T TeamFeePay Trust

ISO/IEC 27001:2022

NQA

Attivo

Information security management system standard, certified annually with surveillance audits.

Certificato
IS-7732491
Emesso
11 maggio 2025
Scade
11 maggio 2028

Ambito della certificazione

All operations of TeamFeePay relating to the design, development, hosting and support of its grassroots football club management platform.

Matrice dei controlli

Ogni controllo che operiamo rispetto a questo standard, con la nostra dichiarazione di implementazione.

ISO/IEC 27001:2022
Matrice dei controlli

Organizzativi

37 controlli
A.5.1 Policies for information security

Information security policy and topic-specific policies are defined, approved by management, published, communicated to relevant personnel and reviewed at planned intervals.

Come lo implementiamo

We maintain a top-level Information Security Policy plus topic-specific policies (access control, cryptography, backup, incident response, supplier security, secure development, acceptable use, BCM, data classification). Each is reviewed annually or after a significant change and is approved by the CTO.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.2 Information security roles and responsibilities

Information security roles and responsibilities are defined and allocated according to organisational needs.

Come lo implementiamo

Security roles are documented in the ISMS. The CTO is the accountable executive; a Head of Security operates the day-to-day programme; every engineering team has a named security champion.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.3 Segregation of duties

Conflicting duties and areas of responsibility are segregated to reduce opportunities for unauthorised or unintentional modification or misuse of assets.

Come lo implementiamo

Production deployments require approval by a second engineer. Payouts and finance operations are split between Engineering and Finance. Audit log review is performed by Security, not by the team being reviewed.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.4 Management responsibilities

Management requires all personnel to apply information security in accordance with the established policy, topic-specific policies and procedures.

Come lo implementiamo

Every employment contract references the Information Security Policy. Performance reviews include adherence to security policies. Line managers reinforce expectations during onboarding and at least annually.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.5 Contact with authorities

Appropriate contacts with relevant authorities are maintained.

Come lo implementiamo

We maintain documented contacts for the ICO (UK), the National Cyber Security Centre (NCSC), our card-scheme acquirer for PCI matters, and the relevant police cyber units.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.6 Contact with special interest groups

Appropriate contacts with special interest groups, security forums and professional associations are maintained.

Come lo implementiamo

Security engineering staff hold memberships with (ISC)² and ISACA, and we subscribe to NCSC CiSP and industry ISACs for early threat intelligence.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.7 Threat intelligence

Information relating to information security threats is collected and analysed to produce threat intelligence.

Come lo implementiamo

We ingest threat feeds from CISA KEV, NCSC, our cloud provider and our endpoint vendor. Indicators are correlated against our SIEM and reviewed weekly by the Security team.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.8 Information security in project management

Information security is integrated into project management.

Come lo implementiamo

All new projects pass through an architecture review that includes a security checklist. Privacy-impacting projects also undergo a Data Protection Impact Assessment.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.9 Inventory of information and other associated assets

An inventory of information and other associated assets, including owners, is developed and maintained.

Come lo implementiamo

We maintain a unified asset inventory covering services, data stores, endpoints and SaaS apps. Each asset has a named owner and classification. The inventory is reconciled monthly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.10 Acceptable use of information and other associated assets

Rules for the acceptable use and procedures for handling information and other associated assets are identified, documented and implemented.

Come lo implementiamo

Our Acceptable Use Policy is published in the staff handbook and acknowledged on hire. It covers credentials, removable media, AI tools, BYOD and travel.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.11 Return of assets

Personnel and other interested parties return all the organisation's assets in their possession upon change or termination of their employment, contract or agreement.

Come lo implementiamo

Joiner-Mover-Leaver process triggers asset return on day -1 of departure. Equipment is wiped and inventoried before re-issue or disposal.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.12 Classification of information

Information is classified according to its security needs based on confidentiality, integrity, availability and relevant interested party requirements.

Come lo implementiamo

We use a four-tier classification: Public, Internal, Confidential, Restricted. Customer member data is Confidential by default; cardholder data is Restricted.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.13 Labelling of information

An appropriate set of procedures for information labelling is developed and implemented.

Come lo implementiamo

Document templates carry the classification in the footer. Source code and infrastructure metadata are tagged with classification labels enforced by CI checks.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.14 Information transfer

Information transfer rules, procedures or agreements are in place for all types of transfer facilities within the organisation and between the organisation and other parties.

Come lo implementiamo

Internal transfers go via encrypted, access-controlled channels (Slack EKM, Google Workspace, Drive). External transfers of customer data require encrypted channels and a DPA.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.15 Access control

Rules to control physical and logical access to information and other associated assets are established and implemented based on business and information security requirements.

Come lo implementiamo

Access decisions follow least privilege and need-to-know, enforced through role-based access via our identity provider. Access changes are logged and reviewed quarterly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.16 Identity management

The full life cycle of identities is managed.

Come lo implementiamo

Every user has a single Azure AD identity provisioned by HR. Identities are deprovisioned within 1 hour of offboarding via SCIM. No shared accounts; service accounts are non-interactive.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.17 Authentication information

Allocation and management of authentication information is controlled by a management process, including advising personnel on appropriate handling.

Come lo implementiamo

Initial passwords are one-time only. Workforce passwords meet NIST SP 800-63B and are stored in a managed password vault. MFA is mandatory.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.18 Access rights

Access rights to information and other associated assets are provisioned, reviewed, modified and removed in accordance with the organisation's topic-specific policy on access control.

Come lo implementiamo

Access reviews run quarterly for production systems and bi-annually for SaaS. Privileged access is reviewed monthly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.19 Information security in supplier relationships

Processes and procedures are defined and implemented to manage the information security risks associated with the use of suppliers' products or services.

Come lo implementiamo

Suppliers are risk-tiered. Tier 1 (processes customer data) require a documented security review, DPA, sub-processor disclosure, and an annual reassessment.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.20 Addressing information security within supplier agreements

Relevant information security requirements are established and agreed with each supplier based on the type of supplier relationship.

Come lo implementiamo

Our standard supplier contract includes the DPA, SCCs where applicable, breach notification SLAs, audit rights and sub-processor change notification.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.21 Managing information security in the ICT supply chain

Processes and procedures are defined and implemented to manage the information security risks associated with the ICT products and services supply chain.

Come lo implementiamo

We pin and verify dependency versions, sign and verify our own artefacts, and run SCA on every build. Supply-chain advisories trigger an SLA-driven triage.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.22 Monitoring, review and change management of supplier services

The organisation regularly monitors, reviews, evaluates and manages change in supplier information security practices and service delivery.

Come lo implementiamo

Tier 1 suppliers are reassessed annually; sub-processor changes are reviewed within 30 days; SLA breaches and incidents trigger an out-of-cycle review.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.23 Information security for use of cloud services

Processes for acquisition, use, management and exit from cloud services are established in accordance with the organisation's information security requirements.

Come lo implementiamo

Cloud services are procured through Security review. Configuration baselines are enforced via Infrastructure-as-Code. Exit playbooks exist for every Tier 1 cloud service.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.24 Information security incident management planning and preparation

The organisation plans and prepares for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.

Come lo implementiamo

Our Incident Response Plan defines severities, roles, comms templates and external SLAs. Tabletop exercises run quarterly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.25 Assessment and decision on information security events

The organisation assesses information security events and decides if they are to be categorised as information security incidents.

Come lo implementiamo

Events flow into a single triage queue with documented severity criteria. The on-call Security engineer triages within 15 minutes during business hours, 1 hour out of hours.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.26 Response to information security incidents

Information security incidents are responded to in accordance with the documented procedures.

Come lo implementiamo

Severity-1 incidents convene a bridge call within 15 minutes. We follow a Contain → Eradicate → Recover → Communicate workflow. Customer comms happen within 72 hours per UK GDPR Art. 33.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.27 Learning from information security incidents

Knowledge gained from information security incidents is used to strengthen and improve the information security controls.

Come lo implementiamo

Every Sev-1 and Sev-2 incident has a blameless post-incident review within 14 days. Action items are tracked to completion in the ISMS register.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.28 Collection of evidence

The organisation establishes and implements procedures for the identification, collection, acquisition and preservation of evidence related to information security events.

