At SafeWP, we understand that your website's security is paramount. That's why we've implemented a comprehensive security framework that not only meets but exceeds the rigorous standards set forth by ISO 27001, the international standard for information security management systems.
ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through people, processes, and IT systems. SafeWP has adopted this framework as the foundation of our security posture, implementing every required control and going several steps further to protect your valuable digital assets.
The following table outlines the specific security controls we have implemented in accordance with ISO 27001 standards. Each control has been carefully implemented and is continuously monitored to ensure ongoing compliance and effectiveness.
| Control | Status |
|---|---|
Unique production database authentication enforcedThe company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key. |
✓ |
Encryption key access restrictedThe company restricts privileged access to encryption keys to authorized users with a business need. |
✓ |
Unique account authentication enforcedThe company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys. |
✓ |
Production application access restrictedSystem access restricted to authorized access only |
✓ |
Access control procedures establishedThe company's access control policy documents the requirements for the following access control functions:
|
✓ |
Production database access restrictedThe company restricts privileged access to databases to authorized users with a business need. |
✓ |
Firewall access restrictedThe company restricts privileged access to the firewall to authorized users with a business need. |
✓ |
Production OS access restrictedThe company restricts privileged access to the operating system to authorized users with a business need. |
✓ |
Production network access restrictedThe company restricts privileged access to the production network to authorized users with a business need. |
✓ |
Access revoked upon terminationThe company completes termination checklists to ensure that access is revoked for terminated employees within SLAs. |
✓ |
Unique network system authentication enforcedThe company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys. |
✓ |
Remote access MFA enforcedThe company's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method. |
✓ |
Remote access encrypted enforcedThe company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection. |
✓ |
Intrusion detection system utilizedThe company uses an intrusion detection system to provide continuous monitoring of the company's network and early detection of potential security breaches. |
✓ |
Log management utilizedThe company utilizes a log management tool to identify events that may have a potential impact on the company's ability to achieve its security objectives. |
✓ |
Infrastructure performance monitoredAn infrastructure monitoring tool is utilized to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met. |
✓ |
Network segmentation implementedThe company's network is segmented to prevent unauthorized access to customer data. |
✓ |
Network firewalls reviewedThe company reviews its firewall rulesets at least annually. Required changes are tracked to completion. |
✓ |
Network firewalls utilizedThe company uses firewalls and configures them to prevent unauthorized access. |
✓ |
Network and system hardening standards maintainedThe company's network and system hardening standards are documented, based on industry best practices, and reviewed at least annually. |
✓ |
Service infrastructure maintainedThe company has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats. |
✓ |
Networks securityNetworks and network devices shall be secured, managed and controlled to protect information in systems and applications. |
✓ |
Security of network servicesSecurity mechanisms, service levels and service requirements of network services shall be identified, implemented and monitored. |
✓ |
Segregation of networksGroups of information services, users and information systems shall be segregated in the organization's networks. |
✓ |
Web filteringAccess to external websites shall be managed to reduce exposure to malicious content. |
✓ |
Segregation in networksCloud Service Customer: The cloud service customer should define its requirements for segregating networks to achieve tenant isolation in the shared environment of a cloud service and verify that the cloud service provider meets those requirements. Cloud Service Provider: The cloud service provider should enforce segregation of network access for the following cases:
Where appropriate, the cloud service provider should help the cloud service customer verify the segregation implemented by the cloud service provider. |
✓ |
Clock synchronizationThe clocks of information processing systems used by the organization shall be synchronized to approved time sources. |
✓ |
Secure system architecture and engineering principlesPrinciples for engineering secure systems shall be established, documented, maintained and applied to any information system development activities. |
✓ |
Segregation in virtual computing environmentsA cloud service customer's virtual environment running on a cloud service should be protected from other cloud service customers and unauthorized persons. |
✓ |
Capacity managementThe use of resources shall be monitored and adjusted in line with current and expected capacity requirements. |
✓ |
Capacity management (Cloud Services)Cloud Service Customer: The cloud service customer should ensure that the agreed capacity provided by the cloud service meets the cloud service customer's requirements. The cloud service customer should monitor the use of cloud services, and forecast their capacity needs, to ensure performance of the cloud services over time. Cloud Service Provider: The cloud service provider should monitor the total resource capacity to prevent information security incidents caused by resource shortages. |
✓ |
Encryption of PII transmitted over public data-transmission networksPII that is transmitted over public data-transmission networks should be encrypted prior to transmission. |
✓ |