Skip to content

Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure

License

Notifications You must be signed in to change notification settings

Hack23/ISMS-PUBLIC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

86 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Hack23 Logo

🌐 Hack23 AB β€” ISMS Transparency Plan

Security Through Transparency and Open Documentation
Demonstrating Security Excellence Through Public ISMS Disclosure

Owner Version Effective Date Review Cycle

πŸ“‹ Document Owner: CEO | πŸ“„ Version: 1.1 | πŸ“… Last Updated: 2025-09-10 (UTC)
πŸ”„ Review Cycle: Annual | ⏰ Next Review: 2026-09-10


🎯 Purpose Statement

Hack23 AB's core philosophy is that transparency enhances security rather than diminishing it. This document outlines our strategy for making our Information Security Management System (ISMS) public, demonstrating our expertise and building trust, while carefully protecting sensitive information that could introduce risk.

This plan defines what is considered public, what is confidential, and the processes for maintaining our commitment to security through transparency.

β€” James Pether SΓΆrling, CEO/Founder


πŸ“œ Guiding Principles

  1. Default to Public: Policies, frameworks, and high-level procedures will be public unless a specific, documented risk is identified.
  2. Demonstrate, Don't Expose: The goal is to showcase our security maturity and processes, not to reveal secrets that could be exploited.
  3. Redact, Don't Hide: When a document contains a mix of public and sensitive information, we will redact the sensitive parts and publish the rest.
  4. Clarity and Rationale: The reason for keeping any information confidential will be clearly documented internally.

πŸ“Š Information Classification for Publication

This table defines the publication status of ISMS documents and the rationale.

Document / Information Type Publication Status Rationale & Redaction Rules
πŸ” Core Policies & Frameworks
πŸ” Information Security Policy βœ… Public Demonstrates overall security posture. No sensitive details.
🏷️ Classification Framework βœ… Public Core to our methodology; showcases our approach to risk.
πŸ”“ Open Source Policy βœ… Public Aligns with our open-source philosophy.
πŸ“ Style Guide βœ… Public Shows our commitment to quality and consistency.
πŸ› οΈ Operational Policies
πŸ”‘ Access Control Policy βœ… Public High-level policy is public. Specific roles and access lists are confidential.
πŸ”’ Cryptography Policy βœ… Public Approved algorithms and standards are public. Key management procedures are confidential.
πŸ› οΈ Secure Development Policy βœ… Public The framework is public. Specific tool configurations are confidential.
🌐 Network Security Policy βœ… Public Network architecture principles public. Specific configurations confidential.
πŸ“ Change Management βœ… Public Process framework public. Specific change details confidential.
πŸ” Vulnerability Management βœ… Public Process public. Active vulnerabilities confidential.
πŸ’Ύ Backup & Recovery Policy βœ… Public Policy framework public. Specific procedures confidential.
πŸ“‹ Management & Governance
πŸ’» Asset Register ⚠️ Redacted Public version lists asset categories (e.g., "Cloud Services," "SaaS Platforms"). Specific account details, credentials, and configurations are CONFIDENTIAL.
πŸ“‰ Risk Register ⚠️ Redacted The framework and risk categories are public. Specific risk details, financial impacts, and vulnerabilities are CONFIDENTIAL.
πŸ”— Third-Party Management ⚠️ Redacted Policy framework is public. Specific supplier assessments confidential.
🏒 Supplier Security Posture ⚠️ Redacted Generic supplier examples and assessment methodology public. Specific supplier details and contracts are CONFIDENTIAL.
🀝 External Stakeholder Registry βœ… Public Professional network and regulatory contacts demonstrate stakeholder engagement and compliance readiness.
🚨 Response & Recovery Plans
🚨 Incident Response Plan ⚠️ Redacted The process framework is public. Specific contact details, technical procedures, and escalation paths are CONFIDENTIAL.
πŸ”„ Business Continuity Plan ⚠️ Redacted High-level strategies are public. Specific recovery steps, contact lists, and operational details are CONFIDENTIAL.
πŸ†˜ Disaster Recovery Plan ⚠️ Redacted The architecture overview is public. Detailed recovery procedures, system configurations, and technical details are CONFIDENTIAL.
πŸ“Š Compliance & Legal
βœ… Compliance Checklist βœ… Public Demonstrates our commitment to transparency and provides a clear, auditable trail of our compliance posture against key frameworks.
🏷️ Data Classification Policy βœ… Public The classification levels and handling rules are public. The classification of specific datasets is confidential.
🏒 Company Documentation
🏒 Company Information ❌ Confidential Corporate structure and internal operations.
πŸ“ˆ Marketing Strategy ❌ Confidential Marketing strategies and competitive analysis.
πŸ“Š Business Strategy ❌ Confidential Strategic plans and business tactics confidential.
πŸ“‘ Articles of Association βœ… Public Corporate governance structure public.
πŸ“Š Aktiebok ❌ Confidential Share register details confidential.
πŸ“Š Annual Accounts βœ… Public Filed annual reports are public record.
❌ Sensitive Information
Personal Data (CEO, future employees) ❌ Confidential Per GDPR and privacy best practices.
Financial Records & Bank Details ❌ Confidential Per Swedish Bookkeeping Act and security best practices.
Customer Data ❌ Confidential Absolute confidentiality is paramount for client trust and GDPR.
Active Security Vulnerabilities ❌ Confidential Public disclosure would be irresponsible.
Credentials, API Keys, Tokens ❌ Confidential Extreme-level confidential data.
Risk Exposure Values ❌ Confidential Specific financial impacts could enable targeted attacks.
Supplier Contract Details ❌ Confidential Commercial terms, costs, and performance details.