Come lo implementiamo

Audit logs are tamper-evident and retained for 1 year hot, 7 years cold. Forensic acquisition follows ACPO good-practice guidance.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.29 Information security during disruption

The organisation plans how to maintain information security at an appropriate level during disruption.

Come lo implementiamo

Our Business Continuity Plan defines security controls that must remain active during disruption (logging, access control, encryption). DR runbooks are tested quarterly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.30 ICT readiness for business continuity

ICT readiness is planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.

Come lo implementiamo

Production runs across multiple Availability Zones with automated failover. RPO 1h, RTO 4h. Quarterly restore tests are documented in the ISMS.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.31 Legal, statutory, regulatory and contractual requirements

Legal, statutory, regulatory and contractual requirements relevant to information security and the organisation's approach to meet these requirements are identified, documented and kept up to date.

Come lo implementiamo

We maintain a compliance register covering UK GDPR, DPA 2018, PCI DSS, ICO guidance, and country-specific FA / sport governing-body requirements.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.32 Intellectual property rights

The organisation implements appropriate procedures to protect intellectual property rights.

Come lo implementiamo

Open-source dependencies are licence-scanned by SCA. Contributor agreements are required for OSS contributions. Customer-owned content remains the property of the customer.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.33 Protection of records

Records are protected from loss, destruction, falsification, unauthorised access and unauthorised release.

Come lo implementiamo

Financial and audit records are stored in WORM (write-once-read-many) storage with documented retention. Access is logged and limited to Finance and Audit roles.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.34 Privacy and protection of PII

The organisation identifies and meets the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.

Come lo implementiamo

ISO/IEC 27018 governs how we handle PII in cloud environments. Our Privacy Notice and DPA describe controller and processor responsibilities.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.35 Independent review of information security

The organisation's approach to managing information security and its implementation is reviewed independently at planned intervals or when significant changes occur.

Come lo implementiamo

Independent review is performed annually by our external auditor (NQA). Internal audit performs interim reviews on a rolling 12-month cycle.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.36 Compliance with policies, rules and standards for information security

Compliance with the organisation's information security policy, topic-specific policies, rules and standards is regularly reviewed.

Come lo implementiamo

Automated compliance checks run continuously against our infrastructure. Manual policy adherence is audited at least annually.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.5.37 Documented operating procedures

Operating procedures for information processing facilities are documented and made available to personnel who need them.

Come lo implementiamo

Runbooks live in our internal docs system alongside the code. They are linked from monitoring alerts and reviewed when the underlying system changes.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato

Persone

8 controlli
A.6.1 Screening

Background verification checks on all candidates for employment are carried out prior to joining the organisation and on an ongoing basis taking into consideration applicable laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed and the perceived risks.

Come lo implementiamo

All new hires undergo right-to-work, identity, criminal-record (BS 7858 standard) and reference checks before access is provisioned. Higher-trust roles require enhanced DBS.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.2 Terms and conditions of employment

The employment contractual agreements state the personnel's and the organisation's responsibilities for information security.

Come lo implementiamo

Every contract includes confidentiality, IP assignment and obligations to comply with the Information Security Policy. Failure to comply is grounds for disciplinary action.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.3 Information security awareness, education and training

Personnel of the organisation and relevant interested parties receive appropriate information security awareness, education and training and regular updates of the organisation's information security policy, topic-specific policies and procedures, as relevant for their job function.

Come lo implementiamo

All staff complete onboarding security training within 7 days and annual refresher training. Engineers receive role-specific secure-coding training. Phishing simulations run monthly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.4 Disciplinary process

A disciplinary process is formalised and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.

Come lo implementiamo

Security-related disciplinary actions follow the People team's documented procedure with HR and Legal review. Sanctions range from formal warning to termination and referral to law enforcement.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.5 Responsibilities after termination or change of employment

Information security responsibilities and duties that remain valid after termination or change of employment are defined, enforced and communicated to relevant personnel and other interested parties.

Come lo implementiamo

Exit briefings cover ongoing confidentiality, IP and non-solicit obligations. We retain audit-log evidence for 7 years post-departure.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.6 Confidentiality or non-disclosure agreements

Confidentiality or non-disclosure agreements reflecting the organisation's needs for the protection of information are identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.

