GP-101 Information security
Purpose
To describe how we carry out the management of information security, access and data recovery of information systems under the scope of the Information Security Management System (hereinafter ISMS).
Scope
This procedure concerns the management operations of the resources linked to the information systems under the scope of the Quality Management System: the design and development of medical software.
Definitions
- Access control: Means to ensure that access to assets is authorized and restricted based on business and security requirements.
- Confidentiality: Property that information is not made available or disclosed to unauthorized persons, entities or processes.
- Information security: Preservation of confidentiality, integrity and availability of information.
- ISMS: Information Security Management System
Responsibilities
JD-007
- To apply all necessary measures to ensure information security and the maintenance and updating of the information security systems are implemented.
- To propose the necessary measures and activities in the event of detecting any type of incident related to information security.
JD-004
- To ensure the correct maintenance and filing of all documentation generated, including procedures and records, as well as to verify that such records comply with established procedures.
Inputs
- New media requirements
- Sensitive information
- New hirings
Outputs
Development
General
We have developed this procedure following the guidelines established by the ISO/IEC 27001 international standard to manage the information security and to ensure the confidentiality, integrity and availability of the information that our stakeholders deposit and that we store in our information systems.
Information security is defined as the protection of information and also refers to the eradication of a wide range of threats to ensure business continuity, minimize business risks and maximize return on investment and business opportunities.
In order to properly manage such security, we establish, implement, review and improve an information security policy, where required, to ensure that the company's specific security and business objectives are met.
The review of this policy will be performed when significant changes occur in the ISMS or, alternatively, annually, to ensure that all aspects developed continue to be met.
The security measures associated with the management of access and management of media that may contain, where appropriate, personal data of medium or high level, is performed according to the criteria established in the current legislation on the subject, which we specifies, where appropriate, within our security documents.
Information security management system objectives
- Protection of information assets, so that all types of system resources are secured.
- Authentication of all users and employees in the access to the different information sources. Protection against the risk of identity theft.
- Authorization: Establishment of different levels of permissions and authorization to the information and periodic review of the same.
- Integrity of information: Ensuring that information is kept intact in all operations carried out, as well as in the communication processes.
- Auditing of security activities: Periodic monitoring and recording of possible incidents and suspicious activities in order to prevent undesired events.
Information security policy communication
We communicate the Information Security policy to both employees and interested parties.
In the case of employees, the policy is communicated at the beginning of their activity with us or when relevant changes occur in it.
In the case of stakeholders, the policy will be communicated at the start of the activity or when a change that may affect them is included. In addition, the company's integrated quality policy, which includes the embedded values relating to the ISMS, is publicly available.
Information security management
Once the information assets have been identified (T-018-001 Infrastructure list and control plan), we identify the security requirements based on three sources:
- Risk assessment of the organization, taking into account the overall business objectives and strategy of the organization. Through risk assessment, asset threats are identified, their probability of occurrence is evaluated and their potential impact is estimated.
- The set of legal, statutory and contractual requirements that must be met by the organization, its business partners, contractors, service providers and its socio-cultural environment.
- Principles, objectives and business requirements that are part of the information process that the organization has developed to support its operations. Following the identification of security requirements, we select and implement appropriate controls to ensure that risks are reduced to an acceptable level.
Based on the above, we define and approve an analysis and treatment of the exposed risks (see GP-013 Risk management) on an annual basis.
Data protection
We have designed the GP-050 Data protection manual in collaboration with our trusted legal firm, to find out what measures in particular we should take in order to improve compliance with data protection regulations, especially in relation to the General Data Protection Regulation or GDPR.
Data Privacy Impact Assessment (DPIA)
We have also evaluated the impact of the data processing that we conduct following the template T-052-001 DPIA. In particular, we have evaluated the activity DA-005 PR API of our Record of Processing activities (ROPA), that corresponds to the management of medical data provided via API integration by the customers that use our service, and it is recorded at the T-052-001 DPIA for DA-005 PR API.
