Information Security Policy
Information Security Policy
Company Policies
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 1 of 20
Company Policies
Information Security Policy
Contents
1 Introduction ....................................................................................................... 3
1.1 Commitment ................................................................................................. 3
1.2 Risk Management and benefits ........................................................................ 3
1.3 Scope ........................................................................................................... 4
2 Requirements for Information Security .............................................................. 5
2.1 Information Security Management ................................................................... 6
2.2 Protection of classified company information ..................................................... 7
2.3 Staff Awareness of Information Security ........................................................... 8
2.4 Secure Network Architecture ........................................................................... 9
2.5 Physical and Environmental Security ............................................................... 10
2.6 Security of IT Endpoints ................................................................................ 11
2.7 Security Design in Information Systems .......................................................... 12
2.8 Access Control .............................................................................................. 13
2.9 Information Security Reporting ....................................................................... 14
2.10 Collect and Review Access Logs ...................................................................... 15
2.11 ISMS Monitoring and Review .......................................................................... 16
2.12 Business Continuity Planning .......................................................................... 17
3 Delegations ...................................................................................................... 18
3.1 Governance and Support ............................................................................... 18
3.1.1 Chief Executive Officer ....................................................................... 18
3.1.2 Chief Information Security Officer ....................................................... 18
3.1.3 Information Security Manager ............................................................ 18
3.2 Implementation ............................................................................................ 18
3.2.1 Directors and General Managers ......................................................... 18
3.2.2 All Staff ........................................................................................... 18
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 2 of 20
Company Policies
Information Security Policy
1 Introduction
1.1 Commitment
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 3 of 20
1.3 Scope
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 4 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 5 of 20
The requirements are derived from the Group Management Policies (GMP) that
apply to the TEXTILETECH Group as a whole, including all subsidiaries.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 6 of 20
Company Policies
Information Security Policy
▌ All managers are responsible to ensure that the security measures outlined in
this policy are implemented effectively within their business-unit and must
actively support the activities and objectives of the Information Security
Management business process.
▌ Senior managers and IT Asset Owners are responsible to ensure that there
are sufficient resources to implement and operate the security controls
effectively and that these resources are trained, qualified, skilled, and
competent to perform their required tasks.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 7 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 8 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 9 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 10 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 11 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 12 of 20
Company Policies
Information Security Policy
▌ Access to Test Data will be controlled and the Test Data itself will be
carefully selected and protected to ensure that it does not expose staff
personal information or cause any leakage of classified company information.
▌ Access to source code will be strictly controlled and strong version-control of
source code will be enforced by the Change Control process to ensure that
only tested and authorised versions are released to the live environment.
▌ Development and testing of new information systems will be restricted to
a Dev/Test environment that is firewall-isolated from the live
environment. The rollout of a new information system from the Dev/Test
environment to the live environment will be strictly controlled by the
Change Control process.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 13 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 14 of 20
Company Policies
Information Security Policy
▌ All security incidents must be reported to the IT Help Desk by phone or e-mail.
▌ All employees are responsible to report any security event or abnormal
operations to the IT Help Desk so that these can be recorded and
investigated.
▌ Any observed security threat that attempts to damage company information
assets, or exploit a known-vulnerability or weak control must be reported as
a security incident.
▌ All security incidents will be logged, classified and assigned to the appropriate
workgroup for investigation, diagnosis and resolution.
▌ Major security incidents will be notified to the Information Security
Manager and will follow the “major incident reporting” procedure that is
provided by TEXTILETECH Corporation.
▌ All major security incidents will trigger the “Major Incident Review” procedure
so that the root-cause(s) of the incident is diagnosed and a permanent
solution is proposed. The solution (corrective or preventative action) will be
recorded in the CPAR system and tracked until implemented and tested.
▌ Major security incidents will trigger the “Security Risk Assessment” procedure
to ensure that the assessment inputs (business-impact; likelihood of attack;
effectiveness of controls) are rated appropriately and the output (residual-
risk rating) is accurate.
▌ Repeated or serious breaches of the Information Security Policy will be
subject to a formal disciplinary process. Illegal activities will be referred to
the appropriate authorities for investigation and the company may take
measures to quarantine assets and preserve evidence.
▌ Records of information security incidents, including patterns, statistics and trends
will be collected periodically as input to the activities of the Information Security
Committee.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 15 of 20
Company Policies
Information Security Policy
▌ Audit logs that record user activities, exceptions and information security
events will be collected and securely archived for a minimum period of 1
year.
▌ Procedures that describe how the use of information systems and IT
Facilities will be monitored will be produced and the data collected will be
reviewed regularly, at least quarterly.
▌ Automated tools will be provided to collect, filter, analyse and report
security events. Access to these tools will be controlled and restricted. The
log information will be protected against loss, damage or tampering.
▌ All system administrator and system operator activities will be logged.
▌ Unexpected or abnormal system operations will be logged, analysed and if
necessary, referred to the incident management process for diagnosis and
resolution.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 16 of 20
Company Policies
Information Security Policy
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 17 of 20
Company Policies
Information Security Policy
▌ The business continuity management system (BCMS) will ensure that all
business continuity plans include the requirement to protect the
confidentiality, availability and integrity of any classified company
information that needs to be recovered and restored as part of a major
disaster-event.
▌ The BCMS will assess the risk that the disruption of a business process may
have a negative consequence for information security and where
appropriate, will ensure that the BCP mitigates this risk and securely
protects classified company information from harm.
▌ The BCMS will develop plans and procedures to ensure that critical business
information is accessible, as required, to meet the needs of business
operations.
▌ The BCMS will develop plans and procedures to ensure that critical information
assets are recoverable, following a major disaster-event, and that an agreed
level of service can be restored within an agreed minimum time scale.
▌ A single BCMS framework will be maintained to ensure that all BCP plans are
consistent and include information security requirements.
▌ The BCMS will ensure that all plans, procedures, methods and tools, that
support data recovery and restoration following a major disaster-event, are
tested and updated periodically. The minimum period is 1 year.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 18 of 20
Company Policies
Information Security Policy
3 Delegations
▌ The CEO has overall accountability for the endorsement, sponsorship and
support of the company-level Information Security Management process
▌ The CEO shall delegate and appoint relevant organisational functions in the
company with authority and responsibility for compilation of policies
3.2 Implementation
▌ Ensure that all actions and activities are performed in accordance with this
policy.
▌ If any circumstance requires an employee to breach this security policy so that
they may fulfil the requirements of their job/contract, then the inconsistency
should be reported to their line manager.
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 19 of 20
Company Policies
Information Security Policy
Document Information
Criteria Details
Document Title
Document Owner
File Name
Amendment History
Version Date Description Author
Reference Material
Acronyms Description
Copyright © 2018 TEXTILETECH Pty Ltd: Do not copy, distribute or modify in any form or
manner without prior written consent of TEXTILETECH.
Classification: The information contained herein is classed as “Internal Use Only”
Version Control: The document is maintained and published on the TEXTILETECH intranet for
reference. Printed copies are uncontrolled
DOCUMENT ID: TEXTILETECH-‐61.00 Issue 1 Internal Use Only Page 20 of 20