
An IT management methodology is defined that allows guiding in the way of managing and executing the various technology projects in the company.
The main objective is to define the guidelines and directives that must be followed by collaborators and third parties, in order to guarantee the availability, integrity and confidentiality of the information.
Introduction to information security
The specific objectives corresponding to:
- Minimize the risk of the company’s mission processes.
- Comply with the principles of information security.
- Maintain the trust of officials, contractors and third parties.
- Implement the information security management system.
- Protect information assets.
- Establish the policies, procedures and instructions on information security and privacy.
- Strengthen the culture of information security among employees, third parties and clients.
- Guarantee business continuity in the event of incidents.
Aspects
Different aspects are evaluated that allow control over the security and privacy of the different products:
- Inventory of assets: the inventory of assets forms the first element of the chain in a system of management of the security of a system. An inventory of assets is defined as a list of all those resources (physical, software, documents, services, people, facilities, etc.) that have value for the organization and therefore need to be protected from potential risks.
- Security Configuration – Determines how the security configuration of laptops, servers, and workstations is handled using a rigorous configuration management and change control process to prevent attackers from exploiting vulnerable services and configurations.
- Vulnerability Assessment: Shows how the company continually acts on information to identify vulnerabilities, remediate problems, and minimize the window of opportunity for attackers.
- Malware Protection – This is how malicious software designed to attack systems, devices, or data, including viruses, Trojan horses, malware, worms, and other fast-moving and rapidly changing cyber threats, is controlled. number of points such as end-user devices, email attachments, web pages, cloud services, user actions, and removable media.
- Application Security: Shows how you manage the security lifecycle of internally developed and purchased software to prevent, detect, and correct security weaknesses.
- Network Security – Explains how ALTO protects network access and isolates systems from untrusted networks.
- Data Recovery – Tells how ALTO has established processes and leveraged tools to properly back up critical information and systems with a proven methodology for timely recovery.
- Identity, Password, and Access Management – Explains how ALTO manages the lifecycle of system and end-user accounts to minimize opportunities for attackers to exploit them.
- Audit Log – Reports how ALTO actively collects, manages, and analyzes audit logs of events that could help detect, understand, or recover from an attack.
- Data Protection: Shows ALTO’s organizational approach to preventing data leakage and ensuring the privacy, confidentiality, and integrity of data that resides both internally and externally to your organization, including cloud providers that may store data from system.
- Penetration Test: Reports how ALTO performs network-based and/or application-based penetration tests to determine the overall strength/weakness of your defenses.
- Facilities and physical security. shows how ALTO implements physical security measures at all facilities to protect assets, including people, property, and application-related information.
- Data deletion: shows how ALTO guarantees the deletion of data in case of customer request or in case of contract termination.
- Boundary Defense – Determines how assaults against critical infrastructure networks are prevented by perimeter defense.
- Incident response
- Information Security Program
- Skills and Training
- Data Protection
- Data transfer
- Monitoring
- Business continuity, DRP
- Domain management
Documentation
Different documents containing the information are handled to guarantee security in the different systems:
This information is in Spanish, if you require translation you must submit the request at the following link: https://soporte-ti.atlassian.net/servicedesk/customer/portal/14/group/83/create/868
- General Information Security Manual
- DRP – High Group
- Business Continuity Plan – BCP
- Privacy Policy
- Retention and Destruction Procedure
- Information security policies
- Password policy
- Privacy Policy
- Control against malware
- High Group Network Diagram
- Online SSL Certificate Checker
- Opinion Letter re Privacy Practices
- Data update flow
Questionnaires
Based on the needs of the clients, there is a basic questionnaire that has the frequently asked questions and answers about security, in addition, we keep a history of the questionnaires personalized by clients.
Security audits
Security audits are periodically carried out on the different products in order to detect and solve possible vulnerabilities
Availability audits
Audits are periodically carried out to detect and record falls to the different products.
This information is in Spanish, if you require translation you must submit the request at the following link: https://soporte-ti.atlassian.net/servicedesk/customer/portal/14/group/83/create/868
CLASSIFICATION: INTERNAL USE
Any printing or digital copy of the document is invalid. The user of the document must ensure that it is current before using it. This can be checked with the person responsible for the ISMS.