NST Isms Manual v2.1
NST Isms Manual v2.1
(ISMS) Manual
ISMS Manual ~NST- Internal Page 1\72
Version History
Authored / Reviewed
Ver. Date Description of Change Approved By
Revised By By
1.0 31st Oct Initial Release Rahul Raj Dhananjay Ajay Kumar
2013 Kumar Zalpuri
1.1 3rd Dec Reviewed & hyperlink the process Rahul Raj Dhananjay Ajay Kumar
2013 Kumar Zalpuri
2.0 29th June Modify Clauses, section & controls to Rahul Raj Dhananjay Ajay Kumar
2015 meet the requirements for new version Kumar Zalpuri
of ISMS 27001:2013 and update HR
responsibilities.
2.1 29th Sep Modify clause as per audit Rahul Raj Dhananjay Ajay Kumar
2015 observation, section 4.2 & 7.4 for Kumar Zalpuri
understanding the needs of customer
and for security communication
ABBREVIATION 4
1 INTRODUCTION 5
1.0 SCOPE 5
1.1 GENERAL 5
1.2 REFERENCES 5
1.3 TERMS AND DEFINITIONS 5
3 ORGANIZATION OVERVIEW 8
5 LEADERSHIP 10
6 PLANNING 17
7 SUPPORT 20
7.1 RESOURCES 20
7.2 COMPETENCE 20
7.3 AWARENESS 20
7.4 COMMUNICATION 20
7.5 DOCUMENTED INFORMATION 21
7.5.1 General 21
8 OPERATION 24
9 PERFORMANCE EVALUATION 26
10 IMPROVEMENT 27
11 ISMS CONTROLS 29
ABBREVIATION
DESCRIPTION
ABBREVIATION
DB Database
DP Departmental Procedure
DR Disaster Recovery
ED Executive Director
HR Human Resource
IS Information Security
IT Information Technology
NC Non Conformity
RA Risk Assessment
SP Standard Procedures
VA Vulnerability Assessment
1.0 Scope
The Scope of the ISMS covers, the North Shore (P) Ltd, its Server room and its management related to
business applications, to implement the IT services provided to internal and external customers from its
office location at Logix Techno Park, Sector-127, Noida.
1.1 General
This ISMS manual specifies the requirements for establishing, implementing, monitoring, reviewing,
maintaining, and improving documented ISMS within the context of the .’ overall Business
requirements. It specifies the implementation of security controls customized to the needs of NST (P)
Ltd.
The ISMS is designed to ensure adequate and appropriate security controls that maintain
Confidentiality, Integrity and Availability (CIA) of information assets.
For applicability (with rationale) and exclusion (with justification) of controls refer Statement of
Applicability (SOA). The SOA as applicable to NST (P) Ltd is enclosed. As certain controls are not
applicable at project sites, project site specific SOA is also made.
1.2 References
The following documents were referred for the creation of this document. These include:
ISO/IEC 27001:20132013, Information technology – Security techniques – Information
security management systems – Requirements
1.3 Terms and Definitions
Asset – Anything that has a value to the organization.
Availability – The property of being accessible and useable upon demand by an authorized
entity.
Business Continuity Plan (BCP) – A plan to build-in proper redundancies and avoid
contingencies to ensure continuity of Business.
Computer Media – Includes all devices that can electronically store information. This includes
but not limited to diskettes, CD’s, tapes, cartridges, and portable hard disks.
ISMS Manual ~NST- Internal Page 7\72
Confidentiality – Ensuring that information is accessible only to those authorized to have
access.
Control Objective – A statement of intent with respect to a domain over some aspects of an
organization’s resources or processes. In terms of a management system, control objectives
provide a framework for developing a strategy for fulfilling a set of security requirements.
Disaster Recovery (DR) - A plan for the early recovery of Business operations in the event of
an incident that prevents normal operation.
Risk Evaluation – Process of comparing the estimated risk against given risk criteria to
determine the significance of the risk.
Risk Management – Coordinated activities to direct and control an organization with regard to
risk.
Statement of Applicability – Document describing the control objectives and controls that are
relevant and applicable to NST (P) Ltd ISMS, based on the results and conclusions of the Risk
Assessment and Risk Treatment Processes. It should clearly indicate exclusions with appropriate
reasons.
3 Organization Overview
This section presents an overview of the NST (P) Ltd and its operations.
NST mission is to fulfill the promise of applying technology to enable the success of customer business by
performing at a level of trust, partnership, and innovation that far exceed what you have come to expect from
technology services providers. In the same way, we know that to achieve that aspiration, we must exceed
what our professionals have come to expect from technology services employers.
a) Interested parties that are relevant to ISMS - All customers (Internal and External), Vendors,
Supporting the Infrastructure in Server Room & other Business operation, All employees providing
& getting services to Server Room & other Business operation.
b) The requirement of these interested parties relevant to Information Security The needs and
expectations from external as well as internal customers are considered as under, and will be
reviewed and updated over a period of time as part of continual improvement.
Corporate
requirements Standards, guidelines and models adopted by the organization
Server room is located at North Shore Technologies Pvt. Ltd, 1st Floor, Tower-B, Logix Techno Park,
Sector-127 | Noida
5 Leadership
This section presents the NST (P) LTD.’s initiative and commitment to effective implementation and
operation of ISMS. In addition, this section highlights the roles and responsibilities associated with ISMS
operation.
