISM – Information Security Manager
ISMS-Information Security Management System
IT- Information Technology
ITIS - Information Technology Infrastructure
6. Input
ISO/ BS Standards requirement
Uncontrolled documents
7. Description
Authorizing/Approving Authority
The documents, controlled by this procedure, are mentioned below along with their
authorizing/ approving and issuing / controlling authorities:
Authorizing
Issuing / Control
No. Document / Approving
Authority
Authority
Documents of
5 CISO ISM
external origin
8. Manual
Synergy ISMS Manual documents (Policies, Procedures and other related Docs) is prepared
by sections/ function and authorized/ approved for issue by the CISO.
9. Guidelines
Guidelines related to ISMS are prepared by respective sections/ function and authorized/
approved for issue by the CISO.
All Guidelines are controlled by giving a document reference number ISMS_Gui_nnn (‘n’
carries a value 1,2..so on in sequential order).
ISM maintains master list of all Guidelines identifying their current revision status.
Read only copy is available on the Intranet. Guidelines softcopy can be downloaded as per
requirement.
10. Template
Templates are prepared by respective sections/ function and authorized/ approved for
issue by the CISO.
All Formats are controlled by giving a document reference number ISMS_Tem_nnn (‘n’
carries a value 1,2..so on in sequential order).
ISM maintains master list of all Templates identifying their current revision status.
11. Registers
Registers are prepared by respective sections/ function and authorized/ approved for issue
by the CISO.
All Registers are controlled by giving a document reference number ISMS_Reg_nnn (‘n’
carries a value 1,2..so on in sequential order).
ISM maintains master list of all Templates identifying their current revision status.
13. IT Assets
IT Assets are maintained by IT Purchase and each assets are identified by Asset Id.
All assets are controlled by giving a asset id SMPL-IT- <Assets type>nnnn (‘n’ carries a
value 1,2..so on in sequential order).
IT Purchase team maintains the Assets list.
Note: <Asset type>
Monitor MON
Desktop DES
Laptop LAP
Keyboard KEY
Mouse MOB
Server SER
Firewall FIR
Switches SWT
Video Conference VC
No. Document
1 Manual Document Ref. No, Revision No, Issue Date,
version no.
2 Guidelines Document Ref. No, Revision No, Issue Date,
version no.
3 Templates Document Ref. No, Revision No, Issue Date,
version no.
4 Registers Document Ref. No, Revision No, Issue Date,
version no.
5 Documents of Document Ref. No, Revision / Issue details
external origin
18. Output
Master Lists of documents
- End of Document -
DOCUMENT SUMMARY
REVISION HISTORY
2. Scope
This procedure is applicable to all records identified in the Master list as providing evidence of
conformity to the Information Security Management System.
3. Responsibility
CISO holds full responsibility for the control of records.
The ISSC and the functional heads are responsible for establishing and maintaining the records
identified for their respective functions.
4. Input
ISO/ BS Standards requirement
Uncontrolled records
5. Procedure
Examples of records to be established maintained and controlled
Visitors Books
Audit reports
System logs
Access Authorisation forms
Incident records
Change records
Records shall also be kept of the performance of the process outlined in clause 4.2 of
ISO 27001:2005
The planning and identification of records to be maintained at the various stages of operation is
identified by the respective functional heads along with ISSC in the form of a masterlist.
The masterlist details the method of controls for records as Identification, Storage, Protection,
Retrieval, Retention and Disposal.
Master list shall be maintained as follows
Remarks
Record Retention Expiry (Date of
Record Name Owner Category
Ref No. period Date disposal
etc)
7. Output
Master Lists of records
- End of Document -
DOCUMENT SUMMARY
OWNER CISO
NAME: MR. GAURAV SINGH
APPROVED BY DESIGNATION MANAGER -IT / CISO
REVISION HISTORY
2.1 1 23rd Dec 2019 Changes done in section 5 for errors and
omissions.
1. Purpose
The purpose of this document is to detail the procedure of taking Corrective and Preventive
Actions to improve the effectiveness of the Information Security Management System.
2. Scope
This procedure is applicable to all findings identified in the Internal and External audits.
3. Responsibility
CISO/ISM holds full responsibility for the maintenance and follow-up of Corrective actions.
The ISSC and the functional heads are responsible for establishing and maintaining the records
identified for their respective functions.
4. Input
Internal Audit report
Identify non-conformance.
Determine the extent or gravity of the non-conformance (There are cases wherein the observed
or detected non-conformance is just the “surface” of a much bigger or serious non-
conformance)
Issue Corrective Action Report to concerned person or auditee as per the following format
Enter the details of corrective action taken in the corrective action report.
Close the non-conformance in the corrective action report by making suitable remarks if the
corrective action plan is found to be done properly.
The Auditor shall make a follow-up with auditee to check the implementation of corrective
action plan as stated on the corrective action report.
The CISO shall independently review the corrective action plan and ensure that the records are
safely stored.
The CISO/ISM shall review the corrective action report to ensure that any requirement for corrective
actions from any past incidents are addressed .The repeating non conformities to be taken into
account at the time of the Risk Assessment. The priority of the corrective action shall be determined
based on the results of the risk assessment.
7. Output
Corrective Action report.
- End of Document -
DOCUMENT SUMMARY
REVISION HISTORY
1.0 Purpose
● To ensure that Synergy continually operates in accordance with the specified policies,
procedures and external requirements in meeting company goals and objectives in
relation to information security.
● To ensure that improvements to the ISMS are identified and implemented.
2.0 Scope
This procedure includes planning, execution, reporting and follow–up of an internal ISMS audit
and applies to all departments that form part of Synergy information security management
system. Legal and regulatory requirements shall be compulsorily audited in all audits and the
other domains in rotation.
3.0 Responsibility
Auditor
● Prepares an Audit Plan/Notification as basis for planning the audit and for disseminating
information about the audit.
● Chairs/conducts the internal audit activities.
● Co-ordinates the audit schedule with concerned department/process heads.
● Plans the audit, prepares the working documents and briefs the audit team.
● Consolidates all audit findings and observations and prepares internal audit report.
● Reports critical non-conformities to the auditee immediately.
● Report to the auditee the audit results clearly and without delay.
Auditees
● Receive the audit report and determine, initiate and follow-up the corrective action.
4.0 Input
5.0 Procedure
● An audit plan shall be created that contains all scheduled and potential audits for the
whole calendar year.
● Internal audit shall be scheduled once in six months or on a need-to-do basis i.e.
on-demand.
● Personnel who are independent of the area under audit shall perform the internal
audit.
● The Auditor shall be a person qualified as an ISO 27001 Internal Auditor/ Lead
Auditor.
● The audit shall be done against the requirements specified by the ISO 27001:2013
standard.
The Auditor shall review all of their findings whether they are to be reported as non-
conformance or as improvement potential. Audit finding shall likely be supported by objective
evidence.
The Lead Auditor shall consolidate all the audit findings for the preparation of the audit report.
Evaluation Scheme shall be:
Noteworthy Efforts Substantial improvement due to effective implementation of controls
Nonconformities Failure to fulfill one or more requirements of the management system
(NC): standard or a situation that raises significant doubt about the ability of
the management system to achieve its intended objectives.
Opportunity For Aspects that would lead to management system optimization with
Improvement (OFI): respect to a requirement of the standard. Implementation by the
organization is recommended.
