Controls

The information below summarises the core security controls implemented by the ISF to protect Member data on ISF Tools platforms.

For further information relating to these controls, or for additional security queries, please contact tools@securityforum.org

Security Management and Governance

Control

Status

Governance and Management Commitment

Executive leadership formally endorses all security policies.

A defined management structure oversees information security, including an ISMS Manager and Security Committee.

Regular reviews and updates of policies and controls are mandated.

Core security objectives are defined and communicated across the organisation.

All security practices align with and leverage the ISF's Standard of Good Practice for Information Security.

ISF monitors and audits compliance with security policies.

Non-compliance is proactively identified and remediated by the Security Committee and senior leadership.

Risk Management and Business Continuity

Regular risk assessments are conducted on key systems, with risk managed in line with business objectives.

ISF maintains a formal Business Continuity Plan with defined Recovery Time Objectives.

Recovery Point Objectives and Maximum Acceptable Outages are defined for all critical systems.

The Business Continuity Plan is tested annually and updated as required.

A formal incident response plan is in place with defined roles, responsibilities, and escalation procedures.

A Critical Incident Management Team coordinates response and recovery activities when the BCP is invoked.

Employee Security Management

All staff must read and accept security policies.

Mandatory security awareness training is provided during onboarding for all new employees.

All ISF Tools staff are security-screened as part of employee background checks prior to employment.

All staff are required to undergo security and data privacy training on an annual basis.

All staff must safeguard ISF data and equipment when working remotely.

Positive security behaviours are actively encouraged and highlighted to promote a culture of transparency.

Use of personal devices (BYOD) is restricted and subject to security controls.

Only IT-approved hardware, software, and cloud services may be used.

Use of personal devices (BYOD) is restricted and subject to security controls.

A whistleblower policy is maintained and communicated to all staff, that enables employees to raise instances of wrong doing.

Technical Security Controls

Control

Status

Infrastructure and Platform Security

ISF Tools platforms are hosted exclusively on Microsoft Azure infrastructure within the United Kingdom.

ISF Live is hosted on a Salesforce instance, built on AWS infrastructure in Sweden.

Data centres maintain ISO 27001, SOC 2, and other industry certifications. See here: Azure compliance documentation

Azure availability zones are utilised to ensure service resilience.

Infrastructure is monitored for uptime and efficiency, with appropriate alerting and monitoring.

All systems are monitored for capacity, with systems able to scale in times of increased utilisation.

Capacity requirements are reviewed regularly to ensure scaling limits are appropriate.

Production systems operate in isolated network segments with restricted access controls.

Network traffic is monitored and logged for security analysis.

Access to next-generation firewall configuration is heavily restricted to authorised employees in specified circumstances only.

Data Protection, Encryption and Backup

All sensitive data is protected using industry-standard AES-256 encryption for data at rest and in transit.

Data transmission utilises current TLS protocols to ensure secure communication.

Azure Key Vault is utilised for encryption key management in Microsoft Azure environments.

Daily backups are performed and stored on redundant Azure West infrastructure.

Geo-redundant backups are maintained for additional protection.

Backups are tested regularly for both integrity and restoration suitability.

Access Control and Authentication

Access to systems and data is restricted to authorised users only.

Segregation of duties is enforced.

Remote access to ISF Tools infrasturcture requires authorised, encrypted connections.

Remote access to ISF Tools infrastructure requires approval from a senior manager and from the IT team.

Members can make use of SSO/FIAM connections to ISF Tools.

Application Security and Testing

ISF and its partners follow secure coding practices throughout the software development lifecycle.

Security considerations are integrated from initial design through deployment and maintenance.

ISF conducts regular vulnerability scanning of applications and infrastructure.

All identified vulnerabilities are reviewed internally and remediated based on risk assessment.

Third-party penetration tests are undertaken annually. Summary reports are available to ISF Members.

Data Privacy and Compliance

Control

Status

Privacy Compliance

ISF complies with UK GDPR across all jurisdictions.

A Data Privacy Officer oversees lawful data processing, transparency, and safeguarding of personal data.

All personal data is stored in Stockholm (Sweden) and replicated on ISF Tools platforms in the United Kingdom.

Personal data replication is minimised to ensure as little personal data as possible is transfered.

Data Collection & Processing

Personal data is collected only for specific, lawful purposes.

Data is processed fairly, transparently, and only for its original intended use.

A data privacy notice is made available to all users. See here: ISF Privacy Notice

A formal classification scheme governs how data is labelled, stored, transmitted, and shared.

No special categories of personal data are collected, except in specific and defined circumstances (e.g. information relating to accessibility requirements and dietary concerns is collected for ISF Events to ensure individuals are supported accordingly).

Retention periods are defined and applied for data (including personal data).

Secure deletion processes are followed on ISF-controlled hardware and with infrastructure providers.

Supplier and Third Party Management

Control

Status

A list of subprocessors who may process Member data is maintained and made available. See here: Trust Centre | Subprocessors

All subprocessors are subject to contractual security and privacy requirements.

Supplier onboarding and access are governed by a Supplier Security Standard.

Suppliers undergo risk assessments and contractual reviews to ensure data is protected in line with ISF requirements.

Critical suppliers are documented and assessed and reviewed regularly.

Service Performance

Control

Status

ISF operates under best endeavours commitments and has achieved 99.9% uptime across previous reporting periods.

Scheduled maintenance is performed during low-usage periods with advance notice to ISF Members.

Artificial Intelligence

Control

Status

Generative AI tools are restricted unless authorised by the business.

No artificial intelligence or machine learning technologies are used across any of the ISF Tools, or on data stored on the platforms.

Contact and Support

For security-related inquiries, compliance questions, or technical support contact:

Tools support (including security): tools@securityforum.org | Member support: Contact your Account Manager

This Trust Centre is regularly updated to reflect current security practices and compliance status.

Information Security Forum

Better Cybersecurity

© 2025 Information Security Forum Limited