Skip to content
TECHNOMATON | Docs SAI Certified Trainers

Security Governance

Version: 1.0 | Effective from: 1 January 2026


1. Purpose

This directive defines the rules for cybersecurity management in compliance with NIS2 and the Cybersecurity Act.


2. Scope

This directive applies to:

  • All information systems
  • All employees and contractors
  • All vendors with system access
  • Physical security of ICT

3. ISMS (Information Security Management System)

3.1 ISMS Structure


4. Asset Management

4.1 Asset Inventory

Every asset must be documented:

FieldDescription
Asset IDUnique identifier
NameDescriptive name
TypeHardware / Software / Data / Service
Responsible personWho is responsible
CriticalityCritical / High / Medium / Low
LocationPhysical/logical location
ClassificationConfidential / Internal / Public

4.2 Asset Criticality

LevelDefinitionRTORPO
CriticalOutage = business stop<4h<1h
HighSignificant business impact<8h<4h
MediumLimited impact<24h<8h
LowMinimal impact<72h<24h

5. Technical Controls

5.1 Mandatory controls

ControlRequirementStatus
Encryption at restAES-256 for all dataRequired
Encryption in transitTLS 1.3 for all APIsRequired
Access ControlMFA + RBACRequired
Patch ManagementCritical <7 days, High <30 daysRequired
LoggingCentralized SIEM, 1-year retentionRequired
BackupDaily, tested monthlyRequired
FirewallPerimeter + internalRequired
AntimalwareEndpoint protectionRequired
IDS/IPSNetwork intrusion detectionRecommended
DLPData Loss PreventionRecommended

5.2 Encryption Standards

TypeAlgorithmKey Length
SymmetricAES256-bit
AsymmetricRSA4096-bit
HashingSHA256-bit+
TLS1.3N/A

5.3 Access Control

Access Control Principles:

  • Least Privilege — minimum necessary permissions
  • Need-to-Know — access only to required data
  • Separation of Duties — division of responsibilities
  • MFA — for all admin accounts
  • Regular Review — quarterly access audit

6. Organizational Controls

6.1 HR Security

PhaseControl
Pre-employmentBackground check (depending on position)
OnboardingNDA, Security training, Policy acknowledgment
During employmentRegular training, Access reviews
OffboardingAccess removal (24h), Device return, Exit interview

6.2 Training Requirements

RoleTrainingFrequency
All employeesSecurity awarenessAnnually
All employeesPhishing simulationQuarterly
IT staffTechnical securitySemi-annually
DevelopersSecure codingSemi-annually
ManagementSecurity governanceAnnually

7. Physical Security

7.1 Security zones

ZoneDescriptionAccess
PublicReception, lobbyUnrestricted
OfficeOfficesBadge + PIN
RestrictedServer room, DCBadge + PIN + biometrics
Highly RestrictedHSM, key storageDual control

7.2 Data Center Security

  • Physical access logging
  • Video surveillance
  • Environmental controls (HVAC, fire suppression)
  • UPS + generator backup
  • Visitor escort policy

8. Vulnerability Management

8.1 Scanning Schedule

TypeFrequencyScope
Network scanWeeklyAll subnets
Vulnerability scanMonthlyAll systems
Web app scanMonthlyAll web apps
Penetration testAnnuallyFull scope

8.2 Patch Management SLA

SeveritySLAApproval
Critical7 daysEmergency change
High30 daysStandard change
Medium90 daysStandard change
LowNext releaseStandard change

9. Business Continuity

9.1 BCM Components

ComponentDescription
BIABusiness Impact Analysis
BCPBusiness Continuity Plan
DRPDisaster Recovery Plan
IRPIncident Response Plan
CMPCrisis Management Plan

9.2 Recovery Objectives

SystemRTORPO
Production DB4h1h
Web services2h1h
Email8h4h
Internal apps24h8h

9.3 Testing Schedule

TestFrequency
Backup restorationMonthly
Failover testQuarterly
DR drillSemi-annually
Full BCP testAnnually

10. Vendor Security

10.1 Vendor Assessment

Before onboarding a vendor with data access:

  • Security questionnaire
  • Review of certifications (ISO 27001, SOC 2)
  • Contract review (security clauses)
  • DPA (if personal data)
  • NDA

10.2 Ongoing Monitoring

ActivityFrequency
Security reviewAnnually
Access auditQuarterly
Incident reviewOn incident
Contract reviewOn renewal

11. Audit & Compliance

11.1 Audit Schedule

TypeFrequencyScope
Internal auditQuarterlyRotating areas
External auditAnnuallyFull ISMS
Compliance checkSemi-annuallyNIS2, GDPR
Penetration testAnnuallyFull scope

11.2 Certifications

CertificationStatusValidity
ISO 27001TargetQ3 2026
SOC 2 Type IIOptional

12. Metrics & KPIs

KPITargetMeasurement
Patch compliance>95%Monthly
Vulnerability remediation<30 days (high)Monthly
Security training completion100%Quarterly
Incident response time<4h (critical)On incident
MFA adoption100% (admin)Monthly

13. Policy Review

  • Monthly: Security metrics review
  • Quarterly: Policy effectiveness review
  • Annually: Full policy review + CISO approval

Next review: Q2 2026