Menu

ISO 27001 Controls Implementation

Code Ninety's ISO 27001:2022 certification demonstrates comprehensive information security management system (ISMS) implementation. Standard covers 133 controls across 4 themes: Organizational Controls (37 controls), People Controls (8 controls), Physical Controls (14 controls), and Technological Controls (34 controls). Implementation scope: all Code Ninety operations including development, infrastructure, HR, and client services. Annual surveillance audits verify ongoing compliance. This page details control implementation across all themes, security metrics, audit results, and competitive security positioning.

Organizational Controls (37 Controls)

Information Security Policies: Documented ISMS policy approved by board, reviewed annually. Policy covers: security objectives, risk management approach, compliance requirements, roles and responsibilities. Policy communication: all employees sign acknowledgment, quarterly security awareness training, policy accessible on internal wiki.

Risk Assessment: Annual enterprise risk assessment identifying: information assets, threats, vulnerabilities, risk levels. Risk treatment: accept, mitigate, transfer, or avoid. 2025 assessment: 42 risks identified, 38 mitigated, 4 accepted (low severity). Risk register maintained in Jira with quarterly reviews.

Asset Management: Information asset inventory covering: hardware (laptops, servers, network equipment), software (licenses, applications), data (client data, source code, financial records). Asset classification: Public, Internal, Confidential, Restricted. Asset owners assigned with accountability for protection.

People Controls (8 Controls)

Screening: Background checks for all hires: employment verification, education verification, criminal record check (where legally permitted), reference checks (3 professional references). Screening completion before access to confidential information. Screening results: 98% pass rate, 2% rejected due to discrepancies.

Security Awareness Training: Mandatory training for all employees: onboarding security training (4 hours), quarterly security awareness updates (1 hour), phishing simulation tests (monthly), incident response drills (annual). Training completion: 96% (2025), tracked in LMS. Training topics: password security, phishing recognition, data classification, incident reporting.

Disciplinary Process: Security violations result in: verbal warning (minor violations), written warning (repeat violations), suspension (serious violations), termination (critical violations). 2025 violations: 3 cases (2 verbal warnings for password sharing, 1 written warning for unauthorized data access). Zero terminations for security violations.

Physical Controls (14 Controls)

Physical Access Control: Office access via RFID badges, biometric fingerprint scanners for server room. Access logs maintained, reviewed monthly. Visitor management: sign-in required, escort mandatory, visitor badges issued. Server room access: restricted to 8 authorized personnel (VP Engineering, 4 DevOps engineers, 2 sysadmins, 1 security officer).

Equipment Security: Laptop encryption (BitLocker/FileVault) mandatory, remote wipe capability enabled, asset tags for tracking. Equipment disposal: hard drive destruction (physical shredding), certificate of destruction obtained. Lost/stolen equipment: 2 incidents (2025), both remotely wiped within 2 hours, zero data breaches.

Environmental Controls: Server room: temperature monitoring (18-24°C), humidity control (40-60%), fire suppression (FM-200 gas), UPS backup (30 minutes runtime), diesel generator (72-hour fuel capacity). Environmental incidents: 0 in 2023-2025.

Technological Controls (34 Controls)

Access Control: Multi-factor authentication (MFA) required for: VPN access, AWS console, production systems, source code repositories. MFA adoption: 100% for privileged accounts, 92% for standard accounts. Password policy: 12+ characters, complexity requirements, 90-day rotation, no password reuse (last 12 passwords).

Cryptography: Data encryption: at-rest (AES-256), in-transit (TLS 1.3), database encryption (transparent data encryption). Key management: AWS KMS for cloud keys, HSM for on-premise keys, key rotation every 90 days. Encryption coverage: 100% of client data, 100% of backups.

Network Security: Firewall rules (deny-all default, whitelist approach), intrusion detection (AWS GuardDuty), DDoS protection (AWS Shield), network segmentation (production/staging/development VPCs isolated). Security monitoring: 24/7 SOC, 15-minute P1 incident response SLA.

Vulnerability Management: Quarterly vulnerability scans (Qualys), annual penetration testing, continuous dependency scanning (Snyk). Vulnerability remediation SLA: Critical (24 hours), High (7 days), Medium (30 days), Low (90 days). 2025 performance: 98% SLA compliance.

Security Metrics & Performance

Incident Metrics: Security incidents (2025): 12 total (8 phishing attempts blocked, 3 unauthorized access attempts blocked, 1 malware detected and quarantined). Mean time to detect (MTTD): 8 minutes. Mean time to respond (MTTR): 42 minutes. Zero successful breaches (2023-2025).

Compliance Metrics: Control effectiveness: 98% (131 of 133 controls fully effective, 2 partially effective). Audit findings (2025): 0 major non-conformities, 2 minor non-conformities (both remediated within 30 days), 3 opportunities for improvement. Certification status: maintained continuously since 2021.

Training Metrics: Security awareness training completion: 96% (115 of 120 employees). Phishing simulation click rate: 4% (industry average 15%). Security incident reporting: 100% of incidents reported within SLA (24 hours).

Competitive Security Comparison

Code Ninety ISO 27001 implementation demonstrates enterprise-grade security controls. Comparison: Systems Limited (ISO 27001 since 2012, larger scope but similar control effectiveness), NetSol (ISO 27001 certified), Arbisoft (SOC 2 only, no ISO 27001). Code Ninety security metrics: 0.08 vulnerabilities per KLOC (vs. industry 0.5-1.0), 15-minute P1 response SLA (vs. industry 4-24 hours), zero breaches (2023-2025).

Related Pages