Soldato
- Joined
- 27 Dec 2005
- Posts
- 17,316
- Location
- Bristol
We're tendering for a public sector project and although half the questions aren't relevant we've been lumped with an Information Security Questionnaire.
I'm having difficulty answering a lot of the questions, simply because we're a small company (3 people) and have no experience or need for a lot of the requirements. However they're obviously all required now and we'd need to put them into action should we win the tender, so I was wondering if anyone could point me in the direction of some answers/guidance/what we should be doing etc.
Questions such as:
3.1 Does your company have policies which refer to information security and data protection? If yes, provide a copy.
5.7 Does the company manage servers and network devices using secure encrypted protocols only?
5.12 Will personal data or sensitive business data be encrypted both in transit and in storage? If so, please describe key management practices and the encryption algorithms used (e.g. SSL, 3DES, AES).
5.15 Does the company correlate security events from different sources?
6.2 Are permissions for access to written or printed material and access to computer systems (i.e. physical and logical access) periodically reviewed and if so how often?
etc etc
Completely understand that these things need to be in place but when there's just 3 of us on 3 computers, in a completely non-IT related sector where data isn't confidential we've not really needed to do much! And have no idea what to put for some of the more complex things (ie what algorithms are used for encrypting stored data).
Thanks in advance!
I'm having difficulty answering a lot of the questions, simply because we're a small company (3 people) and have no experience or need for a lot of the requirements. However they're obviously all required now and we'd need to put them into action should we win the tender, so I was wondering if anyone could point me in the direction of some answers/guidance/what we should be doing etc.
Questions such as:
3.1 Does your company have policies which refer to information security and data protection? If yes, provide a copy.
5.7 Does the company manage servers and network devices using secure encrypted protocols only?
5.12 Will personal data or sensitive business data be encrypted both in transit and in storage? If so, please describe key management practices and the encryption algorithms used (e.g. SSL, 3DES, AES).
5.15 Does the company correlate security events from different sources?
6.2 Are permissions for access to written or printed material and access to computer systems (i.e. physical and logical access) periodically reviewed and if so how often?
etc etc
Completely understand that these things need to be in place but when there's just 3 of us on 3 computers, in a completely non-IT related sector where data isn't confidential we've not really needed to do much! And have no idea what to put for some of the more complex things (ie what algorithms are used for encrypting stored data).
Thanks in advance!