Top management shall demonstrate leadership and commitment with respect to the information
a. Ensuring the information security policy and the information security objectives are established
and are compatible with the strategic direction of the organization;
b. Ensuring the integration of the information security management system requirements into the
organization’s processes;
c. Ensuring that the resources needed for the information security management system are
available;
e. Ensuring that the information security management system achieves its intended outcome(s);
f. Directing and supporting persons to contribute to the effectiveness of the information security
management system;
NST is committed to maintain high quality standards in delivering timely and cost
effective solutions to our customers by continual improvement of our processes,
Risk management will be done as per ‘NST-CP-05-ISMS-RART-Risk Assessment & Risk Treatment
Procedure’ and the risk will be evaluated based on asset value, threat and vulnerabilities. If risk value is high,
adequate controls will be implemented.
Action Guideline:
i. NST (P) Ltd prevents leakage, destruction, and illegal use of all information relating to the
customers, vendors, management etc. and builds the system to secure the confidentiality, integrity
and availability of the information for daily operations.
ii. Company recognizes the value of the private information of all staff and secures it.
iii. NST (P) Ltd establishes a contingency plan to secure continuation of the business, assuming
occurrences of a natural disaster, terrorism, a large scale infection disease etc.
iv. Company provides all staff with proper education and training to maintain and improve the
effectiveness of the information security management system
v. Company builds and manages an organization which grasps incidents, audits its operations and
effectiveness of the information security management system, and attempts its continuous
improvement.
To secure its information assets and its customer, NST shall deploy procedures to maintain confidentiality,
integrity and availability of all information assets
3. Key Objective 3: Continual improvement of services to our internal & external customers.
Goal 1 – Key process performance improvement of at least 10% per annum in all departments
4. Key Objective 4: To secure its information assets and of its customers, NST shall deploy procedures to
maintain confidentiality, integrity and availability of all information assets.
Goal 1 – Number of security incidents of high severity to be less than 5% of total security incidents.
5. Key Objective 5: To have year on year revenue increase while maintaining profitability
Goal 1 – Revenue growth of >=40% with respect to the previous financial year
To meet these business goals, ISMS objective are defined. Which are given in section 6.2
d) Communicating to the organization the importance of meeting information security objectives and
conforming to the information security policy, its responsibilities under the law and the need for
continual improvement;
e) Providing sufficient resources to establish, implement, operate, monitor, review, maintain and
improve the ISMS;
f) Deciding the criteria for accepting risks and the acceptable level of risk;
Communicating to the organization the importance of meeting information security objectives and
conforming to the information security policy, its responsibilities under the law and the need for
continual improvement:
Providing sufficient resources to establish, implement, operate, monitor, review, maintain and
improve the ISMS.
Deciding the criteria for accepting risks and the acceptable levels of risk.
Responsible for ensuring that security incidents are handled and resolved in efficient manner.
Define specific roles and responsibilities of information security across the NST (P) LTD.
Develop and maintain Business Continuity Management Plan for the region.
Approve and review the risk treatment plan, and accept residual risk
Evaluate, implement and ensure utilization of up-to-date security technology and techniques
Ensure ISMS is in line with new legal, administrative, and business requirements
Decide specific methodologies and processes for information security. For e.g. risk assessment,
security classification system etc.
Assess new system and services for security before absorbing them into the system and identify and
implement appropriate security controls
Responsible for owning the security policy and reviewing and evaluating the same at least once in a
year.
Responsible for reviewing current implementation of policies and processes and improving them if
required
Responsible for reviewing security incidents and vulnerabilities and decide action to be taken on
them
Responsible for reviewing any kind of hacking attacks and action taken to control them
Reviewing disciplinary action taken against employee (if there is any such case)
Organize security reviews and audits, with internal and external resources
Heading IT processes
Handling virus attacks and hacking attacks and reporting them to Security Committee
Responsible for reviewing current implementation of policies and processes and improving
them if required
Responsible for reviewing any kind of hacking attacks and action taken to control them
Reviewing disciplinary action taken against employee (if there is any such case)
Managing IT resources
Incidents Reporting
Heading HR Processes
Handling employee related incidents (misconducts, policy violations and other offences) and
taking appropriate action against employees if required and reporting them to security
Committee.
Take care of Human resource security clauses prior to employment, during employment and
Termination or change of employment.
Handling employee related admin issue (misconducts, policy violations and other offences) and
taking appropriate action against employees if required and reporting them to security
Committee
Handling virus attacks and hacking attacks and reporting them to Information System Security
Committee
Ticket assignment
IMS Management
Data Backups
Helpdesk
Reports Management
Desktop Issues
VENDORS
USERS
The Security Committee will meet once every month, support and supervise the activities of the NST (P)
LTD., taking informed decisions. It will be held responsible for achieving measurable progress. Process
measurement metrics will be monitored to achieve continuous improvement.
Risk Assessment and BCP CORE TEAM (Sudhir, Vishal, Saket and Rahul)
Review, test and reassess the strategy plan to determine the overall approach to business continuity.
Responsible for reviewing security incidents and vulnerabilities and decide action to be taken on them
Identify and define plans to protect critical business process from the major failure of information
system or disasters and to ensure timely resumptions of business activity
Review, test and reassess the strategy plan to determine the overall approach to business continuity.
Responsible for reviewing security incidents and vulnerabilities and decide action to be taken on
them
In addition, the group helps reduce the risk of disruption of business operation by providing advice on all
aspects of security including:
Security Awareness
Logical Access
Data Communications
Physical Security
EMPLOYEES
Security Policy (A.5): Management direction and support for IS in accordance with business
requirements and relevant laws and regulations.
Asset Management (A.8): To appropriately classify and protect the organizational assets.
Access Control (A.9): Prevent unauthorized access to information systems, networked services,
operating systems, application systems, and ensure IS when using mobile computing and
teleworking facilities.
Physical and Environmental Security (A.11): Preventing unauthorized physical access in the
premises and loss/damage/theft of equipment’s.
Operational security (A12) Ensuring secured networks, maintaining appropriate third-party service
delivery agreements, minimize risk of systems failures, and protect software and information
integrity.