πŸ”§ Redaction and Publication Process

  1. Create Internal Version: The complete, unredacted document is created and stored in a secure, internal repository. This is the "source of truth."
  2. Create Public Version: A copy of the document is made for public release.
  3. Apply Redactions: Based on the table above, sensitive information is removed or replaced with generic descriptions (e.g., [REDACTED], [Generic Example], [Representative Values]).
  4. Review: The public version is reviewed by the CEO to ensure no sensitive information remains.
  5. Publish: The sanitized version is published to the public GitHub repository.

Redaction Examples

  • Financial Data: Replace specific costs with ranges or generic examples (e.g., "$50K+" becomes "High switching costs")
  • Risk Exposure: Remove specific dollar amounts, keep relative severity (e.g., "Critical risk" without "$1.8M exposure")
  • Supplier Details: Use generic examples instead of actual supplier names and contracts
  • Technical Details: Remove IP addresses, account IDs, specific configurations

🌐 Publication Channels

Primary Documentation Repository

  • GitHub Public: hack23/ISMS-PUBLIC - Complete public ISMS documentation
  • Corporate Website: Links to documentation for client access

Documentation Mirrors


πŸ“Š Metrics & Review

Publication Metrics

  • Documents Published: Framework complete with ongoing updates
  • Public/Confidential Ratio: Approximately 70% public framework, 30% redacted operational details
  • Client Engagement: Documentation views, security inquiries generated

Key Dependencies

From our comprehensive supplier management approach:

  • Cloud Infrastructure: Critical dependency with robust continuity planning
  • Development Platforms: High-impact services with documented alternatives
  • Financial Services: Regulatory-compliant banking and payment processing
  • Supporting Services: Managed risk profile across operational tools

Risk Management Overview

Our systematic approach includes:

  • Comprehensive Risk Assessment: Full spectrum risk identification and classification
  • Regular Risk Reviews: Ongoing monitoring and reassessment cycles
  • Risk Treatment Planning: Appropriate mitigation strategies based on impact analysis
  • Continuous Improvement: Regular updates to risk management processes

Review Schedule

  • Monthly: Review redaction effectiveness and update metrics
  • Quarterly: Update publication classifications and risk assessments
  • Annually: Complete transparency strategy review
  • Ad-hoc: Following security incidents or significant business changes

πŸ“‹ Document Control:
βœ… Approved by: James Pether SΓΆrling, CEO
πŸ“€ Distribution: Public
🏷️ Classification: Confidentiality: Public
πŸ“… Effective Date: 2025-09-10
⏰ Next Review: 2026-09-10
🎯 Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls