Ga naar hoofdinhoud

Information Security Policy

Scope (ISO 27001:2022 §4.3)

This Information Security Management System covers all information assets related to the design, development, implementation, and support of open-source software solutions for digital government infrastructure, including:

  • Source code and repositories on GitHub
  • Customer data processed via Conduction's software and hosting
  • Internal systems (Google Workspace, Jira, Passwork, development environments)
  • Employee devices (BYOD) used for company work

Delivered from the Netherlands by Conduction B.V. employees and contractors — including remote workers.

Purpose

Conduction is committed to protecting the confidentiality, integrity, and availability of information it handles — including customer data, internal systems, and the open-source software it develops and operates.

This policy establishes the framework for Conduction's Information Security Management System (ISMS) in accordance with ISO 27001:2022.

Scope

This policy applies to:

  • All information assets owned or processed by Conduction
  • All employees, contractors, and third parties with access to Conduction systems
  • All systems, services, and software developed and operated by Conduction

Security Objectives (ISO 27001:2022 §6.2)

ObjectiveMeasurable targetResponsibleReview
Prevent unauthorized accessZero unauthorized access incidents per yearQuality & Safety LeadMonthly (MT quality meeting)
System availabilityCritical systems ≥ 99.5% uptime (status.commonground.nu)Operations LeadMonthly
Incident responseSecurity incidents acknowledged within 4 business hoursQuality & Safety LeadPer incident
Vulnerability managementCritical/high CVEs patched within 30 daysDevelopment LeadContinuous (CI/CD)
Employee awarenessAll employees complete annual security awareness sessionQuality & Safety LeadAnnually

Actual performance is tracked in the internal monitoring spreadsheet and reviewed during MT quality meetings.

Roles and Responsibilities

RoleResponsibility
ManagementApprove and resource the ISMS; review annually
Quality & Safety LeadOwn and maintain the ISMS; coordinate audits and reviews
All employeesFollow security procedures; report incidents and suspected incidents promptly
Development LeadEnsure secure development practices are applied in all software delivery

See organisation for full role descriptions.

Key Controls

The following controls are in effect (ISO 27001:2022 Annex A):

  • Access control (A.5.15): Access to systems is role-based and granted on a need-to-know basis
  • Acceptable use (A.5.10): Company systems and data are used only for authorised purposes
  • Cryptography (A.8.24): Sensitive data in transit and at rest is encrypted
  • Supplier relationships (A.5.19): Third-party suppliers with access to data are assessed and contractually bound
  • Incident management (A.6.8): All suspected incidents must be reported — see Incident Reporting
  • Business continuity (A.5.29): Critical services have documented recovery procedures

Communication to Employees

This policy is communicated to all employees via this documentation site and during onboarding. Employees are required to acknowledge this policy. Questions or concerns can be directed to the Quality & Safety Lead or raised via a GitHub Issue.

ISO 27001:2022 reference: §5.2 — Information Security Policy; Annex A.5.1 Last review: April 2026 Next review: annual management review cycle (February 2027)