Communication Security (A13) Deals with Network communication, Information transfer and
communication with suppliers.
Systems Acquisition, Development and Maintenance (A.14): Prevent errors, loss, unauthorized
modification or misuse of information in applications, ensure security of system files and software,
and reduce risks resulting from exploitation of published technical vulnerabilities.
Compliance (A.18): Complying with legal requirements, security policy and standards.
6.1.1 General
When planning for the information security management system, NST shall consider the issues referred
to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to
be addressed to:
a) Ensure the information security management system can achieve its intended outcome(s);
b) Prevent, or reduce, undesired effects; and
c) Achieve continual improvement.
NST shall define and apply an information security risk assessment process that:
NST shall retain documented information about the information security risk assessment process.
NST shall define and apply an information security risk treatment process to:
a) select appropriate information security risk treatment options, taking account of the risk
assessment results;
b) determine all controls that are necessary to implement the information security risk treatment
option(s) chosen;
NOTE: NST can design controls as required, or identify them from any source.
c) compare the controls determined in 6.1.3 b) above with those in Annex A of the standard ISO
27001:2013 and verify that no necessary controls have been omitted;
NOTE 1 Annex A of the standard ISO 27001:2013 contains a comprehensive list of control
objectives and controls. Users of this International Standard are directed to Annex A of the
standard ISO 27001:2013 to ensure that no necessary controls are overlooked.
NOTE 2 Control objectives are implicitly included in the controls chosen. The control
objectives and controls listed in Annex A of the standard ISO 27001:2013 are not exhaustive
and additional control objectives and controls may be needed.
The details of the RA process can be referred from ‘PROCEDURE FOR RISK ASSESSMENT
AND TREATMENT’
The outputs of the RA process include:
Risk Assessment Report
Risk Treatment Plan
Statement of Applicability (inclusion with rationale /exclusion with justification)
Based on the RA report, Information System Security Council prepares the RTP, which includes
selection of controls. The NST then obtains management approval for RTP implementation and
acceptance of residual risk.
NST. Shall establish information security objectives at relevant functions and levels. The information
security objectives shall:
vi. Produce, maintain and test Business Continuity plans as far as practicable
viii. Report and investigate all breaches of information security and suspected weaknesses
ix. Monitor Risk Treatment Plan and measure effectiveness of selected controls.
When planning how to achieve its information security objectives, the organization shall monitor
Uptime of servers and Networks
Achievement of preventive maintenance planned schedule
Closure of Non conformities in defined time frame
Conducting of defined no of awareness programme as per the process
Monitoring of security incidents as per process of incident Management
Mock drills of BCP as per process and achievement of targets :
Review of risks as per defined process and closure of actions as per last review.
The templates for each one of them is defined and frequency and thresholds for each of them is defined
in the template. For monitoring and analysis following
a) Monitoring and measurement of the controls shall be done as per process mentioned in the template..
b) System Administrator either himself or shall make one of the data center employee responsible for
monitor and measurement of controls.
c) The results from monitoring and measurement shall be analyzed and evaluated at least on monthly
basis. However this analysis can be made early depending on the exigencies and system
administrator shall decide the same.; and
The management provides resources for the implementation, maintenance, and review of the ISMS. The
resources include funds, tools, human resources and any other resources that may be required for the
efficient performance of the ISMS.
Periodically the NST (P) LTD. evaluates resource requirements for improvements in security infrastructure
based on RA, review /audit records. Based on resource requirements, the Management approves/ allocates
the required resources.
7.2 Competence
Personnel who have experience and expertise in the application domain and in information security
concepts are assigned to manage ISMS. Whenever feasible, experienced individuals are available
and allocated appropriate responsibilities. When the required levels of skill and expertise are not
available, trainings are provided to ensure skill / knowledge enhancement as per the NST (P) LTD.
training process. The ISMS training should form an integral part of training curriculum of HR Dept.
in association with Co-ordination Team. Refer ‘PR-10-TRA-Training Process’
Identifying what training is needed, and how frequently, for specific positions.
Maintaining attendance records, course outlines and course feedback of all trainings conducted.
The NST (P) LTD. maintains records of all training programs as mentioned in the training process.
7.3 Awareness
their contribution to the effectiveness of the information security management system, including
the benefits of improved information security performance; and
All updates in organization policies & procedure, which are relevant to their job function
7.4 Communication
Users shall be made aware about the risk of Information Security while exchanging information through
Voice, Email, Fax, and Video Communication facility.
To seek clarification,
communicate
Delivery Manager
Technical Matters execution and Customer Email / Video Call/Phone
/ Technical Lead
discussing options of
delivery
Financial
Information such as
As and when the event Accounts
Invoices, Payment Customer Email / Video Call/Phone
takes place Manager
reminder, Proposal,
upgrade offer etc.
Account Manager
PPT / Word / Excel -
Performance Report Monthly / quarterly Business Head and Delivery
Email/Phone
Manager
7.5.1 General
NOTE: The extent of documented information for an information security management system can differ
from one organization to another due to:
1. The size of organization and its type of activities, processes, products and services;
2. The complexity of processes and their interactions; and
3. The competence of persons.
When creating and updating documented information the organization shall ensure appropriate:
b) Format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and
Documented information required by the information security management system and by this
a) it is available and suitable for use, where and when it is needed; and
b) it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).
Documented information of external origin, determined by the organization to be necessary for the planning
and operation of the information security management system, shall be identified as appropriate, and
controlled.
NOTE Access implies a decision regarding the permission to view the documented information only, or the
permission and authority to view and change the documented information, etc.
To meet the requirement of 7.5, the documentation structure of Information security management System is
as detailed below:
ISMS Manual
Level - 0 Corporate Information System Security Policy): It is the Top-level security policy of
the NST (P) LTD.
