T TeamFeePay Trust

Matriz de controles

Cada control que operamos respecto a ISO/IEC 27001:2022 (93 controles del Anexo A) e ISO/IEC 27018:2019 (controles para encargado del tratamiento de PII en la nube). Busca por ID, título o por cómo lo implementamos.

ISO/IEC 27001:2022
93 controles

Gestión de la seguridad de la información

El catálogo completo del Anexo A, agrupado por los cuatro temas de 2022: organizativos, personas, físicos, tecnológicos.

ISO/IEC 27018:2019
19 controles

Privacidad en nubes públicas (encargado del tratamiento de PII)

Extensiones de los controles para el encargado del tratamiento según 27002, más los 11 principios de protección de PII del Anexo A de 27018.

ISO/IEC 27001:2022 — Anexo A

El catálogo completo de 93 controles.

ISO/IEC 27001:2022
Matriz de controles

Organizativos

37 controles
A.5.1 Policies for information security

Information security policy and topic-specific policies are defined, approved by management, published, communicated to relevant personnel and reviewed at planned intervals.

Cómo lo implementamos

We maintain a top-level Information Security Policy plus topic-specific policies (access control, cryptography, backup, incident response, supplier security, secure development, acceptable use, BCM, data classification). Each is reviewed annually or after a significant change and is approved by the CTO.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.2 Information security roles and responsibilities

Information security roles and responsibilities are defined and allocated according to organisational needs.

Cómo lo implementamos

Security roles are documented in the ISMS. The CTO is the accountable executive; a Head of Security operates the day-to-day programme; every engineering team has a named security champion.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.3 Segregation of duties

Conflicting duties and areas of responsibility are segregated to reduce opportunities for unauthorised or unintentional modification or misuse of assets.

Cómo lo implementamos

Production deployments require approval by a second engineer. Payouts and finance operations are split between Engineering and Finance. Audit log review is performed by Security, not by the team being reviewed.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.4 Management responsibilities

Management requires all personnel to apply information security in accordance with the established policy, topic-specific policies and procedures.

Cómo lo implementamos

Every employment contract references the Information Security Policy. Performance reviews include adherence to security policies. Line managers reinforce expectations during onboarding and at least annually.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.5 Contact with authorities

Appropriate contacts with relevant authorities are maintained.

Cómo lo implementamos

We maintain documented contacts for the ICO (UK), the National Cyber Security Centre (NCSC), our card-scheme acquirer for PCI matters, and the relevant police cyber units.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.6 Contact with special interest groups

Appropriate contacts with special interest groups, security forums and professional associations are maintained.

Cómo lo implementamos

Security engineering staff hold memberships with (ISC)² and ISACA, and we subscribe to NCSC CiSP and industry ISACs for early threat intelligence.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.7 Threat intelligence

Information relating to information security threats is collected and analysed to produce threat intelligence.

Cómo lo implementamos

We ingest threat feeds from CISA KEV, NCSC, our cloud provider and our endpoint vendor. Indicators are correlated against our SIEM and reviewed weekly by the Security team.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.8 Information security in project management

Information security is integrated into project management.

Cómo lo implementamos

All new projects pass through an architecture review that includes a security checklist. Privacy-impacting projects also undergo a Data Protection Impact Assessment.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.9 Inventory of information and other associated assets

An inventory of information and other associated assets, including owners, is developed and maintained.

Cómo lo implementamos

We maintain a unified asset inventory covering services, data stores, endpoints and SaaS apps. Each asset has a named owner and classification. The inventory is reconciled monthly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.10 Acceptable use of information and other associated assets

Rules for the acceptable use and procedures for handling information and other associated assets are identified, documented and implemented.

Cómo lo implementamos

Our Acceptable Use Policy is published in the staff handbook and acknowledged on hire. It covers credentials, removable media, AI tools, BYOD and travel.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.11 Return of assets

Personnel and other interested parties return all the organisation's assets in their possession upon change or termination of their employment, contract or agreement.

