└─$ cat /legal/security-policy.md
Security Policy
# Last Updated: November 8, 2025
1. Our Security Commitment
As a cybersecurity company, we hold ourselves to the highest security standards. This policy outlines our commitment to protecting both our infrastructure and client data.
2. Infrastructure Security
2.1 Network Security
- Zero-trust network architecture with micro-segmentation
- Next-generation firewall with IDS/IPS capabilities
- VPN access with multi-factor authentication for remote work
- Network traffic monitoring and anomaly detection
2.2 Endpoint Protection
- Full-disk encryption on all devices (LUKS/FileVault)
- Endpoint detection and response (EDR) software
- Regular security patching within 72 hours of release
- Application whitelisting and sandboxing
3. Data Protection Measures
3.1 Data Classification
All data is classified into categories:
- Public: Marketing materials, published research
- Internal: Operational data, non-sensitive communications
- Confidential: Client information, security findings
- Restricted: Sensitive security vulnerabilities, credentials
3.2 Encryption Standards
- Data in transit: TLS 1.3 minimum
- Data at rest: AES-256 encryption
- Client report delivery: PGP/GPG encrypted
- Password storage: Argon2id hashing
4. Access Control
4.1 Authentication
- Multi-factor authentication (MFA) required for all systems
- Hardware security keys (YubiKey) for privileged access
- Passphrase minimum 16 characters or hardware tokens
- Biometric authentication on mobile devices
4.2 Authorization
- Role-based access control (RBAC) implementation
- Principle of least privilege enforced
- Regular access reviews and recertification
- Automated account deprovisioning upon termination
5. Secure Development Practices
- Security code reviews for all custom tools
- Dependency scanning for vulnerabilities
- Static and dynamic application security testing
- Secrets management with HashiCorp Vault
- Git commit signing with GPG keys
6. Monitoring and Incident Response
6.1 Security Monitoring
- 24/7 SIEM monitoring with ELK Stack
- Real-time alerting for security events
- Log retention for 12 months
- Quarterly threat hunting exercises
6.2 Incident Response
- Documented incident response plan
- Designated incident response team
- Quarterly IR tabletop exercises
- Post-incident reviews and lessons learned
7. Third-Party Security
- Vendor security assessments before engagement
- Regular vendor security reviews
- Contractual security requirements
- Minimal third-party dependencies (open-source focus)
8. Physical Security
- Secure office access with badge system
- Visitor logging and escort requirements
- Locked equipment storage
- Clean desk and clear screen policies
- Secure document destruction
9. Security Training
- Mandatory security awareness training for all staff
- Regular phishing simulations
- Technical security training for security team
- Continuous professional development
10. Continuous Improvement
- Annual penetration testing of our own infrastructure
- Quarterly security audits
- Regular policy reviews and updates
- Participation in security community and threat intelligence sharing
11. Responsible Disclosure
We maintain a responsible disclosure policy. Security researchers who discover vulnerabilities in our systems should contact:
Email: security@omniforge.security
PGP Key: Available on request
We commit to:
- Acknowledge receipt within 24 hours
- Provide status updates every 72 hours
- Credit researchers upon fix (if desired)
- Not pursue legal action for good-faith research