Level - 1 ISMS Manual): This document includes requirements of the ISO/IEC 27001:20132013
standard, and describes how the defined ISMS meet the requirements. The document details the
NST (P) LTD. approach towards management and implementation of ISMS.
Level - 2 Supporting Policies & Guidelines A complete set of supporting technical policies and
guidelines as identified and defined by the NST (P) LTD. within the scope of ISMS.
Level - 3 Procedures and Processes – Contains processes and procedures required for
implementing and supporting the defined policies & guidelines.
Level - 4 Templates and Forms –NST (P) LTD standard templates/forms used in the processes /
procedures. These are used to streamline the operation of ISMS and form a basis for records.
Control of Documents
Withdrawal of obsolete documents from all points of issue or use to ensure guarding against
unintended use.
All security documents are available on the Intranet for reference and use based on need-to-know
requirements.
Any document if printed is considered obsolete. However, this excludes all the documents
related to ‘Business Continuity Plan
Control of Records
Records are identified within each procedure in the ISMS to provide evidence of conformance to
requirements and effective functioning of the ISSC. Master list of records is maintained. Refer
‘PAL-Process Asset Library-Content Master’.
8 Operation
8.1 Operational planning and control
Selected control objectives, and controls that are a part of RTP are implemented effectively in NST (P)
LTD and they are also capable of enabling prompt detection of and response to security incidents.
NST (P) LTD. ensures that proper training and awareness on ISMS are conducted, and appropriate
resources are assigned to manage ISMS.
ISMS Manual ~NST- Internal Page 34\72
NST (P) LTD. maintains a suitable matrix of risk / incidence reduction against its major controls
identified every year for monitoring purposes to ensure effectiveness of selected controls. Logs of risk
reduction and/or incidence reduction are maintained for results comparison and reproduction.
NST (P) LTD. ensures that ISMS is properly monitored and reviewed periodically.
a) For monitoring incidents, the NST (P) LTD. has a well-defined Incident Management
Procedure, which ensures that all problems, errors identified during processing of any
information are handled promptly and effectively, and breach of security is appropriately
addressed. Refer ‘PR-19-ISMS-IMP-Incident Management Process’.
b) A process for conducting Management Reviews and audit procedure of ISMS exists. The
focus of the review is to ensure that ISMS is effective, and all policies, controls and security
objectives are in line with business requirements. The audit focuses on the compliance of
NST (P) LTD.’s practices as defined in ISMS. Refer ‘GD-14-SEPG & ISMS Plan’
c) Information System Security Committee reviews the level of residual and acceptable risks
based on the changes in the deployed technology, new threats and vulnerabilities and
business objectives. Refer ‘NST-CP-05-ISMS-RART-Risk Assessment & Risk Treatment
Procedure’
d) The controls at appropriate intervals are monitored against the logs generated to arrive at the
current risk exposure. This is compared with previous risk level to verify the effectiveness
of controls. Refer ‘PR-16-ISMS-CEM-Control Effectiveness Measurement Process’
Based on the review reports and audit findings, appropriate corrective and preventive actions, as
approved by the Information System Security Committee are implemented and incorporated into the
ISMS. Inputs for improvement can be from:
Audit Reports
Incident Reports
RA report
NST (P) LTD. maintains all inputs in an improvement database available for internal use’s (P) LTD.
consolidates the inputs, and reviews the ISMS for applicable improvements. For changes to be made, NST
(P) LTD. prepares an action plan and communicates the results to all interested /affected parties. All
improvements should be directed towards predefined organizational Business objectives.
The organization shall perform information security risk assessments at planned intervals or when significant
changes are proposed or occur, taking account of the criteria established in 6.1.2 a). The organization shall
retain documented information of the results of the information security risk assessments.
8.3 Information security risk treatment
The organization shall implement the information security risk treatment plan. The organization shall retain
documented information of the results of the information security risk treatment.
NST shall evaluate the information security performance and the effectiveness of the information
security management system.
a) what needs to be monitored and measured, including information security processes and controls;
b) the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid
results;
NOTE: The methods selected should produce comparable and reproducible results to be considered
valid.
e) System Administrator either himself or shall make one of the data center employee responsible for
monitor and measurement of controls.
f) The results from monitoring and measurement shall be analyzed and evaluated at least on monthly
basis. However this analysis can be made early depending on the exigencies and system
administrator shall decide the same.; and
NST shall retain appropriate documented information as evidence of the monitoring and measurement
results. The templates where these evidences are maintained are defined in ‘PR-16-ISMS-CEM-
Control Effectiveness Measurement Process.docx’
MR conducts internal ISMS audits quarterly to verify the adherence to ISMS. The audits are conducted to
ensure that ISMS:
Performs as expected
Security Audits are conducted in accordance with the audit procedure defined in ‘NST-CP-06-ISMS-IAP-
Internal Audit Procedure’. Trained personnel, not having direct responsibility of the activity being audited,
shall conduct audits. MR with the help of HODs will ensure that any non-conformance found is closed. MR
is responsible for planning, scheduling, organizing and maintaining records of these audits.
Top management shall review information security management system once every three months, or on an
event-driven basis, to ensure its continuing suitability, adequacy and effectiveness. The management review
shall include consideration of:
b) Changes in external and internal issues that are relevant to the information security
management system;
The outputs of the management review shall include decisions related to continual improvement
opportunities and any needs for changes to the information security management system.
NST shall retain documented information as evidence of the results of management reviews.
10 Improvement
10.1 Non conformity and Corrective Action
b) evaluate the need for action to eliminate the causes of nonconformity, in order that it does
not recur or occur elsewhere, by:
f) The nature of the nonconformities and any subsequent actions taken, and
The procedure is created, for implementing and tracking the correcting action. Refer ‘NST-CP-01-CAPA-
Corrective & Preventive Action Procedure’.