Cómo lo implementamos

Joiner-Mover-Leaver process triggers asset return on day -1 of departure. Equipment is wiped and inventoried before re-issue or disposal.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.12 Classification of information

Information is classified according to its security needs based on confidentiality, integrity, availability and relevant interested party requirements.

Cómo lo implementamos

We use a four-tier classification: Public, Internal, Confidential, Restricted. Customer member data is Confidential by default; cardholder data is Restricted.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.13 Labelling of information

An appropriate set of procedures for information labelling is developed and implemented.

Cómo lo implementamos

Document templates carry the classification in the footer. Source code and infrastructure metadata are tagged with classification labels enforced by CI checks.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.14 Information transfer

Information transfer rules, procedures or agreements are in place for all types of transfer facilities within the organisation and between the organisation and other parties.

Cómo lo implementamos

Internal transfers go via encrypted, access-controlled channels (Slack EKM, Google Workspace, Drive). External transfers of customer data require encrypted channels and a DPA.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.15 Access control

Rules to control physical and logical access to information and other associated assets are established and implemented based on business and information security requirements.

Cómo lo implementamos

Access decisions follow least privilege and need-to-know, enforced through role-based access via our identity provider. Access changes are logged and reviewed quarterly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.16 Identity management

The full life cycle of identities is managed.

Cómo lo implementamos

Every user has a single Azure AD identity provisioned by HR. Identities are deprovisioned within 1 hour of offboarding via SCIM. No shared accounts; service accounts are non-interactive.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.17 Authentication information

Allocation and management of authentication information is controlled by a management process, including advising personnel on appropriate handling.

Cómo lo implementamos

Initial passwords are one-time only. Workforce passwords meet NIST SP 800-63B and are stored in a managed password vault. MFA is mandatory.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.18 Access rights

Access rights to information and other associated assets are provisioned, reviewed, modified and removed in accordance with the organisation's topic-specific policy on access control.

Cómo lo implementamos

Access reviews run quarterly for production systems and bi-annually for SaaS. Privileged access is reviewed monthly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.19 Information security in supplier relationships

Processes and procedures are defined and implemented to manage the information security risks associated with the use of suppliers' products or services.

Cómo lo implementamos

Suppliers are risk-tiered. Tier 1 (processes customer data) require a documented security review, DPA, sub-processor disclosure, and an annual reassessment.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.20 Addressing information security within supplier agreements

Relevant information security requirements are established and agreed with each supplier based on the type of supplier relationship.

Cómo lo implementamos

Our standard supplier contract includes the DPA, SCCs where applicable, breach notification SLAs, audit rights and sub-processor change notification.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.21 Managing information security in the ICT supply chain

Processes and procedures are defined and implemented to manage the information security risks associated with the ICT products and services supply chain.

Cómo lo implementamos

We pin and verify dependency versions, sign and verify our own artefacts, and run SCA on every build. Supply-chain advisories trigger an SLA-driven triage.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.22 Monitoring, review and change management of supplier services

The organisation regularly monitors, reviews, evaluates and manages change in supplier information security practices and service delivery.

Cómo lo implementamos

Tier 1 suppliers are reassessed annually; sub-processor changes are reviewed within 30 days; SLA breaches and incidents trigger an out-of-cycle review.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.23 Information security for use of cloud services

Processes for acquisition, use, management and exit from cloud services are established in accordance with the organisation's information security requirements.

Cómo lo implementamos

Cloud services are procured through Security review. Configuration baselines are enforced via Infrastructure-as-Code. Exit playbooks exist for every Tier 1 cloud service.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.24 Information security incident management planning and preparation

The organisation plans and prepares for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.

Cómo lo implementamos

Our Incident Response Plan defines severities, roles, comms templates and external SLAs. Tabletop exercises run quarterly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.25 Assessment and decision on information security events

The organisation assesses information security events and decides if they are to be categorised as information security incidents.

