Security Policy
At AXN Group (“AXN Group,” “we,” “our,” “us”), information security is fundamental to our mission of “Securing the Future, Powering Innovation.” As a leading cybersecurity and IT consulting firm, we are committed to maintaining the highest standards of security to protect the confidentiality, integrity, and availability of our systems, data, and the sensitive information entrusted to us by our clients.
This Security Policy establishes the framework for our comprehensive information security program and demonstrates our commitment to security excellence in all aspects of our operations.
- Scope and Applicability
1.1 Coverage
This policy applies to:
- All AXN Group employees, contractors, consultants, and temporary staff
- All information systems, networks, and data owned or operated by AXN Group
- All third-party services and vendors with access to AXN Group systems or client data
- All client data and information processed, stored, or transmitted by AXN Group
- All physical and virtual infrastructure supporting AXN Group operations
1.2 Information Classification
AXN Group classifies information according to the following categories:
- Public: Information that can be freely shared without risk
- Internal: Information for internal use that could cause minor harm if disclosed
- Confidential: Sensitive business information that could cause significant harm if disclosed
- Restricted: Highly sensitive information including client data, security credentials, and proprietary methodologies
- Security Governance Framework
2.1 Security Organization
- Chief Executive Officer: Ultimate accountability for information security program
- Chief Security Officer: Day-to-day management of security operations and compliance
- Security Team: Implementation and monitoring of security controls
- All Personnel: Responsibility for following security policies and reporting incidents
2.2 Regulatory Compliance
AXN Group maintains compliance with applicable laws and standards including:
- Ghana Cybersecurity Act, 2020 (Act 1038)
- Ghana Data Protection Act, 2012 (Act 843)
- Electronic Transactions Act, 2008 (Act 772)
- ISO 27001:2013 Information Security Management Systems
- NIST Cybersecurity Framework
- Industry-specific regulations as applicable to client engagements
- Security Principles
3.1 Core Security Objectives
- Confidentiality: Protect sensitive information from unauthorized access and disclosure
- Integrity: Ensure accuracy and completeness of information and systems
- Availability: Maintain reliable access to information and services when needed
- Accountability: Maintain records of security-relevant activities and decisions
- Non-repudiation: Ensure actions cannot be denied by the party that performed them
3.2 Security by Design
- Security considerations are integrated into all business processes and technology implementations
- Risk assessment is performed before implementing new systems or services
- Privacy and security requirements are addressed from project inception
- Regular security reviews are conducted throughout system lifecycles
- Risk Management
4.1 Risk Assessment Process
- Annual comprehensive risk assessments covering all business operations
- Quarterly targeted assessments for high-risk areas and new implementations
- Continuous monitoring of threat landscape and emerging vulnerabilities
- Risk treatment plans with defined timelines and responsible parties
4.2 Risk Tolerance
- Critical risks must be mitigated immediately
- High risks must be addressed within 30 days
- Medium risks must be addressed within 90 days
- Low risks are addressed based on business priorities and available resources
4.3 Business Continuity
- Recovery Time Objective (RTO): 4 hours for critical systems
- Recovery Point Objective (RPO): 1 hour maximum data loss for critical systems
- Business Impact Analysis updated annually
- Disaster recovery testing conducted semi-annually
- Administrative Safeguards
5.1 Access Control Management
- Role-Based Access Control (RBAC) implemented across all systems
- Principle of least privilege enforced for all user accounts
- Regular access reviews conducted quarterly
- Automated provisioning and de-provisioning for user lifecycle management
- Privileged access management with additional controls and monitoring
5.2 Human Resources Security
- Background verification conducted for all personnel handling sensitive data
- Confidentiality and non-disclosure agreements signed by all staff and contractors
- Security roles and responsibilities defined in job descriptions
- Termination procedures ensuring immediate access revocation and asset return
5.3 Training and Awareness
- Mandatory security awareness training for all personnel within 30 days of hire
- Annual refresher training with updated threat information and best practices
- Specialized training for security team members and privileged users
- Phishing simulation exercises conducted monthly
- Security metrics and reporting on training effectiveness
5.4 Policy and Procedure Management
- Comprehensive security policies covering all aspects of information security
- Regular policy reviews conducted annually or after significant changes
- Policy acknowledgment required from all personnel
- Exception management process for justified deviations from policies
- Technical Safeguards
6.1 Cryptographic Controls
- Encryption in Transit: TLS 1.3 or higher for all data transmissions
- Encryption at Rest: AES-256 encryption for all sensitive data storage
- Key Management: Hardware Security Modules (HSMs) for cryptographic key protection
- Digital Signatures: PKI-based signatures for document integrity and authentication
- Certificate Management: Automated certificate lifecycle management
