Skip to content

Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure

License

Notifications You must be signed in to change notification settings

Hack23/ISMS-PUBLIC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Hack23 Logo

🌐 Hack23 AB β€” ISMS Transparency Plan

Security Through Transparency and Open Documentation
Demonstrating Security Excellence Through Public ISMS Disclosure

Owner Version Effective Date Review Cycle

πŸ“‹ Document Owner: CEO | πŸ“„ Version: 2.1 | πŸ“… Last Updated: 2025-11-10 (UTC)
πŸ”„ Review Cycle: Annual | ⏰ Next Review: 2026-11-10


🎯 Purpose Statement

Hack23 AB's core philosophy is that transparency enhances security rather than diminishing it. This document outlines our strategy for making our Information Security Management System (ISMS) public, demonstrating our expertise and building trust, while carefully protecting sensitive information that could introduce risk.

This plan defines what is considered public, what is confidential, and the processes for maintaining our commitment to security through transparency.

β€” James Pether SΓΆrling, CEO/Founder


πŸ“œ Guiding Principles

  1. Default to Public: Policies, frameworks, and high-level procedures will be public unless a specific, documented risk is identified.
  2. Demonstrate, Don't Expose: The goal is to showcase our security maturity and processes, not to reveal secrets that could be exploited.
  3. Redact, Don't Hide: When a document contains a mix of public and sensitive information, we will redact the sensitive parts and publish the rest.
  4. Clarity and Rationale: The reason for keeping any information confidential will be clearly documented internally.

πŸ“Š Information Classification for Publication

This table defines the publication status of ISMS documents and the rationale.

Document / Information Type Publication Status Rationale & Redaction Rules
πŸ” Core Policies & Frameworks
πŸ” Information Security Policy βœ… Public Demonstrates overall security posture. No sensitive details.
🏷️ Classification Framework βœ… Public Core to our methodology; showcases our approach to risk.
πŸ”“ Open Source Policy βœ… Public Aligns with our open-source philosophy.
πŸ“ Style Guide βœ… Public Shows our commitment to quality and consistency.
πŸ› οΈ Operational Policies
πŸ”‘ Access Control Policy βœ… Public High-level policy is public. Specific roles and access lists are confidential.
βœ… Acceptable Use Policy βœ… Public Behavioral expectations and usage standards public. Demonstrates security culture and professional conduct.
🏠 Physical Security Policy βœ… Public Home office security framework and device protection standards public. Specific home addresses confidential.
πŸ”’ Cryptography Policy βœ… Public Approved algorithms and standards are public. Key management procedures are confidential.
πŸ› οΈ Secure Development Policy βœ… Public The framework is public. Specific tool configurations are confidential.
🌐 Network Security Policy βœ… Public Network architecture principles public. Specific configurations confidential.
πŸ“ Change Management βœ… Public Process framework public. Specific change details confidential.
πŸ” Vulnerability Management βœ… Public Process public. Active vulnerabilities confidential.
πŸ’Ύ Backup & Recovery Policy βœ… Public Policy framework public. Specific procedures confidential.
πŸ€– AI Governance Policy βœ… Public AI governance framework and EU AI Act compliance public. AI vendor assessments confidential.
πŸ›‘οΈ OWASP LLM Security Policy βœ… Public Comprehensive LLM security framework demonstrating OWASP Top 10 alignment and implementation transparency. Shows foundation strength while clearly identifying future development areas.
🎯 Threat Modeling Policy βœ… Public STRIDE methodology and threat assessment framework public. Specific threat intelligence confidential.
πŸ“‹ Management & Governance
πŸ’» Asset Register ⚠️ Redacted Complete asset inventory public including all systems, services, and configurations. Only specific credentials, API keys, and account numbers replaced with [REDACTED].
πŸ“‰ Risk Register ⚠️ Redacted Complete risk framework and all risks public. Only specific financial impact values replaced with [REDACTED].
πŸ”— Third-Party Management βœ… Public Complete policy framework and all procedures public.
🏒 Supplier Security Posture ⚠️ Redacted Complete supplier assessments public including all details. Only specific contract pricing and sensitive commercial terms replaced with [REDACTED].
🀝 External Stakeholder Registry βœ… Public Professional network and regulatory contacts demonstrate stakeholder engagement and compliance readiness.
🚨 Response & Recovery Plans
🚨 Incident Response Plan βœ… Public Complete process framework and all procedures public.
πŸ”„ Business Continuity Plan βœ… Public Complete strategies and all recovery procedures public.
πŸ†˜ Disaster Recovery Plan βœ… Public Complete architecture and all technical procedures public.
πŸ“Š Compliance & Legal
βœ… Compliance Checklist βœ… Public Demonstrates our commitment to transparency and provides a clear, auditable trail of our compliance posture against key frameworks.
🏷️ Data Classification Policy βœ… Public The classification levels and handling rules are public. The classification of specific datasets is confidential.
🏒 Company Documentation
πŸ“Š Aktiebok ❌ Confidential Share register details confidential.
πŸ“Š Annual Accounts βœ… Public Filed annual reports are public record.
πŸ“‘ Articles of Association βœ… Public Corporate governance structure public.
πŸ“‹ Business Plan ❌ Confidential Financial projections, strategic roadmap, and revenue models confidential.
πŸ“Š Business Strategy ❌ Confidential Strategic plans and business tactics confidential.
🏒 Company Information ❌ Confidential Corporate structure and internal operations.
πŸ“„ Copyright Assignment Agreement ❌ Confidential Legal agreements and IP management confidential.
πŸ” Information Security Strategy βœ… Public Strategic security initiatives and competitive security positioning differentiation through radical transparency.
πŸ“… Marketing Plan ❌ Confidential Tactical marketing implementation, campaigns, and operational details confidential.
πŸ“ˆ Marketing Strategy ❌ Confidential Marketing strategies and competitive analysis confidential.
🀝 Stakeholders Overview ❌ Confidential Internal stakeholder alignment and strategic mapping confidential.
❌ Sensitive Information
Personal Data (CEO, future employees) ❌ Confidential Per GDPR and privacy best practices.
Financial Records & Bank Details ❌ Confidential Per Swedish Bookkeeping Act and security best practices.
Customer Data ❌ Confidential Absolute confidentiality is paramount for client trust and GDPR.
Active Security Vulnerabilities ❌ Confidential Public disclosure would be irresponsible.
Credentials, API Keys, Tokens ❌ Confidential Extreme-level confidential data.
Risk Exposure Values ❌ Confidential Specific financial impacts could enable targeted attacks.
Supplier Contract Details ❌ Confidential Commercial terms, costs, and performance details.