Cómo lo implementamos

Events flow into a single triage queue with documented severity criteria. The on-call Security engineer triages within 15 minutes during business hours, 1 hour out of hours.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.26 Response to information security incidents

Information security incidents are responded to in accordance with the documented procedures.

Cómo lo implementamos

Severity-1 incidents convene a bridge call within 15 minutes. We follow a Contain → Eradicate → Recover → Communicate workflow. Customer comms happen within 72 hours per UK GDPR Art. 33.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.27 Learning from information security incidents

Knowledge gained from information security incidents is used to strengthen and improve the information security controls.

Cómo lo implementamos

Every Sev-1 and Sev-2 incident has a blameless post-incident review within 14 days. Action items are tracked to completion in the ISMS register.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.28 Collection of evidence

The organisation establishes and implements procedures for the identification, collection, acquisition and preservation of evidence related to information security events.

Cómo lo implementamos

Audit logs are tamper-evident and retained for 1 year hot, 7 years cold. Forensic acquisition follows ACPO good-practice guidance.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.29 Information security during disruption

The organisation plans how to maintain information security at an appropriate level during disruption.

Cómo lo implementamos

Our Business Continuity Plan defines security controls that must remain active during disruption (logging, access control, encryption). DR runbooks are tested quarterly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.30 ICT readiness for business continuity

ICT readiness is planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.

Cómo lo implementamos

Production runs across multiple Availability Zones with automated failover. RPO 1h, RTO 4h. Quarterly restore tests are documented in the ISMS.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.31 Legal, statutory, regulatory and contractual requirements

Legal, statutory, regulatory and contractual requirements relevant to information security and the organisation's approach to meet these requirements are identified, documented and kept up to date.

Cómo lo implementamos

We maintain a compliance register covering UK GDPR, DPA 2018, PCI DSS, ICO guidance, and country-specific FA / sport governing-body requirements.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.32 Intellectual property rights

The organisation implements appropriate procedures to protect intellectual property rights.

Cómo lo implementamos

Open-source dependencies are licence-scanned by SCA. Contributor agreements are required for OSS contributions. Customer-owned content remains the property of the customer.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.33 Protection of records

Records are protected from loss, destruction, falsification, unauthorised access and unauthorised release.

Cómo lo implementamos

Financial and audit records are stored in WORM (write-once-read-many) storage with documented retention. Access is logged and limited to Finance and Audit roles.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.34 Privacy and protection of PII

The organisation identifies and meets the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.

Cómo lo implementamos

ISO/IEC 27018 governs how we handle PII in cloud environments. Our Privacy Notice and DPA describe controller and processor responsibilities.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.35 Independent review of information security

The organisation's approach to managing information security and its implementation is reviewed independently at planned intervals or when significant changes occur.

Cómo lo implementamos

Independent review is performed annually by our external auditor (NQA). Internal audit performs interim reviews on a rolling 12-month cycle.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.36 Compliance with policies, rules and standards for information security

Compliance with the organisation's information security policy, topic-specific policies, rules and standards is regularly reviewed.

Cómo lo implementamos

Automated compliance checks run continuously against our infrastructure. Manual policy adherence is audited at least annually.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.5.37 Documented operating procedures

Operating procedures for information processing facilities are documented and made available to personnel who need them.

Cómo lo implementamos

Runbooks live in our internal docs system alongside the code. They are linked from monitoring alerts and reviewed when the underlying system changes.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado

Personas

8 controles
A.6.1 Screening

Background verification checks on all candidates for employment are carried out prior to joining the organisation and on an ongoing basis taking into consideration applicable laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed and the perceived risks.

Cómo lo implementamos

All new hires undergo right-to-work, identity, criminal-record (BS 7858 standard) and reference checks before access is provisioned. Higher-trust roles require enhanced DBS.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.2 Terms and conditions of employment

The employment contractual agreements state the personnel's and the organisation's responsibilities for information security.