6.2 Network Security
- Perimeter Security: Next-generation firewalls with intrusion prevention
- Network Segmentation: Micro-segmentation to limit lateral movement
- Wireless Security: WPA3 encryption and enterprise authentication
- VPN Access: Strong authentication and encryption for remote access
- DNS Security: Secure DNS resolution with threat intelligence integration
6.3 Endpoint Security
- Endpoint Detection and Response (EDR) on all devices
- Anti-malware protection with real-time scanning and updates
- Device encryption mandatory for all laptops and mobile devices
- Mobile Device Management (MDM) for corporate and BYOD devices
- Patch management with automated deployment for critical updates
6.4 Application Security
- Secure Software Development Lifecycle (SSDLC) for all custom applications
- Static and Dynamic Application Security Testing (SAST/DAST)
- Vulnerability scanning of all applications and web services
- Web Application Firewalls (WAF) protecting internet-facing applications
- API security with authentication, authorization, and rate limiting
6.5 Identity and Access Management
- Multi-Factor Authentication (MFA) required for all administrative access
- Single Sign-On (SSO) implementation across enterprise applications
- Privileged Access Management (PAM) with session recording and monitoring
- Identity governance with automated access certification processes
- Zero Trust Architecture principles applied to network access
6.6 Monitoring and Logging
- Security Information and Event Management (SIEM) for centralized log analysis
- 24/7 Security Operations Center (SOC) monitoring for threats
- User and Entity Behavior Analytics (UEBA) for anomaly detection
- Threat intelligence integration for proactive threat detection
- Log retention for minimum 1 year with 7-year archive for critical systems
- Physical and Environmental Security
7.1 Facility Security
- Multi-factor authentication required for facility access
- Video surveillance with 90-day retention for all entry points
- Visitor management with escort requirements for non-employees
- Secure areas with additional access controls for sensitive operations
- Asset tracking for all IT equipment and media
7.2 Environmental Controls
- Uninterruptible Power Supply (UPS) with generator backup
- Climate control maintaining optimal temperature and humidity
- Fire suppression with early detection and clean agent systems
- Redundant connectivity with multiple ISP providers
- Secure disposal procedures for all IT equipment and media
7.3 Data Center Security
- Tier III or higher certified data centers for critical operations
- Redundant systems ensuring 99.9% uptime availability
- Regular security audits of hosting facilities
- Compliance certifications (SOC 2, ISO 27001) required for all providers
- Third-Party Risk Management
8.1 Vendor Security Requirements
- Security assessments required for all vendors handling sensitive data
- Contractual security clauses in all vendor agreements
- Regular security reviews of critical vendor relationships
- Incident notification requirements from vendors within 24 hours
- Right to audit clause in all critical vendor contracts
8.2 Supply Chain Security
- Security questionnaires for all technology suppliers
- Software composition analysis for third-party code components
- Vendor risk ratings based on data sensitivity and business impact
- Alternative supplier identification for critical services
- Continuous monitoring of vendor security posture
- Incident Response and Management
9.1 Incident Response Team
- Incident Commander: Overall incident coordination and communication
- Security Analyst: Technical investigation and containment
- Legal Counsel: Regulatory and legal compliance guidance
- Communications: Internal and external stakeholder communication
- Business Representative: Business impact assessment and recovery priorities
9.2 Incident Classification
- Category 1 (Critical): Significant business impact, immediate response required
- Category 2 (High): Moderate business impact, response within 4 hours
- Category 3 (Medium): Limited business impact, response within 24 hours
- Category 4 (Low): Minimal impact, response within 72 hours
9.3 Response Procedures
- Detection and Analysis: 24/7 monitoring with automated alerting
- Containment and Eradication: Immediate isolation and threat removal
- Recovery and Post-Incident: System restoration and lessons learned
- Communication: Stakeholder notification per regulatory requirements
- Documentation: Detailed incident reports and evidence preservation
9.4 Notification Requirements
- Internal notification: Incident Response Team within 1 hour
- Client notification: Affected clients within 24 hours for data breaches
- Regulatory notification: Ghana Data Protection Commission within 72 hours
- Law enforcement: As required by law or business judgment
- Public disclosure: As required by regulations or business necessity
- Business Continuity and Disaster Recovery
10.1 Business Continuity Planning
- Annual Business Impact Analysis identifying critical processes
- Recovery strategies for people, processes, and technology
- Alternative work arrangements including remote work capabilities
- Communication plans for employees, clients, and stakeholders
- Testing and exercises conducted quarterly with lessons learned
10.2 Disaster Recovery
- Recovery sites geographically distributed and regularly tested
- Data backup with 3-2-1 strategy (3 copies, 2 different media, 1 offsite)
- Automated failover for critical systems where feasible
- Recovery testing conducted monthly for critical systems
- Recovery documentation maintained and regularly updated
- Data Protection and Privacy
11.1 Data Handling
- Data minimization principles applied to all data collection