The CISO shall meet the auditors and take overall responsibility for assigning ownership and
follow-up activities of audit findings with the auditees.
Subsequently, the auditees shall propose the corrections for the audit findings stating their root
cause along with expected date of closure of the proposed corrective action. This shall be
indicated in the Corrective Action Register (CAR).
Thereafter, the proposed action shall be accepted by the auditor. In case of non-acceptance,
the auditee shall revise the action plan according to the acceptance criteria specified by the
auditor depending on the situation and the audit finding.
Upon closure of the action(s), the auditee shall indicate the closure of each action by signing-
off against the corresponding actions listed in the corrective and preventive action register
(CAPA Register).
Finally it is the responsibility of the auditor to verify all the line items in the CAPA register and
indicate its successful closure by signing-off the audit report.
Note: Follow-up action will not be considered complete until all corrective actions or measures
have been implemented and the status has been reported to the Lead Auditor for final
verification purposes.
8.0 References
● Audit Plan
● Audit Schedule
● NC Report
- End of Document -
DOCUMENT SUMMARY
REVISION HISTORY
1. Purpose
The objective of this procedure is to evaluate the effectiveness and continual suitability of the ISMS.
2. Scope
This procedure is applicable for Management Review Meetings held in respect of ISMS at Synergy.
3. Responsibility
CISO/ ISM are responsible to organise and conduct the Management Review Meetings once in
every 6 months. The members of the Information Security Steering Committee are responsible to
participate in the meetings.
4. Abbreviations
CISO - Chief Information Security Officer
5. Procedure
CHANGES IN EXTERNAL AND INTERNAL ISSUES THAT ARE RELEVANT TO THE INFORMATION SECURITY
MANAGEMENT SYSTEM
2. CISO/ ISM shall decide on the date, time venue and agenda for each MRM.
3. MRM shall be chaired by the CISO. In the absence of CISO, ISM is authorized to chair the
meeting.
5. CISO/ ISM shall prepare the Agenda for the MRM in advance (Based on standard Management
review inputs and outputs) and circulate the Notice of MRM to all the members attending the
MRM.
6. Concerned personnel shall collect the required data and prepare the required presentations and
other materials required for the meeting.
7. ISSC shall conduct the MRM and discuss on achievements, constraints and need for
improvements.
8. Decisions made at Management Review Meetings shall include any decisions and actions related
to:
b. Resource needs
9. ISSC shall after discussion, arrive at decisions and action plans and target dates and record it
in the Minutes of MRM.
10. ISM shall record the Minutes of MRM and decisions of the meeting and circulate to all concerned.
11. Concerned owners shall deploy the decisions and action plans arrived at in the MRM.
12. Concerned owners shall report to the ISM on the status of deployment of the action points
through emails.
13. ISM shall be responsible for taking follow-up actions. He shall be responsible for monitoring
timely completion of the identified action plans.
14. ISM shall consolidate for the next MRM and he shall be responsible for maintaining the records
of MRM.
MRM Agenda
Minutes of MRM
DOCUMENT SUMMARY:
AUTHOR Kannan
REVIEWED BY Gaurav Singh
REVISION HISTORY:
Table of Contents
1.0 Introduction
This procedure lays down the treatment intent towards identification and enumeration of risks
to the assets of Synergy Maritime. (Here on referred as Synergy), and the framework to work
out treatment of the risks identified by appropriate methods. This procedure shall strive to
document the Risk assessment components and the risk assessment methods & techniques
adopted by Synergy to conduct a Risk Analysis on Assets within the scope defined above.
Subsequently this procedure shall lay down the Risk Treatment framework that has to be
adopted following the risk assessment phase.
This procedure is divided into two parts. Part 1 shall cover the Risk Assessment and part 2 shall
cover the Risk treatment.
Risk assessment is used to identify the risks, information-processing facilities (or individual
system components) are facing. A risk assessment involves consideration to the following:
The business harm likely to result from a significant breach of information security,
based on the consequences resulting from a loss or failure of Confidentiality, Integrity
and Availability.
A realistic probability of occurrence of such a breach in the light of the prevailing
threats, vulnerabilities and existing security controls
The following three main conditions of information security requirements are considered for
doing the risk assessment:
Unique security risks which could result in significant losses if they occur;
Legal, statutory and contractual requirements that the organization, its trading
partners, contactors and service providers have to comply;
Organization wide principles, objectives and requirements to support its business
operations.
The risk assessment process at Synergy shall include the following components:
Assets: All the key assets* as identified in the asset enumeration and classification
guideline shall serve as an input to the risk assessment exercise at Synergy.
* The asset value less or equal to 5 would not be consider for Risk
Assessment, as the impact to the business due to these assets would be
acceptable.
Threats
Vulnerabilitiesrg
Probability of Occurrence
Consequence
2.3 Assets
An asset is a component or part of a total system to which the Synergy directly assigns a value
and therefore, requires protection. Assets encompass all of those items that contribute to the
provision of information that an organization requires to conduct its business.
Asset value is used to determine the importance of the information associated with the asset
to the business and to identify appropriate protection for the asset. These values can be
expressed in terms of the consequences to the business in case of any undesirable events
leading to the loss of confidentiality, integrity and availability.
Three levels of criticality rating are selected for confidentiality, integrity and availability of an
asset and accompanied with numbers to denote the level of criticality of the asset. The
criticality rating of assets is to be entered in respective columns in the Asset register. The
criterion for criticality rating is given at Table 1 & Table -2.
The Net asset value of the asset is derived using the following formula: Calculate the sum of
the values of confidentiality, integrity and availability. The formula used has been given below.
Net Asset Value = SUM C+I+A
C = Asset value based on confidentiality
I = Asset value based on Integrity
A= Asset value based on Availability
Document Ref. No. ISMS_Man_041 Version No.1.1
Revision No: 1 Page 6 of 18
RESTRICTED Risk Assessment Methodology
Example:
If C=2, I=3, A=3 Then Net asset value = SUM 2+3+3 = 8
Assets are sub-grouped for each category in the following manner for completing basic risk
assessment (List shown below is illustrative and not exhaustive):
Information Assets:
Backup Head - IT
Database Team leaders
Manual Windows/Solaris system/ ERP Administrators
Requests Helpdesk Coordinators
Access Registers/Database Network
Agreement Administrators
Maintenance personnel
AMC document
Admin & HR
2.6 Threats
A threat is the potential cause of an unwanted event that may cause harm to the organization.
This can take many forms. Threats can be acts of nature (such as flood, fire, earthquake),
intentional or accidental acts. In general, it could result in:
Destruction of an asset (facilities, data, equipment, communications, personnel)
Corruption or modification of an asset (data, applications)
Theft, removal or loss of an asset (equipment, data, applications)
Disclosure of an asset (data)
Interruption of services
A threat would need to exploit the vulnerability of the asset in order to successfully cause
harm. Threats should be identified with respect to the intimidations faced by Synergy.
2.7 Vulnerabilities
A security risk is the potential that a given threat will exploit vulnerabilities to cause loss or
damage to an asset or group of assets, and directly or indirectly affect the organization. The
security risk level is determined from the combination of the asset values and assessed levels
of related threats and associated vulnerabilities. The following points were considered for
arriving at the risk values:
Risk = Net Asset Value * Probability * Consequence
Table – 4
Table – 5
Risk treatment is the process which helps Synergy to make decisions about what risks can be
taken, avoided or which risks need to be mitigated and how much to spend in the process.