Cómo lo implementamos

Every contract includes confidentiality, IP assignment and obligations to comply with the Information Security Policy. Failure to comply is grounds for disciplinary action.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.3 Information security awareness, education and training

Personnel of the organisation and relevant interested parties receive appropriate information security awareness, education and training and regular updates of the organisation's information security policy, topic-specific policies and procedures, as relevant for their job function.

Cómo lo implementamos

All staff complete onboarding security training within 7 days and annual refresher training. Engineers receive role-specific secure-coding training. Phishing simulations run monthly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.4 Disciplinary process

A disciplinary process is formalised and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.

Cómo lo implementamos

Security-related disciplinary actions follow the People team's documented procedure with HR and Legal review. Sanctions range from formal warning to termination and referral to law enforcement.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.5 Responsibilities after termination or change of employment

Information security responsibilities and duties that remain valid after termination or change of employment are defined, enforced and communicated to relevant personnel and other interested parties.

Cómo lo implementamos

Exit briefings cover ongoing confidentiality, IP and non-solicit obligations. We retain audit-log evidence for 7 years post-departure.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.6 Confidentiality or non-disclosure agreements

Confidentiality or non-disclosure agreements reflecting the organisation's needs for the protection of information are identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.

Cómo lo implementamos

Mutual NDAs are signed before sharing any non-public security or product information with external parties. Internal NDAs are part of employment.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.7 Remote working

Security measures are implemented when personnel are working remotely to protect information accessed, processed or stored outside the organisation's premises.

Cómo lo implementamos

Remote working baseline: managed device, full-disk encryption, MDM-enforced screen lock, VPN/Zero-Trust access, no public-Wi-Fi without VPN, secure home-office guidance.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.6.8 Information security event reporting

The organisation provides a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.

Cómo lo implementamos

All staff can report incidents via #security-incidents in Slack, security@teamfeepay.com, or an anonymous form. Reports are acknowledged within one business hour.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado

Físicos

14 controles
A.7.1 Physical security perimeters

Security perimeters are defined and used to protect areas that contain information and other associated assets.

Cómo lo implementamos

We operate a cloud-hosted service — production data centres are AWS regions in the UK and EU, with documented physical security audited under ISO 27001 and SOC 2.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.2 Physical entry

Secure areas are protected by appropriate entry controls and access points.

Cómo lo implementamos

Office access requires badge + photo ID. Visitors are escorted and logged. The AWS facilities we rely on use multi-factor physical access controls.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.3 Securing offices, rooms and facilities

Physical security for offices, rooms and facilities is designed and implemented.

Cómo lo implementamos

Sensitive meetings happen in dedicated rooms with no recording. Server rooms (where they exist) require a separate badge group.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.4 Physical security monitoring

Premises are continuously monitored for unauthorised physical access.

Cómo lo implementamos

Our offices have CCTV at all entry points with 30-day retention. Out-of-hours access is alerted to Security on-call.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.5 Protecting against physical and environmental threats

Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure, is designed and implemented.

Cómo lo implementamos

Our DR strategy uses two physically separate cloud regions. Production data has no single-site dependency.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.6 Working in secure areas

Security measures for working in secure areas are designed and implemented.

Cómo lo implementamos

Secure-area working procedures cover clean desks, restricted devices and visitor escorting.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.7 Clear desk and clear screen

Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities are defined and appropriately enforced.

Cómo lo implementamos

Devices auto-lock within 5 minutes of inactivity (enforced by MDM). Confidential paper output is shredded; we maintain a clear-desk policy.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.8 Equipment siting and protection

Equipment is sited securely and protected.

Cómo lo implementamos

Workstations are not visible from public-facing windows. Removable media is prohibited on production endpoints.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.9 Security of assets off-premises

Off-site assets are protected.

