Documentació SGSI
Aplicació de la norma ISO/IEC 27001
Empresa: Intergrid (Opengea SCCL)
Data: 15-10-2024
Abast: Tots els serveis de hosting, dominis i aplicacions web al núvol
1. Scope of the ISMS
The scope of the Information Security Management System (ISMS) covers all services provided by Intergrid (Opengea SCCL), including:
- Cloud Hosting, Dedicated Hosting and VPS.
- Registration and management of domains.
- Cloud-based web applications.
- Physical infrastructure hosted in advanced Data Centers in Germany, Finland, United States and Singapore, and fully managed by Intergrid from Barcelona.
2. Information Security Policy
Intergrid is committed to protecting the confidentiality, integrity, and availability of its own information and that of its clients, through appropriate technical and organizational controls, continuous risk assessment, and continuous improvement of the ISMS.
3. Risk Analysis and Treatment Methodology
- Identification of assets, threats and vulnerabilities.
- Impact and probability assessment (High, Medium, Low, None).
- Assignment of measures and controls to reduce risks.
- Documentation of residual risk and responsible party.
4. Statement of Applicability (SoA)
This statement certifies the commitment and actual implementation of the requirements of the ISO/IEC 27001:2022 standard through a responsible declaration by the organization.
Controls from Annex A of the ISO/IEC 27001 standard have been selected and applied according to the risk assessment. Including:
- A.5: Polítiques de seguretat
- A.6: Organització de la seguretat
- A.8: Gestió d'actius
- A.9: Control d'accés
- A.12: Seguretat operativa
- A.13: Seguretat de les comunicacions
- A.15: Relacions amb proveïdors
- A.16: Gestió d'incidents de seguretat
- A.17: Continuïtat del negoci
5. Security Objectives
- Prevent data leaks from hosted web services
- Ensure authentication and legitimate access to systems
- Ensure complete and available backups
- Ensure compliance with the GDPR
6. Key Records
- Record of assets and liabilities
- Security Training Record
- Security incidents
- Internal audits and management reviews
7. Specific Procedures
Security Incident Management
All incidents must be reported immediately to the ISMS manager. They will be documented in the incident register and an analysis will be carried out to identify causes, impact and corrective actions.
Access Control
- Access limited according to roles and needs
- Strong Authentication: complex keys and 2FA
- Periodic review of permissions
Backup Policy
- Automatic daily and weekly backups
- Replication in Multiple Data Centers (independent physical locations)
- Regular restoration tests
Acceptable Use Policy
Users and technicians can only use Intergrid resources for authorized purposes. Any abusive, illegal use or that compromises security will be subject to sanction.
Third-party and supplier management
- Confidentiality agreements with collaborators
- Control of suppliers' access to internal systems
- Periodic review of subcontracted services
Business continuity
- Georedundant backups and constant monitoring
- Disaster recovery procedures
- Assignment of key roles in crisis situations
Audits and continuous improvement
- Periodic internal audits of the ISMS
- Review of policies and procedures
- Record of corrective actions and improvements
Device and equipment management
- Updated inventory of equipment and devices
- Screen lock policy and disk encryption
- Limitation of the use of external devices (USB, etc.)
Email Security
- Filtering of suspicious emails (spam, phishing)
- Configuration of SPF, DKIM, and DMARC
- Shipping restrictions and campaign review
Classification and handling of information
- Labeling according to sensitivity (confidential, internal...)
- Distribution restrictions according to classification
- Secure destruction of obsolete information
Training and awareness
- Periodic training sessions on safety
- Awareness campaigns for all staff
- Periodic phishing simulation tests
Management of records and evidence
- Record preservation during the period established by regulations
- Access control to confidential records
- Integrity and availability guaranteed through redundant systems
Specific policies for projects and clients
- Assignment of security managers for project
- Limited privacy controls and sharing according to contracts
- Security validation before deploying services to clients
This documentation is basic and extensible according to the evolution of the ISMS. It is recommended to review it at least annually or after significant incidents.