The NST (P) LTD. is responsible for continual improvement of the ISMS for suitability and effectiveness.
Incident Reports
Business Changes
Controls applicable to NST (P) LTD. have been mentioned and addressed in this section.
Controls not applicable to NST (P) LTD. are mentioned in this section and exclusion with justification
given in SOA. Refer ‘NST-ISO27001-2013-SOA-V2.0.xlsx’
A Corporate Information System Security Policy document approved by the management exists.
Information security policy document called the ‘ISMS Manual has been published and
communicated to all employees of NST (P) LTD., through the Intranet and mails, training and
induction programs.
NST (P) LTD. is responsible for the creation, maintenance and updating of the policy. Information
System Security Committee approves the policy prior to release. The review and evaluation of ISMS
policy is conducted at least once in a year. The review guidelines state that the policy is to be
reviewed against its effectiveness, compliance to business process, and compliance to technology
changes. This is detailed in section 9.3.
Security roles and responsibilities of employees, contractors and third party users are defined and
documented in accordance with the organization’s information security policy.
In NST (P) LTD., duties have been segregated in order to reduce the risk of accidental or deliberate
system misuse. Different individuals are responsible for their respective areas, and proper controls
exist that take care of possibility of fraud in areas of single responsibility without being detected.
Different areas and associated responsibilities are defined as per Roles and Responsibilities Section
6.1.1. Day to day administration & maintenance of IT Infrastructure is done by IT Department &
HOF/IT review different logs & conduct periodic VA.
Appropriate contacts/ agreements are maintained with the following but not limited to:
Services Responsibility
Responsibility for any other services which fall under Information Security preview, but not
mentioned above, is assigned to Head/IT. This is necessary to ensure that appropriate actions can be
Information security advice is obtained from vendors, legal advisors and technical experts on
security matters to maximize the effectiveness of the ISMS. Internally MR shall act as Security
Advisor. External advice shall only be sought by MR if required. All security incidents and
breaches are reported to MR for necessary corrective and preventive actions.
Project Planning, Monitoring and Control shall take care of information security in project
management, which is defined in ‘PR-11-PMC-Project Planning and Project Monitoring and
Control Process.doc’
NST (P) LTD. has well defined policy and guidelines on the use of laptops. Refer ‘PR-17-ISMS-
AHP-Asset Handling Process.docx’.
A.6.2.2 – Teleworking
NST (P) LTD. has a well-defined policy and guideline on the use of laptops for teleworking
purposes. Refer ‘NST-PO-08-ISMS-VPN-Virtual Private Network Policy.docx’
A.7.1.1 –Screening
All employees of, NST (P) LTD., at the time of joining, are required to agree and sign the Terms and
Conditions of employment as detailed in Recruitment Process. The Terms and Conditions also
state the employees’ responsibility for Information Security.
Management shall require employees, contractors and third party users to apply security in
accordance with established policies and procedures of the organization.
NST (P) LTD. Ensures that users (employees and the relevant external parties) are made aware of
their security responsibilities through ongoing awareness training programs. All employees are to
adhere them while executing the Roles and Responsibilities as defined.
A documented procedure for training exists. NST (P) LTD., in association with HR Dept. ensures
that all, NST (P) LTD. personnel are imparted ISMS related training and that a training module on
Information security policies becomes an integral part of induction training programs. Refer ‘PR-10-
TRA-Training Process’
Any violation of the signed documents is considered as a disciplinary offence and as such act as a
deterrent to employees who might otherwise be inclined to disregard security procedures. The
procedure shall ensure correct, fair treatment for employees who are suspected of committing serious
or persistent breaches of security. It is addressed by the reference to NST (P) LTD. Conduct,
Disciplinary and Appeal (CDA) Rules. Refer “Disciplinary Action Process”.
Hardware – Includes computer equipment (CPU, Peripherals etc.), communication equipment (routers,
switches, etc.), magnetic media (CDs, Tapes, Disks), UPS/Inverters / power backup devices/Battery
Bank, Air conditioner, Fire extinguisher etc.
Software – Includes various applications programs, system software, development tools and
utilities.
Services – Include communication services, general utilities like power, AC, Buildings (Rent
Agreement- Renewal) Services (provided by org external/internal the group) etc.
An inventory of all assets is maintained by the IT department in the form of Asset Register NST (P)
LTD. maintains appropriate protection of the organizational assets. It aims at confidentiality,
integrity and availability.
All information and assets associated with information processing facilities shall be owned by a
designated part of the organization. The term ‘owner’ identifies an individual or entity that has
approved management responsibility for controlling the production, development, maintenance,
use and security of the assets. The term ‘owner’ does not mean that the person actually has
property rights to the asset.
Rules for the acceptable use of information and assets associated with information processing
facilities are identified, documented, and implemented. Ref to GD-21-ISMS-AUA-Acceptable
Use of Assets Guidelines
All employees, contractors and third party users are required to return all of the organization’s assets
in their possession upon termination of their employment, contract or agreement.
There are four levels of information classification defined in NST (P) LTD. Refer ‘NST-PO-12-
ISMS-CLH-Information Classification, Labeling and Handling Policy.docx’
NST (P) LTD. has well defined guidelines for information labeling, handling and storage in order to
protect information from unauthorized disclosure or misuse. Refer ‘NST-PO-12-ISMS-CLH-
Information Classification, Labeling and Handling Policy.docx’
All employees, contractors and third party users are required to return all of the organization’s assets
in their possession upon termination of their employment, contract or agreement.
All media should be stored in a safe, secure environment, in accordance with manufacturers’
specifications. NST (P) LTD. has defined procedure for the management of computer media
containing sensitive data. Refer ‘PR-17-ISMS-AHP-Media Handling Process.docx’.
NST (P) LTD. has defined procedure for the disposal of computer media. The Tapes, CDs and Hard
Disks have been covered in ‘PR-17-ISMS-AHP-Media Handling Process.docx’.
Backup media, Floppy, CD, Hardcopy etc. being transported from one location to the other is
protected from unauthorized access, misuse and corruption by sending them through trusted, NST
(P) LTD. employee with proper authorization and adequate protection. Refer ‘NST-PO-12-ISMS-
CLH-Information Classification, Labeling and Handling Policy.docx’
ISMS Manual ~NST- Internal Page 47\72
A.9 Logical Security /Access Control
NST (P) LTD. has implemented access control to information based on the business requirements
and security requirements on ‘need-to-know’ basis. Well-documented access control policy and
procedures are in place. Refer ‘NST-PO-07-ISMS-ACP-IT Access control Policy.docx’
The access to internal and external network of NST (P) LTD. is controlled. This includes any direct
access to services that are business critical to users within the domain, and direct access to network
from users in high-risk location like users through Internet. Users shall only have direct access to the
services that they have been specifically authorized to use. A defined and documented policy for use
of network services exists. Refer ‘NST-PO-10-ISMS-IEM-Internet & Electronic Messaging Usage
Policy.docx’.
NST (P) LTD. has well defined policy and procedure for managing user access to all information
systems and services. Refer ‘NST-PO-07-ISMS-ACP-IT Access control Policy.docx’
The allocation and use of privileges is restricted and controlled. Any privilege given onto any system
in NST (P) LTD. is covered. Refer ‘NST-PO-07-ISMS-ACP-IT Access control Policy.docx’
NST (P) LTD. has a well-defined password policy and guidelines. Refer ‘NST-PO-06-PP-Password
Policy.docx’. ‘NST-PO-07-ISMS-ACP-IT Access control Policy.docx’
User privileges for NST will be reviewed every three months and for global users it will be reviewed
once every year. System Administrator shall review the access rights & respective Business Owner
shall ratify the review report.
NST (P) LTD. has a well-defined password usage guideline for users to follow. Refer ‘NST-PO-06-
PP-Password Policy.docx’.
All user machines are accessible through a user name and password. These are assigned to each
authorized user and are unique in nature. Unauthorized access is not permitted. Refer ‘NST-PO-07-
ISMS-ACP-IT Access control Policy.docx’
NST (P) LTD. has a well-defined password policy and access management process. Refer ‘NST-
PO-06-PP-Password Policy.docx’. ‘NST-PO-07-ISMS-ACP-IT Access control Policy.docx’.
All system utility programs, which impact the operations of the systems, are installed with controlled
access to administrative accounts. System Utilities are controlled.
A.10 Cryptography
NST (P) LTD. has main entry and exit point manned by security personnel.
Entry to company premises for the employees is through biometric /access card and for visitors
is through visitors pass.
Access to specific /secure areas like server rooms is monitored through access card.
Secured areas are protected by appropriate entry controls to ensure that only authorized personnel are
allowed access.
Physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other
forms of natural or man-made disaster are designed and applied.
The delivery and handling of material is strictly under the authorization control with material gate
pass. Without proper gate pass, no material is allowed to enter or leave the premises.
A.11.2 Equipment
Control Objective: To prevent loss, damage, theft or compromise of assets and interruption to the
organization’s activities.
Business critical equipment are installed in server room, which is fully secured under lock
and key
Fire and smoke alarms are deployed appropriately.
Users are not allowed to have drink, eatables & smoke in the server room.
The procedure for maintaining proper temperature and humidity is provided as per ‘PR-21-ISMS-
ITO-IT Operation Process’.
All IT equipment’s are protected from power failure and other electrical anomalies. Arrangements
are made to provide uninterrupted power supply (UPS) to all critical information processing
facilities. UPS are maintained as per the OEM’s instructions and covered under AMC contract.
Lighting protection is provided to the building. Adequate capacity of DG sets is available which are
turned on in case of failure or routine power cuts.
The power and data cables are well protected and isolated in order to protect from interception and
damage. All the cables (data, telecommunication, and electrical) are laid using proper conduits, in
order to protect them from external damage. Power cables and network cables are well separated to
prevent any interference. Refer ‘PR-21-ISMS-ITO-IT Operation Process’.
All equipment’s in NST Server Room are being correctly maintained to ensure their continued
availability and integrity. Adhering to the following steps ensures this:
All equipment’s are maintained in accordance with the OEM’s recommendations for service
intervals and specifications.
All the equipment’s that are taken out of the NST follow a proper authorization process. A proper
gate pass is to be signed by the IT Manager before taking any equipment out of the NST.
The person carrying the equipment outside the premises is responsible for the security of the
equipment. NST (P) LTD. has a documented policy for Laptops and portable media taken outside
premises. Refer ‘PR-17-ISMS-AHP-Asset Handling Process.docx’.
The information available on equipment’s is removed or erased before the equipment disposal. The
information available on equipment’s, which is re-used for some other purposes, is removed or
erased before the equipment is re-used. The information available on media, which is re-used for
some other purposes, is removed or erased before the media is re-used. All defective computer
media, to be disposed, is destroyed completely and all relevant information is made irrecoverable.
Refer ‘PR-17-ISMS-AHP-Asset Handling Process.docx’.
A well-defined policy exists at NST (P) LTD. regarding equipment’s unattended for a long
duration. Refer ‘.NST-PO-07-ISMS-ACP-IT Access control Policy .docx’
Personal computers are not left logged on when not in use and are protected by password. The
screen saver is password protected. Refer ‘NST-PO-04-ISMS-CDCS-Clear Desk & Clear
Screen Policy.docx’.