Come lo implementiamo

Mutual NDAs are signed before sharing any non-public security or product information with external parties. Internal NDAs are part of employment.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.7 Remote working

Security measures are implemented when personnel are working remotely to protect information accessed, processed or stored outside the organisation's premises.

Come lo implementiamo

Remote working baseline: managed device, full-disk encryption, MDM-enforced screen lock, VPN/Zero-Trust access, no public-Wi-Fi without VPN, secure home-office guidance.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.6.8 Information security event reporting

The organisation provides a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.

Come lo implementiamo

All staff can report incidents via #security-incidents in Slack, security@teamfeepay.com, or an anonymous form. Reports are acknowledged within one business hour.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato

Fisici

14 controlli
A.7.1 Physical security perimeters

Security perimeters are defined and used to protect areas that contain information and other associated assets.

Come lo implementiamo

We operate a cloud-hosted service — production data centres are AWS regions in the UK and EU, with documented physical security audited under ISO 27001 and SOC 2.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.2 Physical entry

Secure areas are protected by appropriate entry controls and access points.

Come lo implementiamo

Office access requires badge + photo ID. Visitors are escorted and logged. The AWS facilities we rely on use multi-factor physical access controls.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.3 Securing offices, rooms and facilities

Physical security for offices, rooms and facilities is designed and implemented.

Come lo implementiamo

Sensitive meetings happen in dedicated rooms with no recording. Server rooms (where they exist) require a separate badge group.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.4 Physical security monitoring

Premises are continuously monitored for unauthorised physical access.

Come lo implementiamo

Our offices have CCTV at all entry points with 30-day retention. Out-of-hours access is alerted to Security on-call.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.5 Protecting against physical and environmental threats

Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure, is designed and implemented.

Come lo implementiamo

Our DR strategy uses two physically separate cloud regions. Production data has no single-site dependency.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.6 Working in secure areas

Security measures for working in secure areas are designed and implemented.

Come lo implementiamo

Secure-area working procedures cover clean desks, restricted devices and visitor escorting.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.7 Clear desk and clear screen

Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities are defined and appropriately enforced.

Come lo implementiamo

Devices auto-lock within 5 minutes of inactivity (enforced by MDM). Confidential paper output is shredded; we maintain a clear-desk policy.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.8 Equipment siting and protection

Equipment is sited securely and protected.

Come lo implementiamo

Workstations are not visible from public-facing windows. Removable media is prohibited on production endpoints.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.9 Security of assets off-premises

Off-site assets are protected.

Come lo implementiamo

Off-site equipment (laptops, phones) is enrolled in MDM, encrypted at rest, with remote wipe capability.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.10 Storage media

Storage media is managed through its life cycle of acquisition, use, transportation and disposal in accordance with the organisation's classification scheme and handling requirements.

Come lo implementiamo

Removable media is banned on managed endpoints. Cloud-backed encrypted storage replaces all USB use cases.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.11 Supporting utilities

Information processing facilities are protected from power failures and other disruptions caused by failures in supporting utilities.

Come lo implementiamo

We rely on AWS facilities with N+1 power, multiple ISPs and standby generators. Our offices have UPS-protected network closets.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.12 Cabling security

Cables carrying power, data or supporting information services are protected from interception, interference or damage.

Come lo implementiamo

Office cabling is routed through protected containment. Inter-site connectivity uses encrypted tunnels regardless of carrier.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.13 Equipment maintenance

Equipment is maintained correctly to ensure availability, integrity and confidentiality of information.

Come lo implementiamo

Endpoint maintenance is delivered through MDM. Cloud infrastructure maintenance is performed by our cloud provider under SLA.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.7.14 Secure disposal or re-use of equipment

Items of equipment containing storage media are verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.

Come lo implementiamo

Endpoints are wiped to NIST SP 800-88 standards before reissue or disposal. Cloud-managed storage is cryptographically erased on decommission.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato

Tecnologici

34 controlli
A.8.1 User endpoint devices

Information stored on, processed by or accessible via user endpoint devices is protected.