- Purpose limitation ensuring data used only for stated purposes
- Retention schedules with automated deletion where possible
- Cross-border transfer controls and appropriate safeguards
- Data subject rights processes for access, correction, and deletion
11.2 Client Data Protection
- Contractual commitments clearly defined in client agreements
- Dedicated environments for client data processing
- Data segregation preventing cross-client data access
- Secure data transfer methods for client data exchange
- Data return or destruction upon contract termination
- Security Metrics and Reporting
12.1 Key Performance Indicators
- Mean Time to Detection (MTTD): Target < 4 hours
- Mean Time to Response (MTTR): Target < 1 hour for critical incidents
- Security Training Completion: Target 100% within 30 days
- Vulnerability Remediation: Critical within 72 hours, High within 30 days
- Backup Success Rate: Target 99.5% for all systems
12.2 Reporting Requirements
- Monthly security dashboards to executive leadership
- Quarterly risk assessments to board of directors
- Annual security program review with improvement recommendations
- Incident reports within 24 hours of resolution
- Compliance reports as required by regulations and contracts
- Compliance and Audit
13.1 Internal Audits
- Annual comprehensive security audit by independent assessors
- Quarterly focused audits on high-risk areas
- Continuous compliance monitoring through automated tools
- Audit findings tracking with remediation timelines
- Management attestation of control effectiveness
13.2 External Assessments
- Third-party penetration testing conducted annually
- Vulnerability assessments conducted quarterly
- Compliance audits as required by regulations and certifications
- Client security assessments as requested
- Industry benchmarking against security frameworks
- Security Training and Awareness
14.1 Training Program
- Role-based training tailored to specific job functions
- New hire orientation covering security policies and procedures
- Annual refresher training with updated threat information
- Specialized training for security team and privileged users
- Training effectiveness measurement through testing and metrics
14.2 Awareness Activities
- Monthly security newsletters with threat updates and tips
- Quarterly security briefings for all staff
- Phishing simulation campaigns with immediate feedback
- Security awareness events during National Cybersecurity Awareness Month
- Recognition programs for security-conscious behavior
- Emerging Technologies and Threats
15.1 Technology Risk Assessment
- Artificial Intelligence and Machine Learning security implications
- Internet of Things (IoT) device security requirements
- Cloud computing security considerations and controls
- Mobile computing security policies and technical controls
- Social media usage policies and monitoring
15.2 Threat Intelligence
- Continuous threat monitoring from multiple intelligence sources
- Threat hunting activities proactively searching for indicators of compromise
- Information sharing with industry partners and government agencies
- Threat modeling for new services and applications
- Security research participation in industry initiatives
- Policy Management and Updates
16.1 Review and Approval Process
- Annual policy reviews or after significant business changes
- Stakeholder consultation during policy development
- Executive approval required for all policy changes
- Version control and change documentation
- Communication plan for policy updates
16.2 Exception Management
- Formal exception process with risk assessment and approval
- Temporary exceptions with defined expiration dates
- Compensating controls required for approved exceptions
- Regular exception reviews to ensure continued validity
- Exception reporting to executive management
- Contact Information
Security Incident Reporting
24/7 Security Operations Center
Email: security@axngroupgh.com
Phone: [Insert 24/7 Security Hotline]
Policy Questions and General Inquiries
Information Security Team
Email: infosec@axngroupgh.com
Executive Contact
Chief Security Officer
Email: cso@axngroupgh.com
Corporate Headquarters
AXN Group
Website: axngroupgh.com
- Policy Compliance and Enforcement
18.1 Compliance Requirements
- All personnel must acknowledge receipt and understanding of this policy
- Compliance with this policy is a condition of employment and contract engagement
- Regular compliance assessments will be conducted through audits and monitoring
- Non-compliance may result in disciplinary action up to and including termination
18.2 Violation Reporting
- Security violations must be reported immediately to the Security Team
- Anonymous reporting mechanisms are available for sensitive matters
- No retaliation will be tolerated for good faith reporting of violations
- All reports will be investigated promptly and thoroughly
- Governing Law and Jurisdiction
This Security Policy is governed by and construed in accordance with the laws of the Republic of Ghana, including:
- Ghana Cybersecurity Act, 2020 (Act 1038)
- Ghana Data Protection Act, 2012 (Act 843)
- Electronic Transactions Act, 2008 (Act 772)
- Companies Act, 2019 (Act 992)
- Document Control
|
Version |
Date |
Author |
Description of Changes |
|
1.0 |
[Date] |
Chief Security Officer |
Initial version |
Next Scheduled Review: [Date + 12 months]
Document Classification: Internal
Retention Period: 7 years after superseded
This Security Policy demonstrates AXN Group Solutions’ unwavering commitment to information security excellence and our dedication to protecting the assets entrusted to us by our clients and stakeholders. For questions or clarifications, please contact our Information Security Team.