Cómo lo implementamos

Off-site equipment (laptops, phones) is enrolled in MDM, encrypted at rest, with remote wipe capability.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.10 Storage media

Storage media is managed through its life cycle of acquisition, use, transportation and disposal in accordance with the organisation's classification scheme and handling requirements.

Cómo lo implementamos

Removable media is banned on managed endpoints. Cloud-backed encrypted storage replaces all USB use cases.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.11 Supporting utilities

Information processing facilities are protected from power failures and other disruptions caused by failures in supporting utilities.

Cómo lo implementamos

We rely on AWS facilities with N+1 power, multiple ISPs and standby generators. Our offices have UPS-protected network closets.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.12 Cabling security

Cables carrying power, data or supporting information services are protected from interception, interference or damage.

Cómo lo implementamos

Office cabling is routed through protected containment. Inter-site connectivity uses encrypted tunnels regardless of carrier.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.13 Equipment maintenance

Equipment is maintained correctly to ensure availability, integrity and confidentiality of information.

Cómo lo implementamos

Endpoint maintenance is delivered through MDM. Cloud infrastructure maintenance is performed by our cloud provider under SLA.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.7.14 Secure disposal or re-use of equipment

Items of equipment containing storage media are verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.

Cómo lo implementamos

Endpoints are wiped to NIST SP 800-88 standards before reissue or disposal. Cloud-managed storage is cryptographically erased on decommission.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado

Tecnológicos

34 controles
A.8.1 User endpoint devices

Information stored on, processed by or accessible via user endpoint devices is protected.

Cómo lo implementamos

All endpoints are MDM-managed, full-disk-encrypted (FileVault/BitLocker), with EDR, screen-lock and remote-wipe enforced.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.2 Privileged access rights

The allocation and use of privileged access rights is restricted and managed.

Cómo lo implementamos

Privileged access is JIT — engineers request elevated access through an approval workflow; access is time-bound and logged.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.3 Information access restriction

Access to information and other associated assets is restricted in accordance with the established topic-specific policy on access control.

Cómo lo implementamos

Application-level access is enforced by RBAC and ABAC. Database access to customer data is restricted to a small named group and logged.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.4 Access to source code

Read and write access to source code, development tools and software libraries is appropriately managed.

Cómo lo implementamos

Source code lives in a managed Git provider. Production-deploying repos require branch protection, code review and signed commits.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.5 Secure authentication

Secure authentication technologies and procedures are implemented based on information access restrictions and the topic-specific policy on access control.

Cómo lo implementamos

Workforce authentication is SSO via Azure AD with phishing-resistant MFA. Customer-facing authentication supports MFA and (for Business plans) SAML/OIDC SSO.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.6 Capacity management

The use of resources is monitored and adjusted in line with current and expected capacity requirements.

Cómo lo implementamos

Capacity is tracked per service with alerts at 70% and 85%. Autoscaling handles transient load; quarterly capacity planning handles trend growth.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.7 Protection against malware

Protection against malware is implemented and supported by appropriate user awareness.

Cómo lo implementamos

Managed EDR runs on every endpoint and inbound email scans for malware. Production hosts are immutable and rebuilt rather than patched in place.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.8 Management of technical vulnerabilities

Information about technical vulnerabilities of information systems in use is obtained, the organisation's exposure to such vulnerabilities is evaluated and appropriate measures are taken.

Cómo lo implementamos

Critical CVEs are patched within 7 days, high within 30, others on a rolling cadence. SCA and SAST run on every build; DAST runs nightly against staging.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.9 Configuration management

Configurations, including security configurations, of hardware, software, services and networks are established, documented, implemented, monitored and reviewed.

Cómo lo implementamos

Production configuration is declared in Terraform and Kubernetes manifests with drift detection. Endpoints are baselined to CIS Level 1 via MDM.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.10 Information deletion

Information stored in information systems, devices or any other storage media is deleted when no longer required.

