Back to Legal
LG-01·
Schedule SR – Security Requirements (ISO/IEC 27001-Aligned
- Purpose and Scope
This Schedule sets out the Supplier’s information security requirements applicable to the provision of the Services, including the Fortiv software platform and related professional services.
The requirements in this Schedule are designed to align with ISO/IEC 27001:2022 Annex A controls and support the confidentiality, integrity, and availability of information. - Information Security Governance
(ISO 27001 Annex A: A.5)- The Supplier shall maintain an information security management framework proportionate to the nature, scope, and risk profile of the Services.
- The Supplier shall define and maintain:
- information security policies,
- roles and responsibilities, and
- management oversight of information security.
- Security policies shall be reviewed periodically and updated as appropriate.
- The Supplier shall maintain an information security management framework proportionate to the nature, scope, and risk profile of the Services.
- Risk Management
(ISO 27001: Clauses 6 & 8; Annex A supporting)- The Supplier shall identify and assess information security risks relevant to the Services.
- Appropriate controls shall be implemented to address identified risks, taking into account:
- likelihood and impact,
- industry best practice, and
- proportionality.
- Human Resource Security
(ISO 27001 Annex A: A.6)- Personnel with access to Customer Data shall be:
- subject to confidentiality obligations, and
- provided with appropriate security awareness training.
- Access rights shall be revoked promptly upon termination or change of role.
- Personnel with access to Customer Data shall be:
- Asset Management and Information Handling
(ISO 27001 Annex A: A.5, A.8)- The Supplier shall maintain an inventory of information assets relevant to the Services.
- Customer Data shall be classified and handled in accordance with its sensitivity.
- Secure data handling and disposal procedures shall be applied where applicable.
- Access Control
(ISO 27001 Annex A: A.5, A.8)- Logical access to systems shall be:
- restricted to authorised users,
- based on least privilege, and
- reviewed periodically.
- Strong authentication mechanisms shall be used, including multi-factor authentication where technically appropriate.
- Logical access to systems shall be:
- Cryptography
(ISO 27001 Annex A: A.8)- Industry-standard cryptographic controls shall be used to protect Customer Data:
- in transit, and
- at rest where appropriate.
- Cryptographic keys shall be protected against unauthorised access.
- Industry-standard cryptographic controls shall be used to protect Customer Data:
- Physical and Environmental Security
(ISO 27001 Annex A: A.7)- Physical security controls shall be implemented for facilities used to deliver the Services.
- Where third-party hosting or cloud providers are used, equivalent physical security controls shall be relied upon.
- Operations Security
(ISO 27001 Annex A: A.8)- The Supplier shall implement operational procedures to ensure secure system operation, including:
- change management,
- malware protection, and
- vulnerability management.
- Systems shall be monitored for security-relevant events where appropriate.
- The Supplier shall implement operational procedures to ensure secure system operation, including:
- Network and Infrastructure Security
(ISO 27001 Annex A: A.8)- Network controls shall be implemented to protect systems and data from unauthorised access.
- Reasonable measures shall be taken to protect against:
- intrusion,
- denial-of-service attacks, and
- other common threats.
- Supplier and Subcontractor Security
(ISO 27001 Annex A: A.5)- Subcontractors with access to Customer Data shall be subject to written security obligations no less protective than those set out in this Schedule.
- The Supplier remains responsible for the performance of its subcontractors under the Agreement.
- Incident Management
(ISO 27001 Annex A: A.5)- The Supplier shall maintain incident management procedures covering:
- identification,
- response,
- mitigation, and
- post-incident review.
- The Supplier shall notify the Customer without undue delay of any material information security incident affecting Customer Data or Service availability.
- The Supplier shall maintain incident management procedures covering:
- Business Continuity and Disaster Recovery
(ISO 27001 Annex A: A.5; ISO 22301 alignment)- The Supplier shall maintain business continuity and disaster recovery measures appropriate to the Services.
- Backup and recovery procedures shall be implemented and tested periodically.
- Logging and Monitoring
(ISO 27001 Annex A: A.8)- Security-relevant events shall be logged where appropriate.
- Logs shall be protected from unauthorised access and retained for a reasonable period.
- Compliance and Assurance
(ISO 27001 Annex A: A.5)- The Supplier shall maintain compliance with applicable information security laws and regulations.
- Upon reasonable request, the Supplier shall provide:
- relevant policies,
- certifications, or
- high-level audit or assurance information.
- On-site audits are excluded unless expressly agreed in writing
- Continuous Improvement
(ISO 27001 Clause 10)
The Supplier shall use reasonable efforts to continuously improve its information security controls, taking into account:- audit findings,
- incidents,
- changes to threats, and
- industry developments.
