SOLUCIONES INFORMÁTICAS AMBIENTALES SL relies on network, information and cybersecurity systems to achieve its objectives and ensure the continuity of its operations. These systems must be managed diligently, taking appropriate measures to protect them from threats and risks that could compromise the confidentiality, integrity, traceability, authenticity or availability of the information processed or the services provided. Likewise, cyber resilience and the ability to respond to incidents affecting critical infrastructure must be guaranteed.
The objective of network, information and cybersecurity systems security is to guarantee the resilience, integrity and availability of data and the continued provision of essential and critical services, through an approach based on risk management, prevention, continuous monitoring and efficient response to cybersecurity incidents.
The objective of network, information and cybersecurity systems security is to guarantee the resilience, integrity and availability of data and the continued provision of essential and critical services, through an approach based on risk management, prevention, continuous monitoring and efficient response to cybersecurity incidents.
Different departments must ensure that the security of network and information systems is an integral part of every stage of the system life cycle, from conception to decommissioning, including development, procurement, and operational decisions. Cybersecurity requirements and funding needs must be identified and included in strategic planning, requests for proposals, and tender documents for ICT projects, ensuring resilience, risk management, and security in the supply chain.
The organisation must be prepared to prevent, detect, react to, and recover from any incident that may affect its critical systems.
The general scope of the information systems associated with the business processes that are subject to UNE ISO/IEC 27001 certification is as follows:
"The information systems that support the following services:
In accordance with the current Statement of Applicability."
The organisation's management is committed to facilitating and providing the necessary resources for the establishment, implementation, maintenance and improvement of the Information Security Management System, as well as demonstrating leadership and commitment to it through the creation of the Security Committee and its functions and responsibilities. The mission of this management is:
This commitment extends to the stakeholders described in the context of the ISMS, in order to satisfy their interests and expectations in terms of information security.
At a strategic level, information security will have the commitment and support of all levels of management within the organisation, so that it can be coordinated and integrated with other strategic initiatives and their implementation requirements, to form a completely coherent and effective framework.
The organisation has implemented various security measures proportional to the nature of the information and services to be protected, taking into account its risk analysis and statement of applicability.
The organisation processes personal data. The data protection procedures, to which only authorised persons shall have access, set out the processing operations concerned and the persons responsible for them. All the organisation's information systems shall comply with the security levels required by the regulations for the nature and purpose of the personal data collected in the aforementioned procedures.
All systems subject to this policy must carry out a risk analysis, assessing the threats and risks to which they are exposed. This analysis will be repeated:
In order to harmonise risk analyses, the Security Committee shall establish a benchmark assessment for the different types of information handled and the different services provided. The Security Committee shall streamline the availability of resources to meet the security needs of the different systems, promoting horizontal investments.
This Policy will be implemented through Security Regulations that address specific aspects. The Security Regulations will be made available to all members of the organisation who need to be aware of them, particularly those who use, operate or manage information and communications systems.
When the organisation provides services to third parties, they will be made aware of this Information Security Policy, channels will be established for reporting and coordination with the respective Security Committees, and procedures will be established for responding to security incidents.
When the organisation subcontracts services to third parties or transfers information to third parties, within the framework of providing services to third parties, they shall be made aware of this Security Policy and the Security Regulations pertaining to such services or information. Such third parties shall be subject to the obligations set out in these regulations and may develop their own operating procedures to comply with them. Specific procedures for reporting and resolving incidents shall be established. It shall be ensured that third-party personnel are adequately aware of security matters, at least to the same level as that established in this Policy.
When any aspect of the Policy cannot be satisfied by a third party as required in the preceding paragraphs, a report shall be required from the Security Manager specifying the risks involved and how to address them. Approval of this report shall be required by those responsible for the information and services affected before proceeding.


