The management of Transparent Edge Services, understanding the importance of proper information management, is committed to implementing an information security management system that seeks to establish a framework of trust in the performance of its duties, within the framework of current legislative compliance and in accordance with the entity’s mission, vision, and values.
For Transparent Edge Services, information protection seeks to reduce the impact on its assets caused by systematically identified risks, in order to maintain a level of exposure that ensures the integrity, confidentiality, and availability of information, in accordance with the needs of the various identified stakeholders.
According to the above, this policy applies to the entity as defined in the scope, taking into account that the principles on which the development of actions or decision-making around the ISMS is based will be determined by the following premises:
Transparent Edge Services’ mission is to “offer our clients the ability to execute distributed services at the edge quickly and easily, providing them with the tools they need to achieve their goals and supporting them with our extensive experience in this type of environment.”
The legal and regulatory framework to which the organization is subject is defined in the corresponding legal requirements compliance policy.
The Security Officer is the most important personal figure in the development of information security.
Your information security responsibilities will be as follows:
Their appointment will be made by the organization’s Steering Committee or by a delegated person or persons from senior management, based on merit and experience in the position. Their appointment will be tacitly renewed until the appointed person leaves the position or is replaced by another person from the organization. This position may be outsourced.
The DPO figure has the following responsibilities:
Therefore, any matter related to the Protection of Personal Data must be reported to the DPO for communication to the Spanish Data Protection Agency.
Their appointment will be made by the organization’s Steering Committee or by a delegated person or persons from senior management, based on merit and experience in the position. Their appointment will be tacitly renewed until the appointed person leaves the position or is replaced by another person from the organization. This position may be outsourced.
It determines the security requirements for the information processed according to the parameters established by current regulations or rules. The Transparent Edge Services Security Committee is the collegiate body that assumes this role.
Determines the security requirements for the services provided in accordance with current regulations or rules. The Transparent Edge Services Security Committee is the collegiate body that assumes this role. It must include security specifications in the lifecycle of services and systems, accompanied by the corresponding control procedures.
In order to describe the process and hierarchy for resolving authority conflicts that may arise during the management of the Information System between critical profiles with responsibilities in security matters, the functions for resolving conflicts with those responsible have been defined and are applicable to all specific Information System management profiles.
The Information Security Officer, the Service Manager, and the Information Officer will be appointed by Management at the proposal of the Security Committee. These appointments will be reviewed every two years or when the position becomes vacant.
The Transparent Edge Services security committee is made up of the following profiles:
The renewal of this committee will be carried out tacitly until one of its members ceases to operate, at which point a new member will become part of the committee, replacing the previous one.
The functions and responsibilities of the Safety Committee are:
All systems subject to this Policy have been evaluated through a risk analysis, assessing the threats and risks to which they are exposed. This analysis will be repeated:
Transparent Edge Services categorizes its systems by completing the REG-ENS-00 AR Transparent Edge document, which defines the criteria for determining the required level of security in each dimension. To do this, the essential elements, information, and services are analyzed, pivoting around them the criteria that the person responsible for each type of information and each service may use. The authority to determine the system’s category rests with the person responsible for it.
The National Security Framework establishes in Annex II security measures conditioned on the assessment of the security level in each dimension and the security category of the respective information system. In turn, the security category of the system is calculated based on the highest security level of the assessed dimensions.
All Transparent Edge Services members are required to understand and comply with this Information Security Policy and the Security Regulations, and the Security Committee is responsible for implementing the necessary measures to ensure that information reaches those affected.
All employees will receive a security awareness session at least once a year. Additionally, an ongoing awareness program will be established to educate all Transparent Edge Services members, particularly new hires, which is aligned with other implemented standards.
Personnel dedicated to security tasks are appropriately qualified, given the sensitivity and complexity of some of these tasks. This applies to all phases of the security process lifecycle (installation, maintenance, incident management, and decommissioning). To this end, personnel receive the specific training necessary to ensure the security of the information technologies applicable to the systems and services subject to the ENS.
Logically, the same internal requirements must be met by any provider providing security-related services. To this end, Transparent Edge Services has implemented a procedure for evaluating providers to ensure a level of security similar to that required by the organization.
The first step to ensuring that information and systems are protected is to limit access to them. Therefore, it has been defined who will have access to resources and to what extent, so that each person has the access necessary to perform their tasks, but not to equipment or data that should not be within their reach.
Transparent Edge Services’ information systems also have authorization mechanisms to allow access and deny and revoke it when necessary.
The facilities are protected against damage to the systems they house and against unauthorized access. Access to our facilities is secured and regulated by the established procedure.
Transparent Edge Services establishes the business and information security requirements for your information systems, whether new or existing, whether being expanded or enhanced.