Based on the risk ranking Security Forum would decide whether to accept the risk or to treat
the risk.
The level of risk is so low that specific treatment is not appropriate within available
resources.
No treatment is available for the risk; for example, the risk is not within the control of
the organization.
The cost of the treatment of the risk including insurance costs, (particularly for lower
ranked risks), outweighs the benefit.
Synergy should manage risks and safeguard their operations in order to effectively protect
information. Part of the process of judging whether the security of information is appropriate
is, by acknowledging that risks cannot be avoided completely and there will always be some
residual risk.
Information Security Forum would need to treat the risks, which have been identified as
unacceptable in order that those risks become acceptable. Constraints that may influence how
to manage a risk include:
Budget/financial: There will often-financial constraints on the amount of security that can
be implemented.
Environment: environmental factors may influence the selection of safeguards, such as space
availability, climate conditions, surrounding natural and urban geography.
Technology: Some measures are technically not feasible due to the incompatibility with the
hardware and software used by the business.
Time: Not all requirements can be implemented immediately. Some may need to wait for the
budgetary relaxation; others for a suitable opportunity to arise in a wider improvement plan
e.g. A building upgrade, which permits more secure cable runs to be completed at a lower cost
than if that were to be the only task to be completed.
Not Applicable: Not applicable e.g. the organization may not see itself as large enough in the
terms of control requirement, 6.1.2 which needs a cross-functional forum for co- coordinating
security measures or, in the case of control requirement 12.3.2 it may not be processing highly
sensitive data and therefore see no absolute need to encrypt it.
Other: There may be other reasons for non-implementation other than those listed above.
Personnel: Required manpower is not available, but would be taken care in the future times
to come.
Impact reduction, i.e., to reduce the impact from a security breach to an acceptable
level
Detection of unwarranted event,
Recovery from unwanted event
If required additional controls can be selected from other standards. The control would be
selected based on the degree of assurance that it is providing for treating the risk and the
residual risk after implementation of that control. Security Forum should approve the selected
control and should be updated in the “Applicable ISO 27001 controls” Columns. From the
approved controls a detailed risk treatment plan should be prepared and updated in the Risk
treatment plan.
The selected controls and additional controls selected should be updated in Statement of
Applicability with reason for selecting and take approval from the Security Forum. Based on the
approval given by the Security Forum, Risk owners would initiate the processes for acquiring
the required systems, developing/modifying policies, procedures and practices etc… for treating
the risk.
Security Forum shall decide whether discontinuing the exposed activity or discontinuing the use
of exposed asset to avoid the risk identified.
Security Forum shall decide whether the risk identified can be transferred to achieve a degree
of assurance. It might mean taking insurance on the asset, or outsourcing business processes.
Care should be taken that all security requirements, control objectives and controls are
described in the associated contracts to ensure the sufficient security is inbuilt.
Residual risk is the remaining risk after the risk treatment measures have been taken. For each
risk the residual risk should be arrived as given in the following table:
On a scale of 1 – 144 the acceptable residual risk score is 1 – 36. If the residual risk score is
more than 36, further controls should be implemented. If the residual risk is medium/ high, the
residual risk can be accepted only if it is approved by the Top management. A formal approval
should be taken for accepting the residual risk.
In addition to control objectives and controls from ISO 27001, the Statement of Applicability
additionally lists any additional controls required by reasons of legislative, regulatory, corporate
or contractual requirements.
This Risk assessment methodology is applicable for all the business units and supporting
functions mentioned in the Scope document.
7.0 Responsibilities
Information Security Forum would take the responsibility of completing the risk
assessment and recommend the required controls.
Information Security Forum after going through the recommendations and approving
them would provide the necessary budget approvals and other requirements for
implementing the controls.
Risk owners would implement the required controls for mitigating the risks in co-
ordination with security team members.
8.0 References
Synergy Asset Register
Synergy Risk Assessment Sheet
Risk Treatment Plan
CRM Manual
10.0 Glossary
Consequence
Cost
Of activities, direct and indirect, involving any negative impact, including money, time, labour,
disruption, goodwill, and political and intangible losses.
Event
An incident or situation, which occurs in a particular place during a particular interval of time
Frequency
Information Integrity
The property that information has not been altered or destroyed in an unauthorized manner
Loss
Monitor
To check, supervise, observe critically, or record the progress of an activity, action or system
on a regular basis in order to identify change.
Organization
A company, firm, enterprise or association, or other legal entity or part thereof, whether
incorporated or not, public or private, that has its own function(s) and administration.
Probability
The likelihood of a specific event or outcome, measured in the ratio of specific events or
outcomes to the total number of possible events or outcomes.
Residual risk
The remaining risks after risk treatment measures have been taken.
Risk
The chance of something happening that will have an impact upon objectives. It is measured
in terms of Impacts and likelihood.
Risk acceptance
An informed decision to accept the Impacts and the likelihood of a particular risk
Risk analysis
A systematic use of available information to determine how often specified events may occur
and the magnitude of their Impacts.
Risk assessment
Risk avoidance
Risk control
That part of risk management, which involves the implementation of policies, standards,
procedures and physical changes to eliminate or minimize adverse risks.
Risk evaluation
The process used to determine risk management priorities by comparing the level of risk against
predetermined standards, target risk levels or other criteria.
Risk identification
Risk management
The culture, processes and structures that are directed towards the effective management of
potential opportunities and adverse effects
The systematic application of management policies, procedures and practices to the tasks of
establishing the context, identifying, analysing, evaluating, treating, monitoring and
communicating risk.
Risk mitigation
Risk retention
Intentionally or unintentionally retaining the responsibility for loss, or financial burden of loss
within the organization
Risk transfer
Shifting of responsibility or burden for loss to another party through legislation, contract,
insurance or other means. Risk transfer can also refer to shifting a physical risk or part thereof
elsewhere.
Risk treatment
Security control
Stakeholders
Those people and organizations who may affect, be affected by, or perceive themselves to be
affected by, a decision or activity.