Security measures (ISMS - ISO 27001)
Empresa: Intergrid (Opengea SCCL)
Translation: \"Date:\" 15-10-2024
Scope: Serveis de hosting (cloud, dedicat, VPS), dominis i aplicacions web.
| ⚠️ Active | Risk | Applied measures |
|---|---|---|
| Access to servers | Unauthorized access | IP filtering, SSH key, 2FA, fail2ban |
| Databases | Data leak | ORM, access control, audit |
| Control Panel | Service outage | Cloudflare, connection limitation |
| Backups | Data loss | Redundant backups in multiple locations |
| E-commerce service | Fraudulent modification | Active monitoring, alerts, auditing |
| DNS and domains | Manipulation of records | Key regeneration and access control |
| Web d\'usuari | Identity theft | 2FA, attempt limitation, captchas |
| Spam / phishing | SPF, DKIM, DMARC, Spamassassin, log review | |
| Remote access of staff | Improper access | VPN with MFA, restricted by IP |
| Internal Applications | Execution of unauthorized code | Version control, supervised deployment |
| Payments | Access or manipulation of payment data | Ús de Stripe com a plataforma PCI-DSS compliant; no s’emmagatzemen dades sensibles localment |
| Third-party software | Execution of malicious code | Periodic updates, vulnerability control (CVE) |
| Human errors | Accidental deletion | Training, reviews, limited permits |
| Critical configurations | Malicious configuration injection | Configuration audits, automatic tests |
| Version control | Introduction of insecure code | Peer review, continuous integration, automated tests |
| Administration Portals | Illicit access | IP-restricted access, 2FA, access logs |
| System updates | Exploitation of known vulnerabilities | Periodic updates, vulnerability scanners |
| Custom Development | Leaks of sensitive data | Application of OWASP guides, training for developers |
| External providers | Critical dependence | Service Level Agreements (SLA), continuity analysis |
| Security logs | Omissió de proves en cas d’incident | Safe and controlled retention, restricted access, SIEM |
| Digital identities | Suplantació d’usuaris | Automated provisioning and deactivation, periodic review |
| Hiring of staff | Breach of confidentiality | Clàusules NDA, formació de benvinguda, control d’accés inicial |
| Public DNS server | Malicious redirection | Periodic review of areas, restricted access, change log |
| Sessions d’usuari | Undue persistence | Automatic expiration, inactive session logout |
| System updates | Exploitation of known vulnerabilities | Gestió centralitzada d’actualitzacions, proves abans de desplegar |
| API Interfaces | Unauthorized access to data | Tokens with expiration, IP limitation and strong authentication |
| Pre-production environments | Exhibition of real data | Anònims, entorns separats, restriccions d’accés |
| Remote technical support | Filtració d’informació confidencial | Canals segurs, registre d’activitat, limitació d’accés temporal |
| Document Management | Unauthorized access to internal documents | Platform with granular permissions, review of shares |
Information Security Policy (ISMS)
Empresa: Intergrid (Opengea SCCL)
Approval date: 15-10-2024
Approved by: Direcció Tècnica
- Objective: Garantir la Confidentiality, integrity and availability de la informació, dades de clients i sistemes.
- Scope: Tota la infraestructura de hosting i aplicacions desenvolupades o allotjades per Intergrid.
- Commitment: Aplicació del marc ISO/IEC 27001.
- Responsibility: Compliment per tot el personal.
- Key measures:
- Control d'accés per rol i 2FA
- Segregated backups
- Incident Monitoring
- Annual risk assessment
- Training and awareness
- Translation: \"Review:\" Anual.
Statement of Applicability (SoA) - ISO 27001
Translation: \"Date:\" 15-10-2024
Responsible for the ISMS: Director tècnic
| Control (Annex A) | Title | Applicable? |
|---|---|---|
| A.5.1 | Security policy | Implanted |
| A.5.11 | Data usage | Implanted |
| A.6.1 | Security organization | Implanted |
| A.6.3 | Remote work | Implanted |
| A.7.1 | Scheduled backups | Implanted |
| A.8.1 | Access Control | Implanted |
| A.8.16 | Supervision of activities | Partial |
| A.12.1 | Security applications | Implanted |
| A.14.1 | Secure communications | Implanted |
| A.18.2 | Internal Audit ISMS | Planned |
Version: 4.8 — Last review: 15-10-2024