Information confidenciality
Every user with access to the information systems must sign a "Master agreement".
It is forbidden to send confidential information to the outside, by means of material supports, or through any means of communication, including simple visualization or access, without the authorization of Management.
No collaborator must possess, for uses outside their own responsibility, any material or information owned by the Entity both now and in the future.
Users must keep for an indefinite period of time confidentiality in the aspects they know, data, files, access, passwords, documents, contracts, programs and other information , not disclosing its content to third parties either directly or indirectly. The obligation extends even after the termination of the employment or collaboration contract.
If for work reasons the employee accesses confidential information, access, and possession of the information is temporary, without granting the right to possession or copy, having to return all the material at the end of the work to be performed or at the end of the employment relationship.
Failure to comply with this obligation may constitute a crime of disclosure of secrets, foreseen in the Penal Code and entitles us to demand financial compensation from the user.
In cases where there is a change in responsibility or termination of responsibilities, ongoing and continuing confidentiality commitments and legal responsibilities will remain in effect for a defined period after the termination of the employee, contractor and third party user contract.
Information resources authorization
For the addition or deletion of information processing resources we have implemented the following guidelines:
- New information processing media require the approval of the
JD-001,JD-003orJD-007,authorizing its purpose and ensuring that it complies or can comply with all corresponding security policies and requirements, as well as the compatibility of the same in the system under the scope of the system. Once approved, the new resource is assessed for incorporation (if applicable) into theT-018-001 Infrastructure list and control plan. - Resource retirements are authorized and reviewed by Management, so that it can evaluate the consequences of such a retirement, as well as ensure that the retirement is carried out under controlled conditions. In the event that a reallocation of licenses is required for any of the information assets, it will be the
JD-003orJD-007responsibility to obtain the corresponding uninstallation code and agree on the allocation of the same. Once the de-assignment is approved, the resource is removed from the Inventory of which it was a part, as indicated above. - In addition to the compatibility of the resource,
JD-003orJD-007evaluate the possible introduction of new vulnerabilities in the system and review their effect on the entire management system and on the risk assessment, communicating the possible consequences as input information for the system review processes by Management. - Specifically, all those programs, utilities or services that may be installed or executed on an asset registered by the system must be previously authorized by
JD-003orJD-007.
Return of media
The user, in the event of the need to discard, destroy or delete to reuse any support with personal data, will have the obligation to contact the person in charge to discard these supports, guarantee their correct deletion and, where appropriate, the impossibility of recovery.
Access management
As it is described at the GP-018 Infrastructure and facilities, the access to all company's resources has been defined under a minimum access policy that restricts a user to only the least amount of access to privileged resources and permissions that are needed to perform an authorized and assigned activity or activities. The process to grant and control the remote access to the resources is explained at the SP-018-001 Remote infrastructure control access policy.
Additionally, multi-factor authentication (MFA) mechanisms are used.
Use of cryptographic controls
Sensitive information is stored encrypted in databases using the strongest algorithm supported by the server (AWS S3).
Communications between the different systems that make up the application are sent encrypted using HTTPS. In the case of this application, an SSL certificate is used for this encryption, so that the communication is encrypted and authenticated by means of TLS1.2, ECDHE_RSA with X25519 and CHACHA20_POLY1305.
Password management policy
This procedure is described at the SP-050-002 Manual of functions and obligations of the staff and communicated to the employees when they join the company through the Master agreement we provide.
We have in place the Passbolt password manager to manage all the individual and shared passwords in a secure manner. We host the manager in a secure private server with backups and strict security measures.
Physical, environmental and equipment safety.
As we have recorded at the R-002-007 Validation card 2023_005, our work is performed remotely.
The physical protection of portable devices is the responsibility of those who are initially assigned to them (see asset owners in T-018-001 Infrastructure list and control plan). Users follow the rules stipulated for this type of equipment to ensure the security of the device and the information it contains. In this regard, it has been made mandatory not to store information subject to the scope of the ISMS on the hard disks of such portable equipment, but working on the cloud.