Vulnerability
A characteristic (including a weakness) of an information asset or group of information assets
that can be exploited by a risk
DOCUMENT SUMMARY:
DATE OF ORIGINAL
25TH,FEB,2015
VERSION
REVISION HISTORY:
Table of Contents
1.0 INTRODUCTION ......................................................................................................................... 4
2.0 PURPOSE ....................................................................................................................................... 4
3.0 POLICY STATEMENT .................................................................................................................. 5
4.0 SCOPE............................................................................................................................................. 5
5.0 BUSINESS CONTINUITY OVERVIEW .................................................................................. 6
5.1 Objective .................................................................................................................................................. 6
5.2 Business Continuity Planning Framework ................................................................................... 6
5.3 Organization ........................................................................................................................................... 6
5.3.1 BCP team and responsibilities.............................................................................................................. 8
5.4 Business Continuity Phases............................................................................................................... 9
5.4.1 Response Phase .................................................................................................................................... 9
5.4.2 Resumption and Recovery Phase ........................................................................................................ 9
5.4.3 Restoration Phase ............................................................................................................................... 10
5.5 Assumptions ......................................................................................................................................... 10
6.0 BUSINESS CONTINUITY PLAN ........................................................................................... 10
6.1 Site outage ............................................................................................................................................ 10
6.2 Critical information assets ............................................................................................................... 11
6.3 Testing of plans ................................................................................................................................... 11
6.4 BCP Notification .................................................................................................................................. 11
6.4.1 Contact list of emergency services .................................................................................................... 11
6.4.2 Vendors and Consultants.................................................................................................................... 11
6.4.3 Employee contact information ........................................................................................................... 11
6.5 Backups .................................................................................................................................................. 11
6.5.1 Data ...................................................................................................................................................... 11
6.5.2 Vital Records/Documentation ............................................................................................................ 12
6.6 Maintenance of backups and documentation offsite ............................................................. 12
6.7 Office Equipment, Furniture and Supplies ................................................................................. 13
7.0 DISSEMINATION OF PUBLIC INFORMATION ............................................................... 13
8.0 PROVISION OF SUPPORT SERVICES TO AID RECOVERY ...........................................13
9.0 EMERGENCY RESPONSE – WORK FLOWS ...................................................................... 14
9.1 Emergency Response- Fire Incident.................................................................................................. 14
9.2 Emergency Response- Bomb Threat ................................................................................................. 15
9.3 Emergency Response- Civil Disturbance .......................................................................................... 16
9.4 Emergency Response- Water Related .............................................................................................. 17
9.5 Emergency Response- Power Outage ............................................................................................... 18
9.6 Emergency Response- Severe Wind ................................................................................................. 19
9.7 Emergency Response- Medical Incident ........................................................................................... 20
9.8 Emergency Response- Terrorism ...................................................................................................... 21
9.9 Emergency Response- Building Access ............................................................................ 22
9.10 Emergency Response- Earthquake ................................................................................................... 23
10.0 ANNEXURES .............................................................................................................................. 24
10.1 Annexure A –BCP procedure for Critical Information Assets .............................................. 24
10.2 Annexure B - Disaster Recovery Test Schedule ......................................................................... 24
10.3 Annexure C – BCP Team Contact list ............................................................................................ 24
10.4 Annexure D - Contact list of Emergency Services ................................................................... 24
10.5 Annexure E-Vendors and consultants ......................................................................................... 25
10.6 Annexure F-Employee contact information ............................................................................... 25
10.7 Annexure G- Emergency Evacuation Procedure ....................................................................... 25
10.8 Annexure H- Insurance details ...................................................................................................... 25
1. Introduction
This document lays down the processes for Business continuity and Disaster recovery plan to be followed at
Synergy Maritime Private Limited, (hereinafter referred to as “Synergy”)
Synergy recognizes the criticality of business continuity. This document details the Business Continuity Plan
for the activities covering at Synergy, which requires to protect its employees and to prevent the interruption
of vital business operations. The company shall employ all appropriate strategies for anticipating and
controlling crisis situations.
This document takes into consideration some of the immediate future requirements based on the business
vision envisaged by the management of Synergy, like Backup site.
Management is responsible for establishing an emergency response plan and providing contingency plans for
response to threats that could harm their personnel, property, and reputation.
All Synergy employees are expected to comply with established practices and procedures of this plan, which
are designed to minimize risk to themselves and others as well as threats to personnel, technical resources,
and other property, or to the security of the facility.
Synergy Business Continuity Plan and documentation provides base emergency response, resumption and
recovery planning efforts, it is not intended as a substitute for informed decision-making. Business process
managers/Owners must identify services for which disruption will result in significant financial and/or
operational losses. Plans include detailed responsibilities and specific tasks for emergency response activities
and business resumption operations based upon pre-defined time frames.
Copies of this document and other documents referenced in this plan shall be stored off-site and readily
available for reference in the event of an emergency situation that restricts or prohibits access to the normal
workplace.
A Business Continuity Plan is not a one-time commitment; instead, it is an on-going activity, which includes:
2. Purpose
Synergy is committed to provide continuity of business processes despite interruptions to the normal
operating environment. The purpose of the Business continuity and Disaster recovery plan is to address
the communication, escalation and actions necessary to continue business processes in the event of a
disaster or an incident.
The plan would provide Synergy with practical approach and process to prevent and contain potential
business disruptions in the event of any disaster, with a view to quickly resume services to customers with
acceptable service levels.
The primary focus of this Business Continuity Plan is continuing operations after a business interruption
irrespective of the nature of the interruption.
3. Policy Statement
The aim of this policy is to detail a comprehensive framework for Business Continuity Planning (BCP) so that
in the event of an emergency, Synergy can continue to provide the best possible service for the clients.
The policy includes all management activities and is complemented by a plan which can be used in the event
of a disruption, or threatened disruption.
4. Scope
Business Continuity Plan is designed to create a state of readiness that will provide an immediate response
to any of the following incident scenarios:
Any incident causing physical damage such as fire, smoke, water damage.
Any incident which indirectly affects facility access such as storm, emergency building evacuation due
to bomb threat, or external threat such as fire to any of the floors of Synergy building.
Any environmental incident such as poor ventilation, heating or cooling problems that would
jeopardize operations.
Computing resources/LAN
Human resources
5.1 Objective
Provide a practical approach and processes to prevent and contain potential business disruptions.
Develop and document plans to undertake actions, for direction and control during response and
recovery from disasters.
Resume business operations within acceptable time lines and acceptable service levels and to
minimize business losses.
The Business continuity plan also includes the following additional objectives
Define the process for testing and maintaining this plan and training for contingency teams.
A single framework of business continuity plans shall be maintained to ensure that all plans are
consistent, and to identify priorities for testing and maintenance. Each plan clearly identifies conditions
for its activation and also the individuals responsible for executing each component of the plan. The
framework shall comprise of conditions for activation, emergency procedures, fallback procedures,
resumption procedures, maintenance schedule, awareness and education activities and responsibilities of
individuals.
When new requirements are identified, the established emergency procedures shall be amended as
appropriate.
5.3 Organization
To protect employees and information assets until normal business operations are resumed.
To ensure that a viable capability exists to respond to an incident.
To manage all response, resumption, recovery, and restoration activities.
To support and communicate with employees, system administrators, vendors, security personnel,
and managers.
SYSTEMS
SUPPORT
ADMIN
TEAM
TEAM
BCP
COORDINATOR
FINANCE
OPERATIONS TEAM
TEAM
The BCP team consists of BCP coordinator and one or more members from Operations, system support,
administration, finance and offsite. Each team will have a roster and task list of actions and
responsibilities, as outlined below.
BCP coordinator
Monitor and coordinate Business continuity Plan, training, awareness, exercises and testing.
Coordinate strategy development with other teams.
Work closely with other team leaders.
In-charge to declare about the disaster and invoking a BCP.
Informs the team/ Team leaders about the initiation of the BCP.
Informs the management about the BCP initiation.
Get budgetary approvals from the management for requirements on BCP.
Prepares reports and submit them to management.
Implement identified improvements from test/actual data.
Initiates measures to bring to normalcy.
Declare the normalcy after BCP.
Operations Team
Coordinate with systems support team to establish the operations at backup site.
Define the requirements and submit for approval from ISSC, through the BCP coordinator.
Coordinate with systems support and admin team for establishing the requirements at offsite.
Inform other teams about the requirements in both logistics and technical.
Work in conjunction with other teams involved in BCP testing.
Coordinate with client in the event of BCP initiation.
Once normalcy is declared, establish the normal operations at original site with all the data.
Admin Team
Finance Team
The Business Continuity Plan Coordinator, in conjunction with other teams will determine which
Teams/Team members are responsible for each function during each phase. As tasking is assigned,
additional responsibilities, teams, and task lists need to be created to address specific functions during a
specific phase.