Cómo lo implementamos

Customer accounts are deleted 30 days after cancellation. Backups are purged on a 90-day rolling window. Deletion is logged and verifiable.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.11 Data masking

Data masking is used in accordance with the organisation's topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.

Cómo lo implementamos

Non-production environments are seeded with anonymised data. Where production data is required for support, just-in-time access is logged and time-boxed.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.12 Data leakage prevention

Data leakage prevention measures are applied to systems, networks and any other devices that process, store or transmit sensitive information.

Cómo lo implementamos

DLP rules monitor email and SaaS for sensitive data egress. Endpoint controls prevent removable-media writes. Cloud storage is bucket-level locked-down.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.13 Information backup

Backup copies of information, software and systems are maintained and regularly tested in accordance with the agreed topic-specific policy on backup.

Cómo lo implementamos

Production data has continuous point-in-time backup for 14 days and daily snapshots retained for 35 days. Restore tests run quarterly.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.14 Redundancy of information processing facilities

Information processing facilities are implemented with redundancy sufficient to meet availability requirements.

Cómo lo implementamos

Multi-AZ deployment for stateful workloads; multi-region failover for the control plane. Targets: RPO 1h, RTO 4h.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.15 Logging

Logs that record activities, exceptions, faults and other relevant events are produced, stored, protected and analysed.

Cómo lo implementamos

Application, system and network logs ship to a central SIEM with tamper-evident storage. Retention is 1 year hot, 7 years cold.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.16 Monitoring activities

Networks, systems and applications are monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.

Cómo lo implementamos

Detection rules run continuously in the SIEM and EDR. Alerts page the on-call Security engineer 24/7 with documented response SLAs.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.17 Clock synchronisation

The clocks of information processing systems used by the organisation are synchronised to approved time sources.

Cómo lo implementamos

All systems sync to time.aws.com and time.cloudflare.com via NTP. Drift is alerted at 1 second.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.18 Use of privileged utility programs

The use of utility programs that can be capable of overriding system and application controls is restricted and tightly controlled.

Cómo lo implementamos

Privileged utilities (database shells, deploy scripts) require JIT access, two-person approval for destructive commands and immutable session logs.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.19 Installation of software on operational systems

Procedures and measures are implemented to securely manage software installation on operational systems.

Cómo lo implementamos

Production hosts are immutable; software changes flow through CI/CD with code review and automated tests. Endpoint software is managed via MDM allow-listing.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.20 Networks security

Networks and network devices are secured, managed and controlled to protect information in systems and applications.

Cómo lo implementamos

Production networks default-deny. Ingress flows through a WAF and DDoS scrubber. East-west traffic is mTLS where supported.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.21 Security of network services

Security mechanisms, service levels and service requirements of network services are identified, implemented and monitored.

Cómo lo implementamos

Network services are sourced from tier-1 providers under documented SLAs. Security characteristics are reviewed at supplier onboarding and annually.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.22 Segregation of networks

Groups of information services, users and information systems are segregated in the organisation's networks.

Cómo lo implementamos

Production, staging and corporate networks are fully segregated. Workloads are segmented by service with explicit allow-lists.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.23 Web filtering

Access to external websites is managed to reduce exposure to malicious content.

Cómo lo implementamos

Endpoint DNS is filtered through a managed secure DNS provider. Categories like malware, phishing and high-risk are blocked by default.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.24 Use of cryptography

Rules for the effective use of cryptography, including cryptographic key management, are defined and implemented.

Cómo lo implementamos

TLS 1.2+ in transit; AES-256 at rest. Keys are held in a managed KMS with annual rotation and dual-control for backup keys.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.25 Secure development life cycle

Rules for the secure development of software and systems are established and applied.

Cómo lo implementamos

We follow a documented SDLC aligned to OWASP SAMM Level 2 — threat modelling on new designs, code review, SAST/SCA, DAST, and dependency policy gates.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.26 Application security requirements

Information security requirements are identified, specified and approved when developing or acquiring applications.

