This page explains how Helixiora translates security intent into operating controls.
Policy hierarchy
Use a simple hierarchy that people can follow:
- this ISMS defines the management system and review model
- supporting policies define mandatory principles
- procedures and standards explain how controls operate in practice
- evidence records show that the controls were performed
Control baseline
The control baseline should cover at least:
- governance and ownership
- asset and data handling
- identity and access management
- change management and secure operations
- logging, monitoring, incident response, and continuity
- supplier security and legal commitments
If Helixiora plans to maintain a statement of applicability, link it from this page and note who approves changes.
Exceptions
Control exceptions should be:
- time-bound
- approved by an accountable owner
- linked to a compensating control or explicit risk acceptance where needed
- reviewed before expiry
Evidence
For each important control, define:
- the owner
- the record or system that proves the control operated
- how long that evidence is retained
- how reviewers can access it