To mobilize and activate the support teams necessary to facilitate and support the resumption
process.
To notify and appraise time-sensitive business operation resumption team leaders of the
situation.
To prepare and implement procedures necessary to facilitate and support the recovery of time-
sensitive business operations.
To alert and coordinate with employees, vendors and other internal and external individuals and
organizations.
To prepare procedures necessary to facilitate the relocation and migration of business operations
to the new or repaired facility.
Implement procedures necessary to mobilize operations, support and technology group’s
relocation or migration.
Manage the relocation/migration effort as well as perform employee, vendor, and customer
notification before, during, and after relocation or migration.
5.5 Assumptions
The plan is based on the availability of the contingencies or the backup resources. The accessibility of
these, or equivalent backup resources, is a critical requirement.
Scenario: Business functions affected because of non-availability of site or site is unreachable due to
some or the other reason.
Plan:
For Chennai office, other office shall be treated as the alternate site and Vice Versa. The addresses are
given below
In this scenario BCP Coordinator will be issuing further instructions as per the BCP discussions with the
management.
Scenario: Business functions affected due to failure of any one of the critical devices such as servers,
router, firewall, leased line, switches etc.
Test plans shall be developed for various scenarios and testing shall be conducted according to the
schedule maintained as per Annexure B.
The functional managers for the locations where the critical components of Synergy systems are located
should be provided with the telephone numbers of Synergy BCP team members - Annexure C. Upon
notification, the team will meet for the purpose of conducting initial incident assessment and issuing
advisory reports of status to Synergy and management. If the functional managers, other security team
members or BCP Coordinator has determined that the building cannot be entered, the alternate meeting
place will be at Offsite office.
The contact list of all vendors and consultants shall be compiled and maintained as per Annexure E
so as to expedite the recovery process.
The contact information of employees shall be maintained as per Annexure F. In the event of a disaster,
a lack of specific personal data, including home addresses, cell phone numbers, and alternate contact
information, could result in the inability to locate and contact key personnel and team members. This
personnel database should be maintained and updated continuously. This database may be maintained
by the BCP co-coordinator who will take care that the information contained therein remains current and
accessible and is available as part of the Business continuity plan.
6.5 Backups
6.5.1 Data
The important asset in Synergy is its data and information. Data and information processing are a major
reason for the existence of projects. Moreover, all of the systems are dependent on the preservation of
data, including project manuals and procedural documentation. In order to minimize the impact of a
disaster, it is extremely important to protect data and information.
Effective procedures to perform full data backups on a regular basis must be implemented.
In case of a disaster, an alternate site shall be prepared, by the systems support team with the help of
other BCP teams.
Vital records and important documentation shall be backed up and stored off site. Vital records are any
documents or documentation that is essential to the operations of an organization, such as personnel
records, software documentation, legal documentation, legislative documentation, benefits
documentation, etc.
A copy of the backups shall be stored off site in an environmentally controlled storage facility. A back up
copy must be stored off site and should include documents such as security plans, Business Continuity
plans, risk analysis, and security policies and procedures. Additional copies may be necessary for some
documentation, such as Business Continuity plans, which should be easily accessible in the event of a
disaster.
For Chennai office the backup tapes will be sent to offsite storage location.
It is recommended that copies of the Business Continuity Plan be distributed to Synergy Management,
Business Continuity Plan Coordinator, and Team Leaders for safekeeping.
Documentation should be duplicated either in hard copy or compatible media format and stored at the
off-site storage or the (recovery site) location. The original primary on-site unit retains the original copies
of all information. Updates to documentation should be done as-required basis, under the control of the
responsible team. Off-site documentation should include technical and operational documentation.
The following are examples of documentation that are maintained off site:
Security related Information security policy & procedure memorandum, circulars, publications.
Policy statement.
Letters of delegation for key Information System security personnel.
Complete hardware and software listings.
Internal security & Information System audit reports.
Detailed IT architecture schematics (logical/physical, network, devices).
Network cable routing schematics (on floor overlay).
System testing plans/procedures.
Review and approval of plans/procedures.
System Configurations.
Review and approval of proposed configuration.
Changes made to the system configuration.
Evaluation of changes for security implications.
Technical standards.
Business Continuity plans for incident response procedures and backup operations.
Data backup/restoration procedures and procedures for storage, transportation and handling
of backup tapes.
Reports of security related incidents.
Sensitivity and criticality determination.
Baseline security checklist for each system.
Software licensing information.
Detailed procedural manuals specifying how their functional responsibilities are to be discharged in the
event of their unavailability are to be developed. This is especially important for key personnel. Copies
of these manuals should be kept off-site with other documentation.
Synergy management shall review the supply needs and coordinate with the admin department to
develop a revolving emergency inventory of workspace and survival supplies for immediate use in the
event of a disaster. The revolving inventory of workspace supplies should include not only basic essential
workspace supplies like pens, pencils, note pads, and paper, but also Synergy specific forms and
templates.
The MD, Synergy is responsible for directing all meetings and discussions with the news media, the public
and Synergy personnel not actively participating in the recovery operation. In the absence of the MD,
Synergy, the responsibility reverts to the senior most official present at the scene.
During and following a disaster, Synergy Support Teams (All other Employees of Synergy other than those
forming part of BCP team) and other third party service providers of Synergy are responsible for aiding the
BCP Team. They operate under the direction of the Business Continuity Team through the Business
Continuity Plan Coordinator and the Chief Information Security Officer.
Fire
NO Evacuees report
Employees Manually Auto Alarm
Activate Evacuation Activate Evacuation to Gathering
Activate Alarms activated
Point / Safe Area
ERT Lead
confirms fire ERT Leader
Incident Informs contacts Fire
BCMT Department
ERT Lead
ERT contacts Fire
informs
Department
BCMT
Fire Department
becomes Incident
Commander
Fire Department
gives All-Clear
signal
BCMT directs
future actions
Receives
a threat
Verbal Written
Type of
information and
Threat ERT
informERT
Inform
Contact 100
Inform BCMT
BCMT Response
Team Lead
Bomb Squad
Arrives
Activate Alarm
BCMT briefs
Bomb Squad Activate
Bomb Squad
Leader becomes
Incident
Commander Roll call taken by
team leads
Bomb Squad
gives All-Clear
signal
BCMT is
briefed
BCMT directs
future actions
Civil
Disturbance
Observed
Medical
Incident
Employee
notices the
injured Injured is
alive
No
Yes
Employee informs
ERT
Employee informs
ERT
Police seals
First-Aid
area for
trained people
investigation
update BCMT
Terrorist Event
BCMT assess
situation and Building Security
works with Police
procedures personnel to cordon
10. Annexures
These tests are to be conducted with prior scheduled outage notification to Operations.
During the test schedule, services as given in the table will remain down, as the failure condition
will be simulated. Technology and Operations should test the services and note the test results,
experiences and suggestions.
Every Service, which is expected to have an impact on the test condition, needs to be tested
individually. Test conditions should be tabulated.
Required configuration and data backup to be taken before simulating the problem condition.
