Nutzungsbedingungen
Informationssicherheit
Xaver Information Security & Compliance Overview
At Xaver, we are committed to protecting the confidentiality, integrity, and availability of information. Our Information Security Management System (ISMS) aligns with ISO 27001:2022 standards, ensuring we meet and exceed industry security requirements.
Management Commitment to Information Security
Our Management Board is fully committed to maintaining the highest standards of information security. They take full responsibility for the ISMS's effectiveness and ensure sufficient resources are allocated to safeguard our information assets. Security is integrated into our business strategy and organizational culture.
Annual Review of Policies and Continuous Improvement
All information security policies undergo an annual review by the Information Security Officer (ISO) and the Management Board. This ensures our policies stay aligned with regulatory changes, best practices, and technological advancements. Significant changes prompt immediate updates, which are communicated organization-wide.
Software Development Lifecycle (SDLC) and Change Management
We embed secure development and change management into our SDLC to ensure security is considered at every product development stage.
Security by Design: Integrating security from the earliest development stages.
Code Reviews and Audits: Conducting regular code reviews using automated and manual techniques.
Vulnerability Scanning and Penetration Testing: Performing regular tests to identify and address weaknesses.
Change Management Process: Following a formal process that includes risk assessment, approval, documentation, testing, validation, and post-implementation review.
Confidentiality, Integrity, and Availability
We focus on three core principles:
Confidentiality: Only authorized individuals and processes can access data.
Integrity: We protect the accuracy and completeness of information.
Availability: Systems and information are accessible to authorized users when needed.
Risk Management and Continuous Improvement
Risk management is central to our ISMS. We conduct regular risk assessments to identify vulnerabilities and threats, followed by mitigation strategies. Our ISMS undergoes continuous monitoring and improvement through internal and external audits and performance evaluations.
Access Control and Data Protection
Access to systems and information is strictly controlled based on the principle of least privilege. We regularly review access control policies to ensure alignment with our security objectives. We adhere to GDPR and other data protection regulations, ensuring personal data is handled securely and lawfully.
Encryption and Secure Communication
We employ encryption protocols to protect data at rest and in transit. Sensitive information is encrypted using advanced cryptographic standards like AES-256 and TLS 1.2+. We use secure VPNs and dedicated cloud environments to maintain data confidentiality and integrity.
Incident Management and Response
Our ISO and dedicated security teams manage all security incidents. We have clear protocols to quickly detect, respond to, and recover from security breaches or data compromises. We conduct Root Cause Analyses (RCA) for incidents and implement preventive measures. Affected parties are notified within legally mandated timeframes, such as GDPR's 72-hour requirement.
Business Continuity and Disaster Recovery
Our Business Continuity Plan (BCP) ensures the availability of critical services during disruptions. Disaster recovery procedures align with ISO 27001:2022, ensuring rapid restoration of key functions. We regularly test our BCP and disaster recovery measures for effectiveness
.
Compliance with Legal and Regulatory Requirements
We comply with GDPR, BaFin regulations, and other relevant legal frameworks. Our systems meet all statutory and regulatory obligations concerning information security and data protection. Our cloud providers and critical third-party vendors also adhere to high security standards, including ISO/IEC 27001 certification.
Training and Awareness
Security is everyone's responsibility. All employees and contractors undergo regular security awareness training to understand their role in maintaining a secure environment. Training covers cybersecurity threats, data handling procedures, and incident reporting protocols.
Audits and Continuous Monitoring
We undergo internal and external audits to ensure compliance with ISO 27001:2022 and other standards. These audits verify that security controls are effective and up-to-date. Our monitoring processes include ongoing security assessments, penetration testing, and vulnerability scanning.
Supplier and Third-Party Management
We maintain a rigorous third-party vendor management process, requiring all critical suppliers, including cloud service providers, to comply with our security standards. Contracts with third parties are regularly reviewed to ensure adherence to ISO 27001 and GDPR requirements.
Responsible Disclosure
We encourage responsible disclosure of potential vulnerabilities. If you identify any security concerns, please contact us at iso@xaver.com. We appreciate collaborative efforts to ensure system safety and are committed to resolving reported vulnerabilities promptly.
Nutzungsbedingungen
Informationssicherheit
Xaver Information Security & Compliance Overview
At Xaver, we are committed to protecting the confidentiality, integrity, and availability of information. Our Information Security Management System (ISMS) aligns with ISO 27001:2022 standards, ensuring we meet and exceed industry security requirements.
