Partner Security Policy
This security policy outlines the measures taken by XDevPod to protect its information assets and systems, ensuring a secure environment for its users.
Scope: This policy applies to all XDevPod personnel, including contractors, and all activities related to the use, handling, management, or control of XDevPod's information assets and systems.
Key Security Measures:
Access Control: Access to information assets and systems is managed based on the principle of least privilege and need-to-know. Unique, strong credentials (complex passwords, biometrics, or tokens) are required for all personnel.
Human Resources Security: Prior to employment, all personnel undergo background verification checks. A security awareness and training program is in place, with defined metrics to measure its success.
Information Management: Information is classified and handled according to defined policies and procedures, including an information classification and handling policy and a data stewardship and governance policy.
Information Assets: All information assets are identified, recorded, and routinely assessed in an information asset register. Each asset has a defined owner and classification label.
Cryptography and Encryption: XDevPod utilizes industry-standard strong encryption and cryptography to protect information assets and systems. All authentication and authorization communications are encrypted, and personally identifiable information is protected both at rest and in transit.
Operations: Operational processes are regularly reviewed to ensure adherence to information security best practices. Change management processes include verification of information security controls. Networked assets are continuously monitored for threats.
Communications: Information assets are protected during transit using encryption and cryptographic controls in accordance with the information classification and handling policy.
System Acquisition and Development: XDevPod employs a defined Systems Development Lifecycle (SDLC) that integrates information security practices into each phase of system acquisition and development.
Supplier and Third-Party Relationships: Suppliers and third-party entities are regularly assessed and reviewed for their information security practices to ensure alignment with XDevPod's standards.
Incident Management: Measures are in place to identify, alert on, and manage information security incidents. Suspected or actual incidents are reported to a designated information security manager, and procedures are followed for triage, addressing, reducing, and recovering from incidents.
Business Continuity and Disaster Recovery: Information security controls are defined and maintained for systems critical to business continuity and disaster recovery plans, ensuring continued operation in the event of severe incidents.
Compliance: Information assets and systems are routinely audited to confirm compliance with XDevPod's internal standards, as well as relevant regulatory, legislative, and contractual requirements.
Remote Access and Teleworking: Robust information security controls are implemented for remote access and teleworking arrangements, commensurate with the criticality of the accessed information assets and systems.