Come lo implementiamo

All endpoints are MDM-managed, full-disk-encrypted (FileVault/BitLocker), with EDR, screen-lock and remote-wipe enforced.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.2 Privileged access rights

The allocation and use of privileged access rights is restricted and managed.

Come lo implementiamo

Privileged access is JIT — engineers request elevated access through an approval workflow; access is time-bound and logged.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.3 Information access restriction

Access to information and other associated assets is restricted in accordance with the established topic-specific policy on access control.

Come lo implementiamo

Application-level access is enforced by RBAC and ABAC. Database access to customer data is restricted to a small named group and logged.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.4 Access to source code

Read and write access to source code, development tools and software libraries is appropriately managed.

Come lo implementiamo

Source code lives in a managed Git provider. Production-deploying repos require branch protection, code review and signed commits.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.5 Secure authentication

Secure authentication technologies and procedures are implemented based on information access restrictions and the topic-specific policy on access control.

Come lo implementiamo

Workforce authentication is SSO via Azure AD with phishing-resistant MFA. Customer-facing authentication supports MFA and (for Business plans) SAML/OIDC SSO.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.6 Capacity management

The use of resources is monitored and adjusted in line with current and expected capacity requirements.

Come lo implementiamo

Capacity is tracked per service with alerts at 70% and 85%. Autoscaling handles transient load; quarterly capacity planning handles trend growth.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.7 Protection against malware

Protection against malware is implemented and supported by appropriate user awareness.

Come lo implementiamo

Managed EDR runs on every endpoint and inbound email scans for malware. Production hosts are immutable and rebuilt rather than patched in place.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.8 Management of technical vulnerabilities

Information about technical vulnerabilities of information systems in use is obtained, the organisation's exposure to such vulnerabilities is evaluated and appropriate measures are taken.

Come lo implementiamo

Critical CVEs are patched within 7 days, high within 30, others on a rolling cadence. SCA and SAST run on every build; DAST runs nightly against staging.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.9 Configuration management

Configurations, including security configurations, of hardware, software, services and networks are established, documented, implemented, monitored and reviewed.

Come lo implementiamo

Production configuration is declared in Terraform and Kubernetes manifests with drift detection. Endpoints are baselined to CIS Level 1 via MDM.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.10 Information deletion

Information stored in information systems, devices or any other storage media is deleted when no longer required.

Come lo implementiamo

Customer accounts are deleted 30 days after cancellation. Backups are purged on a 90-day rolling window. Deletion is logged and verifiable.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.11 Data masking

Data masking is used in accordance with the organisation's topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.

Come lo implementiamo

Non-production environments are seeded with anonymised data. Where production data is required for support, just-in-time access is logged and time-boxed.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.12 Data leakage prevention

Data leakage prevention measures are applied to systems, networks and any other devices that process, store or transmit sensitive information.

Come lo implementiamo

DLP rules monitor email and SaaS for sensitive data egress. Endpoint controls prevent removable-media writes. Cloud storage is bucket-level locked-down.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.13 Information backup

Backup copies of information, software and systems are maintained and regularly tested in accordance with the agreed topic-specific policy on backup.

Come lo implementiamo

Production data has continuous point-in-time backup for 14 days and daily snapshots retained for 35 days. Restore tests run quarterly.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.14 Redundancy of information processing facilities

Information processing facilities are implemented with redundancy sufficient to meet availability requirements.

Come lo implementiamo

Multi-AZ deployment for stateful workloads; multi-region failover for the control plane. Targets: RPO 1h, RTO 4h.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.15 Logging

Logs that record activities, exceptions, faults and other relevant events are produced, stored, protected and analysed.

Come lo implementiamo

Application, system and network logs ship to a central SIEM with tamper-evident storage. Retention is 1 year hot, 7 years cold.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.16 Monitoring activities

Networks, systems and applications are monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.

Come lo implementiamo

Detection rules run continuously in the SIEM and EDR. Alerts page the on-call Security engineer 24/7 with documented response SLAs.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.17 Clock synchronisation

The clocks of information processing systems used by the organisation are synchronised to approved time sources.