Management Commitment to Information Security
Our Management Board is fully committed to maintaining the highest standards of information security. They take full responsibility for the ISMS's effectiveness and ensure sufficient resources are allocated to safeguard our information assets. Security is integrated into our business strategy and organizational culture.
Annual Review of Policies and Continuous Improvement
All information security policies undergo an annual review by the Information Security Officer (ISO) and the Management Board. This ensures our policies stay aligned with regulatory changes, best practices, and technological advancements. Significant changes prompt immediate updates, which are communicated organization-wide.
Software Development Lifecycle (SDLC) and Change Management
We embed secure development and change management into our SDLC to ensure security is considered at every product development stage.
Security by Design: Integrating security from the earliest development stages.
Code Reviews and Audits: Conducting regular code reviews using automated and manual techniques.
Vulnerability Scanning and Penetration Testing: Performing regular tests to identify and address weaknesses.
Change Management Process: Following a formal process that includes risk assessment, approval, documentation, testing, validation, and post-implementation review.
Confidentiality, Integrity, and Availability
We focus on three core principles:
Confidentiality: Only authorized individuals and processes can access data.
Integrity: We protect the accuracy and completeness of information.
Availability: Systems and information are accessible to authorized users when needed.
Risk Management and Continuous Improvement
Risk management is central to our ISMS. We conduct regular risk assessments to identify vulnerabilities and threats, followed by mitigation strategies. Our ISMS undergoes continuous monitoring and improvement through internal and external audits and performance evaluations.
Access Control and Data Protection
Access to systems and information is strictly controlled based on the principle of least privilege. We regularly review access control policies to ensure alignment with our security objectives. We adhere to GDPR and other data protection regulations, ensuring personal data is handled securely and lawfully.
Encryption and Secure Communication
We employ encryption protocols to protect data at rest and in transit. Sensitive information is encrypted using advanced cryptographic standards like AES-256 and TLS 1.2+. We use secure VPNs and dedicated cloud environments to maintain data confidentiality and integrity.
Incident Management and Response
Our ISO and dedicated security teams manage all security incidents. We have clear protocols to quickly detect, respond to, and recover from security breaches or data compromises. We conduct Root Cause Analyses (RCA) for incidents and implement preventive measures. Affected parties are notified within legally mandated timeframes, such as GDPR's 72-hour requirement.
Business Continuity and Disaster Recovery
Our Business Continuity Plan (BCP) ensures the availability of critical services during disruptions. Disaster recovery procedures align with ISO 27001:2022, ensuring rapid restoration of key functions. We regularly test our BCP and disaster recovery measures for effectiveness
.
Compliance with Legal and Regulatory Requirements
We comply with GDPR, BaFin regulations, and other relevant legal frameworks. Our systems meet all statutory and regulatory obligations concerning information security and data protection. Our cloud providers and critical third-party vendors also adhere to high security standards, including ISO/IEC 27001 certification.
Training and Awareness
Security is everyone's responsibility. All employees and contractors undergo regular security awareness training to understand their role in maintaining a secure environment. Training covers cybersecurity threats, data handling procedures, and incident reporting protocols.
Audits and Continuous Monitoring
We undergo internal and external audits to ensure compliance with ISO 27001:2022 and other standards. These audits verify that security controls are effective and up-to-date. Our monitoring processes include ongoing security assessments, penetration testing, and vulnerability scanning.
Supplier and Third-Party Management
We maintain a rigorous third-party vendor management process, requiring all critical suppliers, including cloud service providers, to comply with our security standards. Contracts with third parties are regularly reviewed to ensure adherence to ISO 27001 and GDPR requirements.
Responsible Disclosure
We encourage responsible disclosure of potential vulnerabilities. If you identify any security concerns, please contact us at iso@xaver.com. We appreciate collaborative efforts to ensure system safety and are committed to resolving reported vulnerabilities promptly.
Buchen Sie noch heute Ihre kostenlose Demo
Maximieren Sie Ihre Vertriebseffizienz indem du Sie sich auf Ihre Kunden fokussieren
während die Xaver KI den zeitaufwendigen Rest erledigt
Melde Dich hier für unseren Newsletter an, um immer auf dem neuesten Stand zu sein
© 2024 Xaver. All rights reserved.
Proudly built by the Xaver team
Buchen Sie noch heute Ihre kostenlose Demo
Maximieren Sie Ihre Vertriebseffizienz indem du Sie sich auf Ihre Kunden fokussieren
während die Xaver KI den zeitaufwendigen Rest erledigt
Melde Dich hier für unseren Newsletter an, um immer auf dem neuesten Stand zu sein
© 2024 Xaver. All rights reserved.
Proudly built by the Xaver team