Security Through Transparency and Open Documentation
Demonstrating Security Excellence Through Public ISMS Disclosure
π Document Owner: CEO | π Version: 1.1 | π
Last Updated: 2025-09-10 (UTC)
π Review Cycle: Annual | β° Next Review: 2026-09-10
Hack23 AB's core philosophy is that transparency enhances security rather than diminishing it. This document outlines our strategy for making our Information Security Management System (ISMS) public, demonstrating our expertise and building trust, while carefully protecting sensitive information that could introduce risk.
This plan defines what is considered public, what is confidential, and the processes for maintaining our commitment to security through transparency.
β James Pether SΓΆrling, CEO/Founder
- Default to Public: Policies, frameworks, and high-level procedures will be public unless a specific, documented risk is identified.
- Demonstrate, Don't Expose: The goal is to showcase our security maturity and processes, not to reveal secrets that could be exploited.
- Redact, Don't Hide: When a document contains a mix of public and sensitive information, we will redact the sensitive parts and publish the rest.
- Clarity and Rationale: The reason for keeping any information confidential will be clearly documented internally.
This table defines the publication status of ISMS documents and the rationale.
Document / Information Type | Publication Status | Rationale & Redaction Rules |
---|---|---|
π Core Policies & Frameworks | ||
π Information Security Policy | β Public | Demonstrates overall security posture. No sensitive details. |
π·οΈ Classification Framework | β Public | Core to our methodology; showcases our approach to risk. |
π Open Source Policy | β Public | Aligns with our open-source philosophy. |
π Style Guide | β Public | Shows our commitment to quality and consistency. |
π οΈ Operational Policies | ||
π Access Control Policy | β Public | High-level policy is public. Specific roles and access lists are confidential. |
π Cryptography Policy | β Public | Approved algorithms and standards are public. Key management procedures are confidential. |
π οΈ Secure Development Policy | β Public | The framework is public. Specific tool configurations are confidential. |
π Network Security Policy | β Public | Network architecture principles public. Specific configurations confidential. |
π Change Management | β Public | Process framework public. Specific change details confidential. |
π Vulnerability Management | β Public | Process public. Active vulnerabilities confidential. |
πΎ Backup & Recovery Policy | β Public | Policy framework public. Specific procedures confidential. |
π Management & Governance | ||
π» Asset Register | Public version lists asset categories (e.g., "Cloud Services," "SaaS Platforms"). Specific account details, credentials, and configurations are CONFIDENTIAL. | |
π Risk Register | The framework and risk categories are public. Specific risk details, financial impacts, and vulnerabilities are CONFIDENTIAL. | |
π Third-Party Management | Policy framework is public. Specific supplier assessments confidential. | |
π’ Supplier Security Posture | Generic supplier examples and assessment methodology public. Specific supplier details and contracts are CONFIDENTIAL. | |
π€ External Stakeholder Registry | β Public | Professional network and regulatory contacts demonstrate stakeholder engagement and compliance readiness. |
π¨ Response & Recovery Plans | ||
π¨ Incident Response Plan | The process framework is public. Specific contact details, technical procedures, and escalation paths are CONFIDENTIAL. | |
π Business Continuity Plan | High-level strategies are public. Specific recovery steps, contact lists, and operational details are CONFIDENTIAL. | |
π Disaster Recovery Plan | The architecture overview is public. Detailed recovery procedures, system configurations, and technical details are CONFIDENTIAL. | |
π Compliance & Legal | ||
β Compliance Checklist | β Public | Demonstrates our commitment to transparency and provides a clear, auditable trail of our compliance posture against key frameworks. |
π·οΈ Data Classification Policy | β Public | The classification levels and handling rules are public. The classification of specific datasets is confidential. |
π’ Company Documentation | ||
π’ Company Information | β Confidential | Corporate structure and internal operations. |
π Marketing Strategy | β Confidential | Marketing strategies and competitive analysis. |
π Business Strategy | β Confidential | Strategic plans and business tactics confidential. |
π Articles of Association | β Public | Corporate governance structure public. |
π Aktiebok | β Confidential | Share register details confidential. |
π Annual Accounts | β Public | Filed annual reports are public record. |
β Sensitive Information | ||
Personal Data (CEO, future employees) | β Confidential | Per GDPR and privacy best practices. |
Financial Records & Bank Details | β Confidential | Per Swedish Bookkeeping Act and security best practices. |
Customer Data | β Confidential | Absolute confidentiality is paramount for client trust and GDPR. |
Active Security Vulnerabilities | β Confidential | Public disclosure would be irresponsible. |
Credentials, API Keys, Tokens | β Confidential | Extreme-level confidential data. |
Risk Exposure Values | β Confidential | Specific financial impacts could enable targeted attacks. |
Supplier Contract Details | β Confidential | Commercial terms, costs, and performance details. |
- Create Internal Version: The complete, unredacted document is created and stored in a secure, internal repository. This is the "source of truth."
- Create Public Version: A copy of the document is made for public release.
- Apply Redactions: Based on the table above, sensitive information is removed or replaced with generic descriptions (e.g.,
[REDACTED]
,[Generic Example]
,[Representative Values]
). - Review: The public version is reviewed by the CEO to ensure no sensitive information remains.
- Publish: The sanitized version is published to the public GitHub repository.
- Financial Data: Replace specific costs with ranges or generic examples (e.g., "$50K+" becomes "High switching costs")
- Risk Exposure: Remove specific dollar amounts, keep relative severity (e.g., "Critical risk" without "$1.8M exposure")
- Supplier Details: Use generic examples instead of actual supplier names and contracts
- Technical Details: Remove IP addresses, account IDs, specific configurations
- GitHub Public: hack23/ISMS-PUBLIC - Complete public ISMS documentation
- Corporate Website: Links to documentation for client access
- Product Documentation: Specific security architectures for each project
- Citizen Intelligence Agency: https://www.hack23.com/cia-docs.html
- CIA Compliance Manager: https://www.hack23.com/cia-compliance-manager-docs.html
- Black Trigram: https://www.hack23.com/black-trigram-docs.html
- Documents Published: Framework complete with ongoing updates
- Public/Confidential Ratio: Approximately 70% public framework, 30% redacted operational details
- Client Engagement: Documentation views, security inquiries generated
From our comprehensive supplier management approach:
- Cloud Infrastructure: Critical dependency with robust continuity planning
- Development Platforms: High-impact services with documented alternatives
- Financial Services: Regulatory-compliant banking and payment processing
- Supporting Services: Managed risk profile across operational tools
Our systematic approach includes:
- Comprehensive Risk Assessment: Full spectrum risk identification and classification
- Regular Risk Reviews: Ongoing monitoring and reassessment cycles
- Risk Treatment Planning: Appropriate mitigation strategies based on impact analysis
- Continuous Improvement: Regular updates to risk management processes
- Monthly: Review redaction effectiveness and update metrics
- Quarterly: Update publication classifications and risk assessments
- Annually: Complete transparency strategy review
- Ad-hoc: Following security incidents or significant business changes
π Document Control:
β
Approved by: James Pether SΓΆrling, CEO
π€ Distribution: Public
π·οΈ Classification:
π
Effective Date: 2025-09-10
β° Next Review: 2026-09-10
π― Framework Compliance: