Security
Policy
1. Purpose
This Security Policy outlines the principles, responsibilities, and requirements adopted by Vortexron Technologies India Pvt. Ltd. ("Vortexron") to ensure the confidentiality, integrity, and availability of information assets. The policy serves as a framework for managing and mitigating security risks to Vortexron's people, systems, operations, clients, and stakeholders.
2. Scope and Applicability
This policy applies globally to:
- All Vortexron employees, contractors, interns, third-party vendors, and business associates.
- All information assets, systems, applications, networks, and cloud environments owned, leased, or accessed by Vortexron.
- All forms of data, including structured and unstructured, digital and physical.
- All Vortexron physical offices, data centers, development environments, and client sites.
3. Security Governance Model
Vortexron adopts a centralized security governance model under the leadership of the Chief Information Security Officer (CISO). Key responsibilities include:
- Defining and updating security policies, standards, and guidelines.
- Conducting regular risk assessments and audits.
- Enforcing security controls across all business units.
- Reporting to executive leadership and compliance committees.
4. Information Classification and Asset Ownership
Information and assets shall be classified based on sensitivity and impact:
- Confidential: Business secrets, client data, personal data
- Internal Use: Organizational documents not meant for public sharing
- Public: Marketing material, public announcements
Each information asset must have an identified owner, responsible for classification, access control, and compliance.
5. Access Control Policy
- Access to systems and data shall follow the principle of least privilege and need-to-know.
- Role-based access controls (RBAC) must be implemented.
- All access shall be logged, monitored, and periodically reviewed.
- Multi-factor authentication (MFA) is mandatory for critical systems.
6. Cryptographic Controls
- Sensitive data must be encrypted in transit and at rest using approved algorithms (e.g., AES-256, TLS 1.2/1.3).
- Encryption key management shall follow industry best practices.
- Hashing, digital signatures, and secure protocols are required for integrity validation.
7. Physical and Environmental Security
- Access to office premises and data centers shall be controlled using ID badges and biometric or smart card access.
- Surveillance (CCTV), intrusion detection, and secure zones shall be implemented in critical areas.
- Fire suppression, climate control, and power backup systems must be functional.
8. Operations Security
- Regular patching and vulnerability scanning shall be performed.
- Antivirus, endpoint detection and response (EDR), and firewall solutions must be enabled across all endpoints.
- Change management procedures must be followed for all infrastructure or code deployments.
9. Communications and Network Security
- Network perimeters must be protected using firewalls and IDS/IPS.
- VPNs shall be used for remote access with encryption.
- Email and collaboration tools must be monitored for phishing and malware.
10. System Acquisition, Development and Maintenance
- Secure coding practices must be followed (e.g., OWASP Top 10 compliance).
- Code reviews and automated security scanning tools are mandatory.
- Systems must be tested for security flaws prior to deployment.
11. Third-Party and Supplier Security
- All third parties with system access must sign data protection and security agreements.
- Vendors must be assessed for compliance and risk posture before onboarding.
- Access by external entities must be logged, reviewed, and time-bound.
12. Incident Management
- A Security Incident Response Plan (SIRP) is maintained and tested.
- Security incidents must be reported immediately via defined communication channels.
- Incident response teams shall investigate, contain, and remediate all reported events.
- Post-incident reviews will identify root cause and preventive actions.
13. Business Continuity and Disaster Recovery (BCDR)
- Business Impact Assessments (BIA) must be conducted regularly.
- BCDR plans must be documented, tested, and maintained.
- Backup strategies must ensure data recovery objectives (RTO/RPO) are met.
14. Security Awareness and Training
- All employees must complete annual information security training.
- Phishing simulations and targeted learning will be conducted periodically.
- Key personnel (developers, admins, managers) will receive role-specific training.
15. Audit, Monitoring, and Compliance
- Continuous monitoring and SIEM tools must be implemented.
- Internal and external audits will be performed periodically.
- Logs must be retained based on regulatory and business requirements.
16. Policy Review and Violations
- This policy will be reviewed annually and upon major operational or regulatory changes.
- Violations of this policy may lead to disciplinary actions, including termination, legal action, or contract termination for third parties.
Contact the Information Security Office
Note: This policy applies to all Vortexron global operations, including subsidiaries, partners, cloud environments, and external vendors who interact with our systems or information.
Vortexron is committed to securing its digital landscape through prevention, detection, response, and continuous improvement.