πŸ”§ Redaction and Publication Process

Radical Transparency Approach

Hack23 AB practices radical transparency - we publish complete ISMS documents with only specific sensitive values redacted. This demonstrates our security maturity and operational excellence while protecting only the most sensitive information.

What We Publish (Everything):

  • βœ… Complete processes, procedures, and technical details
  • βœ… All system configurations, architectures, and operational procedures
  • βœ… All contact information (roles, escalation paths, response procedures)
  • βœ… All supplier names, assessments, and security postures
  • βœ… All risk assessments, risk details, and mitigation strategies
  • βœ… Complete asset inventories with all systems and services

What We Redact (Minimal):

  • πŸ”’ Specific credentials, API keys, passwords, tokens
  • πŸ”’ Specific account numbers, account IDs (replaced with [REDACTED])
  • πŸ”’ Specific financial impact amounts in risks (e.g., "$1.8M" β†’ [REDACTED])
  • πŸ”’ Specific contract pricing and commercial terms
  • πŸ”’ Personal phone numbers and personal email addresses

Publication Process

  1. Create Internal Version: The complete document is created as the "source of truth."
  2. Create Public Version: An identical copy is made for public release.
  3. Apply Minimal Redactions: Only specific sensitive VALUES are replaced with [REDACTED] - structure and content remain intact.
  4. Review: The CEO reviews to ensure only appropriate values are redacted.
  5. Publish: The document is published to the public GitHub repository.

Redaction Examples

  • Credentials: password: "abc123" becomes password: [REDACTED]
  • Account Numbers: Account: 172017021075 becomes Account: [REDACTED]
  • Financial Risk Values: ALE: €65,700 becomes ALE: [REDACTED]
  • Personal Contact: CEO: +46-XXX-XXX becomes CEO: [REDACTED]
  • Contract Pricing: $50/month becomes [REDACTED]/month

Everything else remains public and unredacted.


🌐 Publication Channels

Primary Documentation Repository

  • GitHub Public: hack23/ISMS-PUBLIC - Complete public ISMS documentation
  • Corporate Website: Links to documentation for client access

Documentation Mirrors


πŸ“Š Metrics & Review

Publication Metrics

  • Documents Published: Framework complete with ongoing updates
  • Public/Confidential Ratio: Approximately 70% public framework, 30% redacted operational details
  • Client Engagement: Documentation views, security inquiries generated

Key Dependencies

From our comprehensive supplier management approach:

  • Cloud Infrastructure: Critical dependency with robust continuity planning
  • Development Platforms: High-impact services with documented alternatives
  • Financial Services: Regulatory-compliant banking and payment processing
  • Supporting Services: Managed risk profile across operational tools

Risk Management Overview

Our systematic approach includes:

  • Comprehensive Risk Assessment: Full spectrum risk identification and classification
  • Regular Risk Reviews: Ongoing monitoring and reassessment cycles
  • Risk Treatment Planning: Appropriate mitigation strategies based on impact analysis
  • Continuous Improvement: Regular updates to risk management processes

Review Schedule

  • Monthly: Review redaction effectiveness and update metrics
  • Quarterly: Update publication classifications and risk assessments
  • Annually: Complete transparency strategy review
  • Ad-hoc: Following security incidents or significant business changes

πŸ“‹ Document Control:
βœ… Approved by: James Pether SΓΆrling, CEO
πŸ“€ Distribution: Public
🏷️ Classification: Confidentiality: Public
πŸ“… Effective Date: 2025-09-22
⏰ Next Review: 2026-09-22
🎯 Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls