Information security

MedStack Confidential

Metadata

Guide ourselves using an Information Security Management Program based on ISO/IEC 27002:2013

Meet our responsibilities for protecting data

Protect and secure all of our information system assets

Align the ISMP with our goals and processes

Continuously improve our policies

Verify compliance to this policy

Report problems

Exceptions

Enforcement

Non-compliance

References

CodeSectionTitle
ISO A.6 Organization of information security
ISO A.6.1 Internal organization
ISO A.6.1.1 Information security roles and responsibilities
ISO A.6.1.2 Segregation of duties
ISO A.6.1.5 Information security in project management
CHI SR2 Security Policy
CHI SR3 Information security management, coordination and allocation of responsibilities
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
SOC2 CC1.3 COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
SOC2 CC1.4 COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
SOC2 CC1.5 COSO Principle 5: The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
SOC2 CC5.1 COSO Principle 10: The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
SOC2 CC6.3 The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity’s objectives.