Skip to main content
Security Management Policy
Updated over a year ago

Physical Security

  1. All facilities should be secured using security measures including access cards, physical keys.

  2. Where applicable, a log register should be maintained to keep a track of any person who is visiting the facility/data center.

Infrastructure Security

  1. Physical or Logical Infrastructure should be secured through different security measures. Servers, Routers, Storage elements, and other Network Elements should be placed in a secure location.

  2. Only authorized personnel should be allowed to access these devices physically.

  3. Proper approval should be requested as part of Change Management or Incident Management if there is a need to visit a particular location.

Application Security

  1. All application components should be secured using Firewalls, ACLs, and User Credentials, and Keys to ensure authorized access.

  2. Different applications should only be allowed to communicate over specific ports.

  3. Direct traffic flow for ports is also important and where necessary only unidirectional ports should be used.

  4. There should be a mechanism to block or shut both physical and logical application ports/sockets whenever any abnormal surge of traffic is observed.

  5. Respective Application, Platform, Database, and other End-point monitoring tools should be deployed.

Data and Information Security

  1. No data should be transmitted over insecure or unprotected media. Respective path level security including SSH, TLS, and respective Certificates and Tokens must be used to ensure data privacy and avoid any kind of data sniffing.

  2. Only authorized personnel and applications should have the access to Databases, Backup Files, and Reports. All-access to any physical or digital assets should be in line with Access Management Policies.

Network Security

  1. Applications communicate with each other to deliver value, it should be ensured that the communication network between applications, their components, users are secure and enough measures are taken to protect them. These may include but not limited to firewalls, VPNs (Virtual Private Network), and ACLs (Access Control Lists).

Did this answer your question?