DOCUMENT SUMMARY:
AUTHOR KANNAN
OWNER CISO
REVISION HISTORY:
To Improve Skills,
Process As and when ISMS Training Needs
HR awareness and Mail
Owners required and Requirements
achieve new Skills
To provide access
New Recruitment to the IT N/W or To
User details for Login
done / During safeguard Mail / Exit Form
HR IT Access / Deletion of
employee Information from etc
user id.
resignation Ex- Employee's
Access
To safeguard
information and to Mail / Notice
Information security
All As and when provide awareness Boards /
IT breach preventive
Department required based on Awareness
measures
Information training
security Updates
To enable process
Information security
Process As and When owners to take
CISO status of relevant Mail
Owners required appropriate
department
measures
To provide
Information security Mail / Verbal (In-
As and When awareness to the
Employees ISSC breaches / Non person) / Incident
required ISSC team and
conforming activity Report
initiate actions
External Communication
Purchase order
External As and when To address
List of items / and Mail
IT- Purchase Providers / requirements raised resource
Materials / devices correspondence /
/ Purchase Supplier / from relevant requirement of
to be purchased Verbal (Phone
Vendors departments Synergy
calls) / SLA
External To provide
While dispatching
Providers / IT- Purchase / relevant
the required items / Billed Item details Invoice / Bills /SLA
Supplier / Purchase acknowledgement
Materials / devices
Vendors to Synergy
ocument Circulation CEO, HEAD-IT, HEAD ADMIN & HR TEAM, All department Heads
wner CISO
vision History
SOFTWARE ASSETS
re, Business Applications, Network Management
Office automation software, Synergy -
IT Dept. IT Dept. IT Team 3 3 3 9 Restricted
ng System S/W Chennai
INFORMATION ASSETS
SERVICES
ations, Outsourced Services, Outsourced Telephone
Synergy -
rity Services, IT Services IT Dept. IT Dept. All End users 3 3 3 9 Restricted
Chennai
PERSONNELS
aders, Windows/Solaris system/ ERP Administrators,
ators, Network Administrators Respective Respective Synergy -
Synergy 3 3 3 9 Restricted
sonnel, Admin & HR, Physical Security dept. Heads Dept. Chennai
drive post to his/her travel.
tic Backup Methodology Along with the existing controls, Backup software Last reviewed
1
e. Stored in 2 different A 12.3.1 2 3 54 Medium Vessel Master and retentions of data shall be configured, regular Mitigated 30.09.2019 2 18 Low
rs, removable Hard disk drills shall be conducted in vessels.
s Server in Vessel. Anti Approved USB storage devices allowed for the data
ent installed in each transactions with in ship, Also Cyber reposponse
tion. Scanning of Medium Vessel Master plan , Cyber respponse team details and esclations Mitigated Last reviewed 2 18 Low
A 12.2.1 2 3 54 1
le drives mandatory. details are shared with the vessel captain. Incident 30.09.2019
ss Training provided to is recorded and reported to CISO as per the
end users. incident management policy.
n disabled in machines,
checking for removable Along with the existing controls, Synergy IT team
devices. Users day-day review these control periodically and updates are Last reviewed 1
A 12.6.2 1 4 36 Low IT Head / CISO Mitigated
30.09.2019
2 18 Low
are carried out via local done in the vessel work stations as and when
login, admin rights not required.
vided to end user.
OBJECTIVES PLANNING
DOCUMENT SUMMARY:
Revision History
PURPOSE
The key objective to ensure the success of Synergy Maritime Private Limited business lies in protecting the business
information of the organization and its customers. To fulfill this strategic business objective, Synergy Maritime
Private Limited has established an Information Security Management System.
POLICY STATEMENT
The Directors, Senior Management and all other employees at Synergy Maritime Private Limited are committed to
protect the confidentiality and integrity of all the information assets, ensure availability in accordance to business
objectives and conduct business in compliance with all statutory and regulatory requirements.
ISMS OBJECTIVES
The Objective of ISMS at Synergy Maritime Private Limited is to ensure that:
The management at Synergy Maritime Private Limited ensures that this policy is communicated, understood,
implemented and maintained at all levels of the organization. The policy shall be monitored for compliance and will
be amended, if necessary.
This policy has been approved by the Board of Directors at Synergy Maritime Private Limited.
CISO / HEAD
ISMS OBJECTIVES
REVIEW UOM (Unit
S.No ISMS Objectives TARGET RESPONSIBILITY
FREQUENCY of Measure)
CISO / HEAD
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
The objective of this procedure is to ensure that all changes made in the IT environment of the
organization are done through a controlled process. The risks and impacts on the targeted and related
systems should be assessed and controlled to avoid unauthorized changes to any IT system and
ensure that all changes are recorded for analysis. This procedure describes various workflows of
change management.
2. Scope
This procedure shall be used by all Users requesting changes to/within the organization’s production
environments including (but not limited to) changes such as:
• Hardware changes
• System software changes
• Application changes (e.g. Functionality updates, web page additions/deletions, URL link
additions/deletions, releases, etc.)
• Network changes
• Operational and support procedures and documentation changes
• Version upgrades/enhancements/patches
• Planned/scheduled outages.
3. Procedure
4. Enforcement
Management reserves the right to monitor the compliance with this procedure. All reported violations
related to this procedure should be reported to the CISO/ISM and acted upon based on relevant ISMS
policies and procedures. All necessary records (emails, MoMs, etc.) for demonstrating the compliance
to the enforcement of this procedure shall be retained as an audit trail.
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This procedure aims to protect the integrity and availability of all IT assets at Synergy.
2. Scope
This procedure applies to all the Synergy IT assets.
3. Procedure
All procurement requests are based upon capacity projections done by Synergy IT.
1. Identify the product to be purchased in discussion with the relevant units/ people; a specific
business requirement must exist for each purchase; requirement should be validated by ISM
2. Depending on the product to be procured, refer to the list of approved vendors for Synergy for
shortlisting three vendors having a capability to deliver, install andmaintain the required product.
3. If the vendor is already an existing and approved vendor for Synergy, raise an EOI (expression of
Interest) to the vendor through emails/phone calls. If it is done through a phone call, a
documented reference should be maintained.
4. In case if the vendor is not listed or existing vendors do not have the right capability to deliver
the desired product, ISM should find out other vendors who are capable of delivering the
product. ISM could find such vendors through online research on the internet, blogs, professional
associations, vendor references (word of mouth), etc.
5. The newly identified vendors should be reviewed by respective persons at synergy. After
successful empanelment, raise an purchase request to the vendor through emails/phone calls. If
it is done through a phone call, a documented reference should be maintained .
6. A minimum of three vendor quotations (where required) / an Quotation shall be requested from
the relevant vendors. In case it is not feasible due to the constraints at vendor, Synergy will
take this case as an exception and proceed as required.
7. Discuss the business requirements with the vendors, whenever required and evaluate the desired
technical specifications/ configurations/ capacity/ price point with the help of vendor
recommendations.
8. Discuss and finalize the suitability of product internally within the IT team/ ISSC based on the
inputs given by the three vendors.
9. system acceptance criteria (including the technical specifications/ features) and perform
necessary product demonstrations/ proof of concept exercises, wherever feasible.
10. Based on successful match against the criteria/demos/POCs, a vendor is finalized and a Request
for Quotation (RFQ) on the product is raised to the vendor.
11. In cases where the quotation needs to be sought and finalized prior to a demos/POCs, Synergy
would raise an RFQ ahead of the POC exercise.
12. Subsequently, upon successful acceptance of the demos/POCs in compliance with System
Acceptance Criteria (including pricing) vendor is selected and a purchase order is raised.
