Vulnerability Management
At Monks we manage technical vulnerabilities implementing a process for continuous upgrade and updates in our infrastructure and endpoints. Periodic analysis (and necessary fixes) in our networks and equipment are performed.
Incident response policies established
The company has an incident response policy and a procedure in place to guide the security incident management. The defined processes include steps to log, track, resolve, and communicate security and privacy incidents to the relevant parties. Lessons learned are identified to prevent future incidents.
Improvement opportunities for incident management are identified, recorded, and subsequently followed up on.
Access control
Permissions are granted to users on a need-to-know basis. Privilege rights are only granted to the employees assigned to administration roles and closely followed up along the user´s life cycle. Periodic access reviews are performed to guarantee users have the correct access privileges in place.
Password policy enforced
The company requires adherence to its policy for configuring passwords on in-scope system components. Additionally, the policy establishes specific requirements regarding password complexity, length, and regular updates to ensure robust security measures are in place.
Backup methodology
Backup schemes are implemented to protect the valuable information against loss, based on risk, impact and business requirements.
Vendor management
The company maintains formal agreements with vendors and third parties, encompassing confidentiality and privacy commitments specific to each entity.
Third party risk is managed in order to ensure that these vendors take good care of Monks information during our relationship.
Change management procedure
Properly controlled change management is performed in productive environments to ensure that critical changes are appropriate, effective, properly authorized and carried out in such a manner as to minimize the unexpected impact.
Management roles and responsibilities defined
Monks has correctly identified and assigned the roles and responsibilities regarding information security for a correct segregation of duties and accountability.
Physical access controls
Security perimeters are defined in facilities and controls are implemented to authorize access on a need-to-know basis. Different perimeters are designated for general entrance, sensitive areas and server rooms. An access management process is in place to grant and revoke privileges accordingly.
Secure Development lifecycle
We implement a secure software development life cycle (SSDLC) in which we define security best practices based on OWASP top 10 and other widely recognized standards, and security controls such as code analysis. We also train our developers and technical experts on security best practices on a continuous basis.
Cybersecurity insurance maintained
The company has cybersecurity insurance to mitigate the impact of incidents.