17.1.2Implementing information security continuity
The organisation shall establish, document, implement, and maintain
processes, procedures, and controls to ensure the required level of
continuity for information security during an adverse situation
YES XXX
Various processes allow for the continuity of information security (data backup, resilience of
infrastructure and human resources, administration of secure remote production tools)
Incident management / Code Red
17.1.3Verify, review and evaluate information security continuity
The organisation shall verify the established and implemented
information security continuity controls at regular intervals in order to
ensure that they are valid and effective during adverse situations
YES XXXContinuity of information security is assessed on a recurring basis
17.2Redundancies Ensure availability of information processing facilitiesIncludedLOCOBCBPRA
17.2.1Availability of information processing facilities
Information processing facilities shall be implemented with
redundancy sufficient to meet availability requirements
YES XXXX
Redundancy and resilience mechanisms for architectures and teams are active from end to end.
There is constant supervision of these mechanisms
SaaS architecture documents
18Compliance SEPO10-Compliance and audit management
18.1Compliance with legal and contractual requirements
Avoid breaches of legal, statutory, regulatory, or contractual
obligations related to information security and of any
security requirements.
IncludedLOCOBCBPRA
18.1.1Identification of applicable legislation and contractual requirements
All relevant legislative statutory, regulatory, contractual requirements
and the organisation’s approach to meet these requirements shall be
explicitly identified, documented and kept up to date for each
information system and the organisation
YES XX XX
The Cegid Group’s legal process defines, documents, and updates all legal, regulatory, and contractual
requirements applicable to the ISMS
Legal Process
18.1.2Intellectual property rights
Appropriate procedures shall be implemented to ensure compliance
with legislative, regulatory, and contractual requirements related to
intellectual property rights and use of proprietary software products
YES XX XX
Cegid Cloud Factory is committed to ensuring compliance with legislative, regulatory, and contractual
requirements related to intellectual property rights and the use of proprietary software products.
Software is acquired from known and reputable sources to ensure that copyright is respected.
Licence register
18.1.3Protection of records
Records shall be protected from loss, destruction, falsification,
unauthorised access, and unauthorised release, in accordance with
legislative, regulatory, contractual, and business requirements
YES XX X
Records are protected from loss, destruction, falsification, unauthorised access, and unauthorised
publication.
18.1.4Privacy and protection of personally identifiable information
Privacy and protection of personally identifiable information shall be
ensured as required in relevant legislation and regulation where
applicable
YES XX XX
The General Data Protection Regulation has been applicable to the scope since 25 May 2018. In this
context, Cegid has appointed a DPO in charge of monitoring the subject across the group
18.1.5Regulation of cryptographic controls
Cryptographic controls shall be used in compliance with all relevant
agreements, legislation, and regulations
YES X
Cegid Cloud Factory complies with the applicable agreements, laws, and regulations relating to
cryptography. Cegid does not import or export any cryptographic solutions.
18.2Information security reviews
Ensure that information security is implemented and
operated in accordance with the organisational policies and
procedures
IncludedLOCOBCBPRA
18.2.1Independent review of information security
The organisation’s approach to managing information security and its
implementation (i.e. control objectives, controls, policies, processes,
and procedures for information security) shall be reviewed
independently at planned intervals or when significant changes occur
YES XX
18.2.2Compliance with security policies and standards
Managers shall regularly review the compliance of information
processing and procedures within their area of responsibility with the
appropriate security policies, standards, and any other security
requirements
YES X ISMS Indicators and Objectives
18.2.3Technical compliance review
Information systems shall be regularly reviewed for compliance with
the organisation’s information security policies and standards
YES XXXA policy of pentests and technical auditing helps to identify deviations Scan Report
Cegid Cloud Factory conducts an internal audit of the information system at least once a year. A
management review is planned at the end