Skip to content
GitHubLinkedIn

Policies

This section contains LEF policies and procedures.

  • A policy defines what we require (expectations, constraints, responsibilities).
  • A procedure defines how we execute in a specific situation (incidents, vulnerabilities, recovery).

For step-by-step operational runbooks, see Infrastructure Operations.

AreaNotes
Governance & ISMSPolicy governance and ISO 27001 readiness.
Risk managementMethodology, risk register, and Statement of Applicability (SoA).
SuppliersSupplier security expectations and review approach.
AccessAuthentication, authorization, reviews, and revocation.
DataClassification, retention, deletion, and handling.
OperationsIncidents, vulnerabilities, and operational security procedures.
ContinuityBackups, recovery, and continuity planning.
People & legalConfidentiality anchors and people-side policy gaps.
PolicyNotes
Information classificationClassification levels and handling rules.
Access controlHow access is granted, reviewed, and revoked.
Incident responseHow we respond to and learn from security incidents.
Vulnerability managementHow we track, prioritize, and remediate vulnerabilities.
Backup and recoveryBackup strategy and recovery responsibilities.
Data retention and deletionRetention rules and secure deletion expectations.
Business continuity and disaster recoveryContinuity objectives, recovery strategy, and responsibilities.
NDA defaultsDefault NDA positions and negotiation guardrails.