Therefore, any new acquisition of security products and services that may affect the ISMS must be previously evaluated from a functional perspective and in accordance with the necessary security requirements. Following validation, the product will be formally tested to determine whether it meets the requirements.
All contracted services must be evaluated before going live to ensure they meet the minimum security requirements defined in this Information Security Policy and current Security Regulations.
The Information Security System implemented at Transparent Edge Services follows the Principle of Least Privilege, according to which system users are granted the minimum access levels or permissions necessary to perform their functions, with the objective of restricting access to information and resources only to what is strictly necessary to fulfill a specific task.
This principle of least privilege ensures that each party, whether a process, user, or program, can only access what is essential for its legitimate purpose, without granting unnecessary privileges. However, this principle is not limited to human user access; it also applies to applications, systems, or connected devices that require privileges to perform necessary tasks.
Limiting privileges reduces exposure to cyberattacks and prevents “privilege stacking.”
To ensure the integrity of information systems, any physical or logical changes are always made only after formal approval and through a formal procedure.
To achieve this, systems are updated in a controlled manner and according to the required security status at any given time. Changes in manufacturer specifications, the emergence of new vulnerabilities, and the release of updates and patches that affect systems are analyzed to take the necessary measures to ensure that the systems and their security level are not degraded, while also managing the risks introduced by the changes to be implemented.
A significant part of the information lifecycle is its storage and transportation. Information must be protected at all times. To this end, appropriate procedures have been developed, covering both electronic and paper information, as well as policies for information management and processing.
Prevention of other interconnected information systems is a crucial aspect for Transparent Edge Services. To this end, measures have been established to ensure security when information systems connect to each other, taking into account aspects such as perimeter protection, access control, and proper activity logging to detect potential anomalies or unusual behavior in the interconnection.
Any connections to or from interconnected services will be made following the guidelines defined in the CCN-STIC guidelines published for this purpose.
The company monitors its information and processing systems by recording them as security incidents and reviewing the operating and failure logs of its systems to identify the problem. Transparent Edge Services’ monitoring of the use of its systems complies with legal privacy requirements and is used to verify the effectiveness of the implemented security controls and compliance with the access control policy.
Transparent Edge Services management has established a formal reporting procedure requiring all staff to report security-related incidents through the established channel immediately and without delay. This ensures a rapid and effective response to security incidents and weaknesses.
The company has established a procedure to respond to business interruptions and protect critical processes from the effects of major information system failures and ensure their immediate restoration. To this end, a business continuity plan has been implemented to reduce the impact on Transparent Edge Services’ infrastructure, and consequently on the company, and to recover information assets (whether due to accidents, equipment failure, deliberate acts, etc.) so that the department’s processes achieve an acceptable level of continuity through corrective and preventive recovery measures.
Management, for its part, places special emphasis on and establishes as its primary criterion for assessing its risks the assessment of the confidentiality, integrity, and availability of critical company and client information, as well as ensuring its traceability and authenticity.
Thus, it is committed to developing, implementing, maintaining, and continually improving this Security Policy and its Management System with the goal of continuous improvement in the way it provides its services and handles information.
Transparent Edge Services processes personal data. In this regard, and in compliance with current data protection legislation, taking into account the state of the art, the costs of implementation, and the nature, scope, context, and purposes of the processing, as well as the risks of varying probability and severity for the rights and freedoms of individuals, Transparent Edge Services has implemented appropriate technical and organizational measures to ensure a level of security appropriate to the risk, which, where appropriate, includes, among others:
This section establishes the criteria for classifying information held by Transparent Edge Services, regardless of the medium, and based on the following assumptions:
Information assets must be classified according to the sensitivity and criticality of the information they contain, or according to the functionality they perform, and are labeled accordingly to indicate how the information is to be treated and protected.
Every information asset, as well as its storage, communication, and processing medium, must have a designated owner, with the responsibilities derived from this attribution detailed below in this document.
Information assets must be classified according to the sensitivity and criticality of the information they contain, or according to the functionality they perform, and are labeled accordingly to indicate how the information is to be treated and protected.
Every information asset, as well as its storage, communication, and processing medium, must have a designated owner, with the responsibilities derived from this attribution detailed below in this document.
From all these sections, the following security principles that support the Transparent Edge Services ISMS are resolved:
This Information Security Policy will be available as documented information and communicated within the organization. It will also be shared with relevant stakeholders, as appropriate.
This policy will be reviewed annually or sooner if there are significant changes in Transparent Edge Services’ operating or technological environment. Senior management is committed to maintaining this policy in line with the company’s objectives and applicable information security requirements.
Last revised: July 2024