Cómo lo implementamos

Every product epic begins with documented security requirements derived from the threat model, OWASP ASVS and PCI DSS where applicable.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.27 Secure system architecture and engineering principles

Principles for engineering secure systems are established, documented, maintained and applied to any information system development activities.

Cómo lo implementamos

Engineering follows documented principles: zero-trust, defence in depth, secure by default, fail closed, minimise blast radius, and explicit identity for every actor.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.28 Secure coding

Secure coding principles are applied to software development.

Cómo lo implementamos

Coding standards mandate parameterised queries, output encoding, dependency pinning, secrets via the vault, and review for any custom crypto.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.29 Security testing in development and acceptance

Security testing processes are defined and implemented in the development life cycle.

Cómo lo implementamos

SAST and SCA run on every PR. DAST runs nightly against staging. Penetration testing runs annually plus on significant change.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.30 Outsourced development

The organisation directs, monitors and reviews the activities related to outsourced system development.

Cómo lo implementamos

Outsourced development goes through the same SDLC gates and code review as internal work. Outsourcers sign confidentiality and IP-assignment agreements.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.31 Separation of development, test and production environments

Development, testing and production environments are separated and secured.

Cómo lo implementamos

Production has its own cloud account, identity boundary and network. Customer data does not flow into non-production environments.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.32 Change management

Changes to information processing facilities and information systems are subject to change management procedures.

Cómo lo implementamos

All production changes go through pull-request review, automated tests and a documented deployment workflow. Emergency changes have a post-deploy review.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.33 Test information

Test information is appropriately selected, protected and managed.

Cómo lo implementamos

Non-production environments use synthetic or anonymised data. Where real data is necessary, it is masked and access is logged.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado
A.8.34 Protection of information systems during audit testing

Audit tests and other assurance activities involving assessment of operational systems are planned and agreed between the tester and appropriate management.

Cómo lo implementamos

Audit and assessment activities are pre-agreed, scoped and use read-only access by default. Any destructive testing happens in dedicated environments.

Responsable: Head of Security Revisado el 11 de abril de 2026
Implementado

ISO/IEC 27018:2019 — protección de PII en nubes públicas

Extensiones de control específicas para el encargado del tratamiento, más los once principios de protección de PII del Anexo A.

ISO/IEC 27018:2019
Matriz de controles

Extensiones PII / encargado en la nube

8 controles
27018-9 Access control for PII

Access to PII is restricted to authorised personnel, individually attributable, and reviewed at intervals appropriate to the sensitivity of the data.

Cómo lo implementamos

Access to customer PII requires JIT elevation through an approved workflow; no shared accounts touch PII; access is reviewed quarterly.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-10 Cryptography of PII

PII transmitted over public networks is protected by cryptography. Keys used to protect PII are managed under documented procedures.

Cómo lo implementamos

All customer PII in transit uses TLS 1.2+; at rest uses AES-256 with keys held in a managed KMS with documented rotation and access logging.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-11 Physical and environmental security for PII

Physical access to facilities processing PII is restricted to authorised personnel and is audited.

Cómo lo implementamos

Production PII is processed only in tier-1 cloud facilities (UK/EU regions) whose physical controls are independently audited under ISO 27001 / SOC 2.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-12 Operations security and PII

Logs of activities affecting PII are maintained, protected and reviewable on request.

Cómo lo implementamos

All access to customer PII generates an audit event captured by our SIEM. Logs are tamper-evident and retained for at least 1 year.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-13 Communications security for PII

Transfers of PII between systems and to PII controllers are encrypted and authenticated.

Cómo lo implementamos

PII transfers to or from customers occur via authenticated, encrypted APIs. PII is never transferred to a third party except an approved sub-processor under DPA.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-15 Supplier relationships involving PII

Sub-processors that process PII are bound by equivalent or stricter PII-protection obligations and are disclosed to the PII controller.