NST (P) LTD. has a set of defined operating manuals for processing the department functionality.
All documented operating manuals are identified in the ‘PAL-Process Asset Library-Content
Master’.
Whenever a change in the IT infrastructure is to be done, a proper evaluation and analysis is done
which includes cost, security, technical functionality and compatibility. Any user can initiate change
request. Manager/IT is authorized to initiate the change & Head/IT approves these operational and
process changes. To control all operational changes NST (P) LTD. has defined policy. Refer ‘PR-
08-SCM-Configuration Management Process’
It is the responsibility of the individual managers to look for capacity demands for their projects in
advance. This ensures that the required capacity can be arranged in time to minimize the risk of
failure due to lack of capacity. It also ensures the continuous availability of operational systems.
Utilization of existing resources is monitored regularly. Refer ‘NST-CP-04-ISMS-HSA-Hardware
and Software Augmentation Procedure.docx’.
The development and testing activities shall not be done in production server.
Precautions are required to prevent and detect the introduction of malicious software. Software
information processing facilities are vulnerable to the introduction of malicious software, such as
computer viruses, network worms, Trojan horses, and logic bombs etc. NST (P) LTD. has
implemented several controls to address the threat:
NST (P) LTD. has a policy for prevention against malicious software.
NST (P) LTD. has a policy for the use of networks or any other medium as a preventive
measure against virus attacks.
Virus attacks and software malfunctions due to malicious software are treated as security
incidents and handled.
To prevent loss of data due to malicious software regular backups of critical data are taken
regularly.
A.12.3 Back-up
Control Objective: To maintain the integrity and availability of information and information processing
facilities.
Backup of informational Servers are taken regularly. NST (P) LTD. has a well-defined procedure for
Information backup and restoration. Refer ‘NST-PO-09-BCK-Backup Policy.docx’.
NST (P) LTD. has defined policy for event logs. All systems are monitored to detect deviation from
access control policy. This audit trail serves as evidence in case of security breach, and is the basis
for any action. Audit logs are maintained on servers and provide audit information related to User Id,
Date and time of log-on and log-off, failed login attempts, Terminal Location. Refer ‘NST-PO-13-
ISMS-NSM-Network Security Management Policy.docx’.
Logging facilities and log information are protected against tampering and unauthorized access.
Logging facilities and log information are protected against tampering and unauthorized access.
The correct setting of critical computer clocks is important and carried out to ensure the accuracy of
audit logs, which may be required for investigation or as evidence in legal or disciplinary cases. One
Server is identified as Time Master Server & other Servers of the network are synchronized with the
Master.
Audit activities involving checks on operational system shall be carefully planned and agreed to
minimize the risk of disruption to business processes.
NST (P) LTD. has a dedicated team of employed professionals in network, who are responsible for
the smooth and secure operation of the network. Policies of network usage are defined. Refer ‘NST-
PO-10-ISMS-IEM-Internet & Electronic Messaging Usage Policy.docx’.
Security attributes for network services like Leased Line / Wireless Radio modem is taken care
through SLA (Service Level Agreement) with ISP (Internet Service Provider) viz., STPI.
The Electronic Office Systems like Telephone, Fax etc. are maintained by a 3rd Party. Security of
Information available through such system is ensured through suitable clauses in the contract.
Users shall be made aware about the risk of Information Security while exchanging information
through Voice, Fax, and Video Communication facility.
Agreements shall be established for the exchange of information and software between NST and
external parties like Oracle, MS, and IBM etc.
The electronic mail systems are properly secured from unauthorized access by using Spam
protection software & Anti-Virus firewall, and from viruses by deploying antivirus software. NST
(P) LTD. has a well-defined policy and guidelines on the use of electronic mail. Refer ‘NST-PO-10-
ISMS-IEM-Internet & Electronic Messaging Usage Policy.docx’.
All contractors and external parties are required to sign NDA as covered by respective contract
guidelines.
NST (P) LTD., will acquire and accept hardware and software. Refer ‘NST-CP-04-ISMS-HSA-
Hardware and Software Augmentation Procedure.docx’
AS PER SOA
NOT APPLICABLE.
AS PER SOA
Software development will be as per the agreed Software Development Lifecycle defined in
‘PR-09-SLC-Software Life Cycle Process.doc’
NST (P) LTD. has a defined procedure to manage and control changes in the software developed
and support systems, during the development life cycle. Refer ‘PR-08-SCM-Configuration
Management Process’
The application systems are reviewed to ensure that there is no adverse impact on operation and
security due to changes in operating system. Refer ‘PR-08-SCM-Configuration Management
Process’
Modification to software package is not permitted without the consent of project team. To ensure
that only desired changes are implemented after the approval, a process need to be followed for
controlling the changes in software packages. For this the process is defined ‘PR-08-SCM-
Configuration Management Process’
Software development will be as per the agreed Software Development Lifecycle defined in
‘PR-09-SLC-Software Life Cycle Process.doc’
New information systems, upgrades, and new versions are put through a system acceptance for their
acceptability and interoperability. A separate environment comprising of hardware and software is
used to carry out tests prior to deploying or upgrading the main system. Appropriate tests are carried
out to confirm that all acceptance criteria are fully satisfied. The tests results are documented and
operational, maintenance and usage procedure are established. Training is provided for use and
operation of new system. Refer ‘NST-CP-04-ISMS-HSA-Hardware and Software Augmentation
Procedure.docx’
System and acceptance testing usually requires substantial volumes of test data that are as close as
possible to operational data, hence test data is carefully selected and controlled such that security
violations do not occur. Refer ‘NST-CP-04-ISMS-HSA-Hardware and Software Augmentation
Procedure.docx’
All contract personnel are given restricted access as per the requirement of the service they are
providing and as per the contractual obligations. All third parties working at the premises have
signed Non-Disclosure Agreement (NDA) at the time of contracts.
