ISO 27001 Aligned

Security Whitepaper

Our commitment to protecting your information. This document outlines our security practices, controls, and compliance measures.

Key Security Measures

End-to-end encryption for data in transit (TLS 1.3)
Encryption at rest for all stored data (AES-256)
Multi-factor authentication for all administrative access
Regular vulnerability scanning and penetration testing
Employee security awareness training
Access control based on least privilege principle
Continuous monitoring and logging of security events
Annual third-party security audits
🔒

Information Security Management

Our information security management system (ISMS) is designed and operated in alignment with ISO/IEC 27001:2022 requirements.

We maintain comprehensive security policies covering all aspects of information handling, from data classification to incident response.

Regular security assessments and penetration testing ensure our controls remain effective against evolving threats.

📋

Data Protection & GDPR Compliance

As a UK-based consultancy, we fully comply with the UK GDPR and Data Protection Act 2018.

We process personal data lawfully, fairly, and transparently, collecting only what is necessary for our legitimate business purposes.

Data subjects have full rights over their personal data, including access, rectification, erasure, and portability.

We maintain detailed records of processing activities and conduct regular data protection impact assessments.

ISO 27001 Alignment

Our security controls are aligned with Annex A of ISO/IEC 27001:2022, covering all 93 controls across organisational, people, physical, and technological domains.

We maintain a comprehensive Statement of Applicability documenting our control implementation status.

Internal audits are conducted annually to verify ongoing compliance and identify improvement opportunities.

🤝

Third-Party Security

All suppliers and partners undergo security assessment before engagement.

We maintain vendor risk management processes to monitor ongoing supplier security posture.

Contractual arrangements include appropriate security requirements and data processing agreements.

🚨

Incident Response

We maintain a documented incident response plan with clear escalation procedures.

Security incidents are reported, investigated, and resolved in accordance with regulatory timeframes.

Post-incident reviews drive continuous improvement of our security controls.

🔄

Business Continuity

Business continuity and disaster recovery plans ensure service availability.

Critical systems and data are regularly backed up with tested restoration procedures.

Our cloud infrastructure provides resilience through geographic redundancy.

Security Questions?

For security-related inquiries or to request our full security documentation, please contact us.