Apsys Security Controls Review Process
Apsys Security Controls Review Process
1
PROPRIETARY & CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS SENSITIVE AND INTENDED FOR TAPSYS’S INTERNAL DISTRIBUTION ONLY.
NOT TO BE COPIED OR DISTRIBUTED
REVISION HISTORY
2
PROPRIETARY & CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS SENSITIVE AND INTENDED FOR TAPSYS’S INTERNAL DISTRIBUTION ONLY.
NOT TO BE COPIED OR DISTRIBUTED
SECURITY CONTROLS REVIEW PROCESS
1. INTRODUCTION
The software created, distributed, and used by Tapsys is one of the most valuable assets. A compromise of
these assets could severely impact the reputation and revenues of the organization. In addition, effectively
securing software applications and related artifacts is essential to ensure privacy of the underlying data in
accordance with the regulations.
This document is created in accordance with the Software Security Policy of Tapsys to provide details on
Security Controls Review Process.
1.1. OBJECTIVE
The objective of this process is to clearly state a set of mandatory steps for Security Controls Review that should
be executed by Tapsys’s Application Security Team.
1.2. SCOPE
This process shall apply uniformly to all software products which are developed by the Tapsys.
• Control Objective 3
1.4. OWNERSHIP
Software Security team owns the process, any queries/ issues arising from the interpretation of this document
will be addressed by the members of the team.
3
PROPRIETARY & CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS SENSITIVE AND INTENDED FOR TAPSYS’S INTERNAL DISTRIBUTION ONLY.
NOT TO BE COPIED OR DISTRIBUTED
In case of any changes, the Application Security team will initiate the change and the revision history will be
maintained. The Application Security Governance Group (ASGG) will review the process and formal approval
shall be granted. New approved process will be distributed to authorized stakeholders.
1.7. RESPONSIBILITY
The following responsibilities apply for the application of this process.
• Application Security Team Lead is the point of contact, providing support, advice for implementation.
• The ASGG will review, approve, and improve (if required) this process.
1.8. EXCEPTIONS
Exceptions to the requirements of this process are the responsibility of the ASGG. Where exceptions are made,
changes will be managed by the ASGG and will be reported accordingly.
1.9. ENFORCEMENT
Enforcement of this process is the responsibility of the Application Security Governance Group (ASGG).
Responsible Group/
Steps Description
Personnel
Step-1: Schedule Security The Tapsys’s Application Security Lead will Application Security Lead
Controls Review schedule security controls review during the year
(once every six months)
Step-2: Request for One week before the review, the Tapsys’s Application Security Lead
Information Application Security Lead will request the Asset
Owners to share the details of security controls
implemented.
Step-3: Information Following the request from the Application Security Asset Owners
Sharing Lead, the Asset Owners will share the required
details.
Step-4: Perform Review The Tapsys’s Application Security Lead will Application Security Lead
perform a review by checking the following:
4
PROPRIETARY & CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS SENSITIVE AND INTENDED FOR TAPSYS’S INTERNAL DISTRIBUTION ONLY.
NOT TO BE COPIED OR DISTRIBUTED
• Firewall Rules
• Access Management
• Compliance with Physical Hardening
Standard
• Software installed
Step-5: Write a Review The Tapsys’s Application Security Lead must Application Security Lead
Report document the results of the review in a report. The
report must have a sub-section per asset and include
the findings (if any) and recommended actions (if
any) per asset. The final report must be shared with
the leadership and other stakeholders.
Step-7: Remediation Asset Owner will review the report and perform the Asset Owner
recommended actions. The Asset Owner will submit
the compliance status after implementation of
recommended controls.
Note: The output / results of security controls review can be an input for Risk Assessment Exercise.
3. AUTHORITY
This process has been authorized by Tapsys’s Application Security Governance Group and is
effective within the approval dates detailed on the front page of this document.
5
PROPRIETARY & CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS SENSITIVE AND INTENDED FOR TAPSYS’S INTERNAL DISTRIBUTION ONLY.
NOT TO BE COPIED OR DISTRIBUTED