Come lo implementiamo

All systems sync to time.aws.com and time.cloudflare.com via NTP. Drift is alerted at 1 second.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.18 Use of privileged utility programs

The use of utility programs that can be capable of overriding system and application controls is restricted and tightly controlled.

Come lo implementiamo

Privileged utilities (database shells, deploy scripts) require JIT access, two-person approval for destructive commands and immutable session logs.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.19 Installation of software on operational systems

Procedures and measures are implemented to securely manage software installation on operational systems.

Come lo implementiamo

Production hosts are immutable; software changes flow through CI/CD with code review and automated tests. Endpoint software is managed via MDM allow-listing.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.20 Networks security

Networks and network devices are secured, managed and controlled to protect information in systems and applications.

Come lo implementiamo

Production networks default-deny. Ingress flows through a WAF and DDoS scrubber. East-west traffic is mTLS where supported.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.21 Security of network services

Security mechanisms, service levels and service requirements of network services are identified, implemented and monitored.

Come lo implementiamo

Network services are sourced from tier-1 providers under documented SLAs. Security characteristics are reviewed at supplier onboarding and annually.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.22 Segregation of networks

Groups of information services, users and information systems are segregated in the organisation's networks.

Come lo implementiamo

Production, staging and corporate networks are fully segregated. Workloads are segmented by service with explicit allow-lists.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.23 Web filtering

Access to external websites is managed to reduce exposure to malicious content.

Come lo implementiamo

Endpoint DNS is filtered through a managed secure DNS provider. Categories like malware, phishing and high-risk are blocked by default.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.24 Use of cryptography

Rules for the effective use of cryptography, including cryptographic key management, are defined and implemented.

Come lo implementiamo

TLS 1.2+ in transit; AES-256 at rest. Keys are held in a managed KMS with annual rotation and dual-control for backup keys.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.25 Secure development life cycle

Rules for the secure development of software and systems are established and applied.

Come lo implementiamo

We follow a documented SDLC aligned to OWASP SAMM Level 2 — threat modelling on new designs, code review, SAST/SCA, DAST, and dependency policy gates.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.26 Application security requirements

Information security requirements are identified, specified and approved when developing or acquiring applications.

Come lo implementiamo

Every product epic begins with documented security requirements derived from the threat model, OWASP ASVS and PCI DSS where applicable.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.27 Secure system architecture and engineering principles

Principles for engineering secure systems are established, documented, maintained and applied to any information system development activities.

Come lo implementiamo

Engineering follows documented principles: zero-trust, defence in depth, secure by default, fail closed, minimise blast radius, and explicit identity for every actor.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.28 Secure coding

Secure coding principles are applied to software development.

Come lo implementiamo

Coding standards mandate parameterised queries, output encoding, dependency pinning, secrets via the vault, and review for any custom crypto.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.29 Security testing in development and acceptance

Security testing processes are defined and implemented in the development life cycle.

Come lo implementiamo

SAST and SCA run on every PR. DAST runs nightly against staging. Penetration testing runs annually plus on significant change.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.30 Outsourced development

The organisation directs, monitors and reviews the activities related to outsourced system development.

Come lo implementiamo

Outsourced development goes through the same SDLC gates and code review as internal work. Outsourcers sign confidentiality and IP-assignment agreements.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.31 Separation of development, test and production environments

Development, testing and production environments are separated and secured.

Come lo implementiamo

Production has its own cloud account, identity boundary and network. Customer data does not flow into non-production environments.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.32 Change management

Changes to information processing facilities and information systems are subject to change management procedures.

Come lo implementiamo

All production changes go through pull-request review, automated tests and a documented deployment workflow. Emergency changes have a post-deploy review.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.33 Test information

Test information is appropriately selected, protected and managed.

Come lo implementiamo

Non-production environments use synthetic or anonymised data. Where real data is necessary, it is masked and access is logged.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato
A.8.34 Protection of information systems during audit testing

Audit tests and other assurance activities involving assessment of operational systems are planned and agreed between the tester and appropriate management.

Come lo implementiamo

Audit and assessment activities are pre-agreed, scoped and use read-only access by default. Any destructive testing happens in dedicated environments.

Responsabile: Head of Security Revisionato il 11 aprile 2026
Implementato