The procedures are the same as above except for the following:
1. Demos/POCs may not be required from all the vendors as long as Synergy IT has sufficient
knowledge about the usefulness and suitability of the Product under consideration.
The procedures are the same as above except for the following:
1. POCs may not be required from any of the vendors as long as Synergy IT has sufficient
knowledge about the usefulness and suitability of the Product under consideration.
Diagrammatic representation
1. Verify the adherence to the system acceptance criteria as per the purchase orders
2. Confirm the correctness by signing off on the invoice or delivery challan with date and time
stamp
3. Move the materials to the IT store for inventorying
Asset Inventorying
1. Update the asset inventory registers with the product details including but not limited to the
following
a. Serial No./ service tag
b. Express service code, wherever applicable
c. Brand
d. Model
e. Date of purchase
f. Details of PO
g. Details of Invoice
h. Asset ID
i. Ownership
1. For all server room/ data centre related asset releases, the vendor is made responsible to visit
the respective site and assist in the installation/ deployment of the asset.
2. All other assets such as desktops, laptops and other desktop software licenses are allocated to
the respective owners.
3. Asset inventory shall be updated with the respective owner details against each asset.
4. Procedure enforcement
Management reserves the right to audit asset management procedures to ensure compliance to the
above mentioned procedures. Any non-compliance found during the audit would be reported to the
management and acted upon case to case basis.
5. References
DOCUMENT SUMMARY
REVISION HISTORY
1. Purpose
The purpose of this procedure is to control the risks of unauthorized access into any form of
information or information processing facilities which is critical to the nature of Business.
2. Scope
This Procedure applies to
a) All Information assets which are exposed to the risks of unauthorized access. This includes
information on servers, emails, etc.
3. Procedure
3.1 User registration
Upon Approval
Upon Approval
Request Forwarded
to IT Helpdesk for
access provisioning
DOCUMENT SUMMARY
REVISION HISTORY
1. Purpose
The purpose of this procedure is to deal with the issues of unauthorized access to the premises and
the office restricted areas.
2. Scope
This Procedure applies to
a) Entire premises
b) All the restricted areas
3. Procedure
Responsibility/
S. No. Description
Particulars
1. The visitors after entering the premises report to the security desk Security Personnel
Visitor personal details should be entered into the visitor register Security Personnel/
2.
including the details of electronic media carried by them Visitor Register
Visitor is sent to the reception for further enquiry (whom to meet, Reception
3.
purpose, etc.) and authorization to enter the premises
The reception personnel then discusses with the concerned person Reception
4.
for the authorization
5. The concerned person escorts the visitor into the premises Concerned person
ISM Helpdesk
Employee
For entry into restricted areas such as Server Room, UPS Room, etc. Any Employee
1. prior authorization from the Information Security Manager(ISM) is
mandatory.
The employee or the line manager should send an email to ISM Employee/ Line
2. requesting authorization for access into the particular restricted area Manager/ ISM
and the time limit of the access privilege, if any.
ISM approves the request based on the risks involved for the concerned ISM
3. employee accessing such restricted areas; ISM send out an email to the
concerned department or personnel for granting the access privilege
DOCUMENT SUMMARY
OWNER CISO
REVISION HISTORY
1. Purpose
This procedure is to define the practice of synergy with respect to electronic disposal by considering
environmental issues and applicable regulatory requirements.
2. Scope
The scope of this Policy is applicable to electronics devices that shall be disposed post use.
3. Policy
The E-Waste Management Policy has been framed to affirm the Open corporate commitment
to safe and efficient E-waste management, to reduce and recycle waste that was produced. To
ensure compliance with and exceed all legal / regulatory requirements relating to E-waste
management. It also promotes environmental and recycling issues as an integral element of its
activities and demonstrates its commitment to continual improvement in environmental practices.
Follow efficient E-waste management and recycling practices throughout Synergy and use
recyclable and recycled materials whenever appropriate.
Promote a awareness in purchasing that will give preference, where practicable, to those
products and services which cause least harm to the environment.
All E-wastes must be disposed of through a registered E-waste carrier who can demonstrate
their registration and compliance.
The E-waste generated in synergy shall also disposed by transferring devices to the existing
staff member after cleansing process is carried out based on Asset disposal process. This
is done to promote recycle of electronic components.
Synergy has been working in the area of safe disposal of electronic wastes and shall partnered
with authorized E-waste vendor. Synergy shall seek shared responsibility and cooperation
from E-waste vendor in reducing the environmental impact of their products.
Synergy shall identify a E-waste drop off centre / area and shall communicate the same to all
stake holders at Synergy. The E-waste generated at synergy shall be collected at the identified
Drop off centre / area after informing the designated authority.
Synergy shall ensure that the E-waste vendor has obtained all necessary authorizations from
the appropriate government agencies for their processing facilities.
The Synergy shall consider the following items for E-waste disposal (but not limited to the
below):
1. Desktops / Servers.
2. Laptops / Mobiles.
4. Memory Devices.
5. Hard disk / RAM/ Mother board.
4. Reference
1. NDA
Servers
Routers
Switch
Server
Hub
Printers
Projector
Scanner
usic System
Mobile
onference
Call Device
MUX
PBX
Modem
RESTRICTED Cyber Security Risk Management
Table of Contents
Cyber security risk management introduction ................................................................ 7
UPDATES TO SAFETY AND ENVIRONMENT PROTECTION POLICY .................................................................... 7
Cyber Security office Charter ........................................................................................................................... 7
Job Description ................................................................................................................................................ 8
Cyber security risk management Theory ....................................................................... 10
Safety and Operational Objectives ................................................................................................................ 10
High Level cyber risks .................................................................................................................................... 10
Safety and Operational Objectives Reliant on Critical Technologies ............................................................. 11
Risk Management Strategy ........................................................................................................................... 11
2.4.1 Cyber Risk Management Process ...................................................................................................... 11
CRM key personnel are defined as the office, Company information security officer,
Master, Chief Engineer, and Delegates
The Office
Accountable for CRM compliance and supports by providing resources and services,
as necessary.
Company information security officer
Responsible to manage the CRM program and supports shipboard personnel from
shore.
Master
Accountable for CRM on the vessel and leads shipboard personal on board.
Chief Engineer
Responsible to manage the CRM activities directly involving critical systems and
support shipboard personnel on board.
Delegates
Delegates may be appointed by the CISO, Master, or Chief Engineer to assume those
responsibilities listed under CISO, Master, or Chief Engineer in this manual.
Crew and 3rd Parties
Support CRM activities as listed in this manual under the direction of the Master or
Delegate.
JOB DESCRIPTION
The Office
i. Accountable for CRM compliance and supports by providing resources and
services
ii. Departmental support including Health, Safety, Quality, and Environmental
(HSQE), Information Technology, Facility and Vessel Security, Legal, Financial,
and Engineering or Project support
iii. Corporate programs including training, management of change, logistics,
procurement
CISO
i. Responsible to manage the CRM program
ii. Facilitates cybersecurity risk assessments
iii. Provides a link between company (shoreside) personnel and the shipboard
personnel
iv. Supports the recovery and restoration of vessel critical systems after a cyber
incident or hazards as effects of cyber incidents by ensuring shore-based
resources are available
v. Monitors the CRM program to ensure cyber risk mitigations effectively
manage safety and pollution-prevention goals
vi. Periodically reviews CRM and reports deficiencies to shore-based
management
Document Ref. No. ISMS_Man_048 Version No. 2.0
Revision No: 0 Page 4 of 37
RESTRICTED Cyber Security Risk Management
Preparedness
Operational
System
Administrative
Environmental
Effects
Quality of
Functions
Category
Security
Personnel
Service
Safety
Safety
Those systems, failure of which could immediately lead
III to dangerous situations for human safety, safety of the X X
vessel and/or threat to the environment.
