Skip to content
GitHubLinkedIn

Information security policy (draft)

This policy captures the top-level information security intent for LEF. It is designed to support ISO/IEC 27001 readiness, and should be finalized only when the ISMS scope is explicitly approved.

OwnerInformation Security Officer
Contactinfra@lef.tec.br
Version0.1
Last updated2025-12-24
Review cadenceAnnual (and on major changes)

Define LEF’s management intent and direction for protecting information and systems, and establish the foundation for an Information Security Management System (ISMS).

This policy applies to the ISMS scope defined in ISMS scope (draft).

LEF commits to:

  • Protect the confidentiality, integrity, and availability of information within scope.
  • Apply a risk-based approach to selecting and improving controls (see Risk management).
  • Comply with applicable legal, regulatory, and contractual requirements within scope.
  • Ensure access is based on least privilege and need-to-know.
  • Respond to incidents and vulnerabilities in a consistent, documented way.
  • Continually improve the ISMS through review, audits, and corrective actions.
  • Information Security Officer: maintains the ISMS documentation set and coordinates improvement activities.
  • Control owners: maintain the specific policies/procedures for their area.
  • All collaborators: follow policies, report security issues promptly, and protect credentials and data.

Use these as the canonical requirements:

Exceptions to policy requirements should be documented as risk decisions and mapped to treatment/acceptance in the risk register and SoA.