All agreements with the supplier who provides any type of services to NST & have access to the
premises of NST shall have a clause related to security and Access Control as under
“The vendor will adhere to security guidelines of NST while delivering the services and follow
access privileges & rights provided with precaution and safety measures indicated for each of them.
Non-adherence of these guidelines may result in termination of the agreement and/ or claiming of
liability/ damages caused due to non-adherence of these instruction.”
All agreements with the Information & Communication Technology service provider, who provides
any such type of services to NST, shall have the requirements to address information security risk in
the agreement.
Incident management responsibilities and procedure exist to ensure a quick, effective, and orderly
response to security incidents. Refer ‘PR-19-ISMS-IMP-Incident Management Process’.
Security events are defined as incidents that could cause unauthorized disclosure, modification, or
destruction of, NST (P) LTD.’s information assets, or loss or destruction of the physical equipment
associated with the computer systems, it’s peripheral or network infrastructure components. Security
incidents also include other aspects of security, such as carrying fire arms, or other lethal weapons on
property, are as typically secured being left unlocked or unattended, fire or hazardous material spills,
or witnessing someone performing an unsafe act, or committing a violation of security policies or
procedures etc. All users in the, NST (P) LTD are responsible to report any observed or suspected
security incidents through email/help desk phone/on-line Incident reporting system available on
Intranet. The security incidents are reported and are managed by the documented procedure. Refer
‘PR-19-ISMS-IMP-Incident Management Process’.
Security weaknesses are defined as loopholes, weak points or vulnerabilities in the information
system. These vulnerabilities or the loopholes may be exploited to gain unauthorized access to data
or systems. All users in the, NST (P) LTD. are responsible to note and report any such observed or
All incidents occurring in the, NST (P) LTD. are documented and stored and handled as per the
procedure defined in PR-19-ISMS-IMP-Incident Management Process.docx
All incidents occurring in the, NST (P) LTD. are documented and stored and handled as per the
procedure defined in PR-19-ISMS-IMP-Incident Management Process.docx
All incidents occurring in the, NST (P) LTD. are documented and stored in the Corrective and
Preventive Actions database. The , NST (P) LTD. consolidates the incident reports for root cause
analysis and considers these as an input for appropriate actions and necessary controls to avoid
reoccurrence of the incidents.
All applicable laws and regulations have been identified by, NST (P) LTD. wherever applicable, the
records and documents that may be accepted as evidence shall be collected and maintained. Shall
ensure that all evidence collected in the process is:
Business continuity begins by identifying events that can cause interruptions to business processes,
e.g. equipment failure, flood and fire. This is followed by a risk assessment to determine the impact
of those interruptions (both in terms of damage scale and recovery period). This assessment
considers all business processes and is not limited to the information processing facilities. Depending
on the results of the risk assessment, a strategy plan is developed to determine the overall approach to
business continuity. The details of BCP are detailed as per ‘PR-22-ISMS-BCP-Business Continuity
Plan Process’.
Implementing information security continuity shall covered in section 6.2.Identify critical resources
& in section 7.2. Business Continuity Policies for the Organization in PR-22-ISMS-BCP-Business
Continuity Plan Process.docx
Business continuity plans shall be tested regularly to ensure that they are up to date and effective.
Such tests should also ensure that all members of the recovery team and other relevant staff are
aware of the plans. The test schedule for business continuity plan(s) are detailed in the ‘PR-22-
ISMS-BCP-Business Continuity Plan Process’.
A.17.2 Redundancies
Control objective: To ensure availability of information processing facilities.
Information processing facilities shall be monitored and sufficient redundancy shall be ensured by
fixing the appropriate threshold level while maintain Control Effectiveness Measurement as defined
in the PR-16-ISMS-CEM-Control Effectiveness Measurement Process
ISMS Manual ~NST- Internal Page 66\72
A.18 Compliance
Information System Security Committee is responsible for reviewing and auditing the ISMS for its
compliance. All areas covered in the ISMS policy are considered for regular reviews and audits. MR
prepares and publishes the annual audit/ review plan. Details are mentioned in Section 6 of this
document.
The , NST (P) LTD. with the help of the Security Committee and other Core Group members
conducts periodic/event-driven review to ensure compliance with security policy & standards.
Periodic internal audits, third party audits and independent VA/PT shall be planned for and
conducted according to Security Committee Review Procedure.
All relevant statutory, regulatory, and contractual obligations pertaining to information systems are
explicitly defined and documented. NST (P) LTD. adheres to all the applicable laws and acts. It is
the responsibility of the HR department to review compliance and identify new or unidentified legal
obligations. All agreements entered by the company are duly vetted and approved by the HR
department for this purpose.
NST (P) LTD. ensures that all license agreements are respected and limits the use of the products to
specified machines, and for specific purposes.
a) The IPR of hardware, software and documentation belonging to , NST (P) LTD. will not be
disclosed to any outside party unless and otherwise cleared by , NST (P) LTD.
b) The IPR of programs and associated material supplied by outside organizations / collaborators
will be used by, NST (P) LTD. for only those purposes for which they are licensed.
c) No unauthorized copies will be made for use within or outside, NST (P) LTD.
The important records are protected from loss, destruction and falsification. The following records
of, NST (P) LTD. are safeguarded:
Database records
Transaction logs
All records are retained for a defined period as specified by the owner of the information. Storage
and handling of all these records is in accordance with a defined procedure. Refer ‘PR-24-ISMS-
COM-Complinace Process.docx’
Data protection Act is not applicable in (P). However, all personal records are maintained as hard
copies and classified as ‘Confidential’. Only HR department has access to those files. Online
personal information is maintained which is password protected, and the access is limited to the HR.