Those systems, failure of which could eventually lead
II to dangerous situations for human safety, safety of the X X X
vessel and/or threat to the environment.
Those systems, failure of which will not lead to
I dangerous situations for human safety, safety of the X
vessel and/or threat to the environment.
Document Ref.
Document Ref. No.
No. ISMS_Man_048
ISMS_Man_048 Version No.
Version No. 2.0
2.0
Revision No:
Revision No: 00 Page
Page14 of 37
4 of 37
RESTRICTED Cyber Security Risk Management
POSSIBLE VULNERABILITIES
Cyber vulnerabilities occur in technologies due to pre-existing conditions in
configurations and the operating environment. The risk assessment process focuses
on levels of possibilities of exploitability by threats. Some possible vulnerabilities are:
Document
Document Ref.
Ref. No.
No. ISMS_Man_048
ISMS_Man_048 Version
Version No.
No. 2.0
2.0
Revision
Revision No:
No: 00 Page15
Page 4 of
of 37
37
RESTRICTED Cyber Security Risk Management
Document Ref.
Document Ref. No.
No. ISMS_Man_048
ISMS_Man_048 Version No.
Version No. 2.0
2.0
Revision No:
Revision No: 00 Page
Page16 of 37
4 of 37
RESTRICTED Cyber Security Risk Management
Upon the discovery of improperly configured critical systems, the Chief Engineer or
delegate shall develop a plan to mitigate cyber risks or reconfigure systems to meet
the minimum baselines.
Some examples of critical system that require restriction for physical access to assets
FASCIMILE BNWAS MSBD Steering Gear Fire Detection System
Document Ref.
Document Ref. No.
No. ISMS_Man_048
ISMS_Man_048 Version No.
Version No. 2.0
2.0
Revision No:
Revision No: 00 Page
Page22 of 37
4 of 37
RESTRICTED Cyber Security Risk Management
ACCESS AUTHORIZATION
Access to critical systems that have this control identified in the risk register must be
authorized by the Master, Chief Engineer or delegate(s).
ISMS_Tem_016 shall be utilized for granting access.
This access authorization is required for granting console access control and
maintenance support risks in the identified critical systems. Access authorization
controls in this section are not required for all vessel systems
Following authorization method can be utilized:
Engineer or Administrator - Credentials are granted to engineers or
administrators of critical systems by the Chief Engineer or delegate
- Permissions: Full control and modification of critical systems to include
program and reconfiguration
Maintenance - Credentials are granted to technical support personnel by the
Chief Engineer or delegate for basic troubleshooting
- Control over desktop environment and applications files which allow for
reboots or service restarts. Does not allow for reprogram orreconfiguration
Operator - Credentials are granted based on system access need or out login is
enabled
- User interaction with the critical system to allow for view and control of the
process or operations supported by the technology
Contractor Laptops/Devices
Contractor to update their antivirus and perform a full scan of their laptop
Contractor to confirm that laptop is malware free
Disable Bluetooth and Wifi on contractor equipment
Contractor to Confirm full anti-virus scan was conducted using latest updated software
Chief engineer to verify and authorize before connection of contractor’s laptop/device
to any of vessel’s IT/OT systems
Isolate contractor’s laptop from external networks until work is connected and laptop
disconnected form vessel’s IT/OT system.
Alarm &
Voyage Data FBB
Radar AIS Monitoring G/E Control System
Recorder 250
System
MSBD Steering Gear
Echo sounder Anemometer FASCIMILE BNWAS
Auxiliary Boiler
Some examples of critical system that require access authorization if remote access
is possible:
Vessel shall identify critical systems from risk register with unacceptable risk that
require patch management.
ii. security logging captures both successful and failed access attempts
iii. security logs overwrite only when logs are full
iv. systems notify users prior reaching storage capacity
v. systems notify users in the event of logging failures
Vessel shall identify critical systems that will require collections and review of audits
and event logs.
EVENT DATA COLLECTION AND CORRELATION
All audit and event log data shall be reviewed at every 6 months for the discovery of
information in critical system logs indicating a possible compromise or cyber event.
Personnel responsible for cyber incident detection shall be allowed to utilize
automated methods for detecting cyber events on critical systems when technically
feasible to configure or implement.
While using Cyber incident detection tools, passive monitoring tools shall –
i. Not require reconfiguration or changes to critical systems
ii. Be installed to passively monitor critical system data transferred on networks
iii. Notify the Chief Engineer or delegate of suspected cyber event activities
occur
EXTERNAL TECHNOLOGY CYBER ASSESSMENT REQUIREMENT
All critical systems provided by external vendors, suppliers, or 3 rd parties, to include
those of packaged navigation or control systems shall be assessed using audits, test
results, or other forms of evaluations to confirm they are meeting their contractual
obligations
CYBER SECURITY RISK MANAGEMET EVENT DETECTION & PROCESS
CYBER EVENT DETECTION ROLES AND RESPONSIBILITIES
In critical systems, it might be difficult to distinguish the difference between the
general system noise or failure and an actual cyber event.
In order to manage cyber event detection in a practical way, all crew and vessel
personnel shall use best judgement and report suspected cyber events to the Chief
Engineer or delegate in the same manner that an unexpected system condition
would be reported.
The following roles have been established as having dedicated cyber event detection
responsibilities.
Chief Engineer
Lead in coordination of cyber incident response activities onboard the vessel
Master
Directs cyber incident response activities
RESTRICTED Cyber Security Risk Management
Network monitoring shall occur on the connections for critical systems that have this
control identified in the risk register. Network monitoring controls listed in this
section are not required for all vessel systems.
Network Firewall –
Monitor all network logical boundaries between critical systems
Intrusion Detection –
Monitor network logical boundaries between critical systems and admin,
moral, or business networks
Some examples of the critical systems where control measures apply are
Voyage Data ECDIS SSAS Alarm & Steering Gear Emergency
Recorder Monitoring Shutdown
System
Echo sounder DGPS FBB 250 MSBD Auxiliary Boiler Smart Ship
Speed Log AIS BNWAS Bridge Composite
Maneuvering Boiler
Radar FASCIMILE FB 500 M/E Control Cargo &
System Ballast Control
Anemometer NAVTEX GMDSS G/E Control Fire Detection
System System
Some examples of the critical systems where control measures apply are
FASCIMILE BNWAS MSBD Steering Gear Fire Detection
System
NAVTEX FB 500 Bridge Auxiliary Boiler Emergency
Maneuvering Shutdown
SSAS GMDSS M/E Control Composite Boiler Smart Ship
System
FBB 250 Alarm & G/E Control Cargo & Ballast
Monitoring System Control
System
Attach following updated ship specific documents in this appendix for recordkeeping
1. IT/ OT inventories
2. IT/OT Change tracker sheet
3. Risk Register along with approval
4. CRM MOC form
5. CRM training records
6. CRM incident reporting
7. CRM periodic testing records