Cómo lo implementamos

Sub-processors are listed on this Trust Centre. New or replaced sub-processors are announced with 30 days notice to allow controllers to object.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-16 Incident management involving PII

Incidents affecting PII are reported to the PII controller within agreed timescales and include sufficient information for the controller to fulfil its own obligations.

Cómo lo implementamos

Confirmed PII incidents are reported to affected customers within 72 hours, in line with UK GDPR Article 33, with the information required for them to notify their data subjects.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-18 Compliance and PII

The processor identifies the legal and regulatory obligations applicable to PII it processes and demonstrates compliance.

Cómo lo implementamos

We maintain a compliance register covering UK GDPR, DPA 2018, ICO codes of practice, and customer DPAs. Compliance is reviewed annually and on regulatory change.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado

Principios de protección de PII

11 controles
27018-A.1 Consent and choice

The PII processor processes PII only on documented instructions from the PII controller; the processor does not use PII for any other purpose without controller authorisation.

Cómo lo implementamos

We act on documented controller instructions only. We do not use customer PII for marketing, profiling, training models or any purpose outside the contracted service.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.2 Purpose legitimacy and specification

PII is processed only for the purposes specified by the PII controller.

Cómo lo implementamos

Our DPA enumerates the purposes for which we process PII. Any new purpose requires written controller instruction.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.3 Collection limitation

The processor does not collect PII beyond what is necessary for the processing instructed by the controller.

Cómo lo implementamos

We collect only what the customer's use of the platform requires. Optional fields are clearly marked as optional in the product and the API.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.4 Data minimisation

Temporary files and outputs that include PII are minimised and the PII is erased as soon as it is no longer needed.

Cómo lo implementamos

Temporary files containing PII are written to ephemeral, encrypted volumes and erased on job completion. Diagnostic dumps are scrubbed of PII.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.5 Use, retention and disclosure limitation

PII is retained no longer than necessary for the agreed purpose and is not disclosed except as instructed by the controller or required by law.

Cómo lo implementamos

Retention defaults are documented per data type and overrideable by the controller. Disclosure to authorities is permitted only with legal compulsion and, where lawful, with prior notice to the controller.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.6 Accuracy and quality

Tools exist for the controller to keep PII accurate, complete and up to date.

Cómo lo implementamos

Admin tooling lets controllers (club administrators) correct PII directly. API endpoints provide the same capability programmatically.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.7 Openness, transparency and notice

The processor provides clear information about its PII handling practices, including sub-processors.

Cómo lo implementamos

This Trust Centre and our DPA describe how we handle PII, the sub-processors we use, the regions in which we process, and our retention defaults.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.8 Individual participation and access

The processor supports the controller in fulfilling data subject rights, including access, correction and erasure.

Cómo lo implementamos

Controllers can fulfil access, correction and erasure requests directly via the admin console. Where they need our help, we respond within 30 days of a written request.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.9 Accountability

The processor demonstrates accountability for its PII obligations through evidence, audits and breach notification.

Cómo lo implementamos

Accountability is demonstrated through ISO/IEC 27001 + 27018 certification, independent pen-testing, audit logs, and our published incident-response SLAs.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.10 Information security

The processor implements appropriate technical and organisational measures to protect PII against unauthorised access, alteration, disclosure or destruction.

Cómo lo implementamos

Our ISO 27001-aligned ISMS, encryption-in-transit-and-at-rest, key management, JIT access, EDR, SIEM monitoring and quarterly DR testing all serve this control.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado
27018-A.11 Privacy compliance

The processor demonstrates compliance with applicable PII protection legislation and regulation in the jurisdictions where PII is processed.

Cómo lo implementamos

PII is processed only in UK and EU regions. Where transfers occur outside the UK/EEA, we rely on UK and EU SCCs and supplementary measures, documented per transfer.

Responsable: DPO Revisado el 11 de abril de 2026
Implementado