Skip to main content

Information Security Policy

Security policy

Supporter avatar
Written by Supporter
Updated over 2 years ago

Cognise Information Security Policy

1. Introduction

Cognise is a product owned by Herd.St Limited a company based in Wellington, New Zealand which offers LMS and learning software in the form of Software as a Service (SaaS) that enables its customers to create, manage, and report on all learning in their organisation.

The Software runs entirely in Amazon Web Services (AWS) within the Sydney region.

2. Scope

This information security policy applies to all information processed and handled by Cognise, including data of customers and its own internal data.

3. Normative references

This information security policy is organised roughly according to ISO/IEC 27002:2013: Information technology - Security techniques - Code of practice for information security controls.

4. Risks

The company should perform a risk assessment annually, to ensure that the security measures are still adequate to cover the risks.

5. Goals

Cognise is committed to safeguarding the confidentiality, integrity and availability of all the information assets it owns or processes on behalf of its customers, in accordance with the risks, to ensure that regulatory, operational and contractual requirements are fulfilled.

6. Organisation of information security

  1. The CTO has the overall responsibility for information security, including information security regarding personnel and IT security. The CTO is the owner of the security policy (this document).

  2. The CTO is responsible for purchasing requirements, development and maintenance of information and related information systems. The CTO must define which users or user groups are allowed access to the information and what authorised use of this information consists of.

  3. Employees, contractors and consultants are responsible for getting acquainted with and complying with Cognise’s information security policy. Questions regarding the administration of various types of information should be posed to the CTO.

  4. Employees, contractors and consultants are allowed to use mobile devices to perform their work. The company can set specific rules regarding the use of mobile devices.

  5. Remote working is allowed in agreement with management. Cognise does not operate internal IT systems hosted in a private office network; therefore working remotely is effectively equivalent to working from the Cognise offices.

7. Human resource security

7.1. Prior to employment

  1. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. For employees this is included in their employment agreement.

  2. This information security policy should be provided and accepted as part of all employment contracts, and to contractors, consultants and other third parties if they need system access.

7.2. During employment

  1. All users must comply with the information security requirements described in this document.

  2. The information security policy and relevant supporting documentation should be reviewed annually by all employees.

  3. All employees and third-party users should receive adequate training regarding the information security policy and procedures at least annually, and when major changes are made to the policies and procedures.

  4. Breaches of the information security policies and procedures by employees can lead to HR sanctions.

  5. Cognise's information, information systems and other assets must only be used for their intended business purposes. Necessary private use of personal computing devices issued by the company is permitted, except for commercial use outside of the scope of the company.

7.3. Termination and change of employment

  1. Cognise will change or terminate access rights accordingly at termination or change of employment.

8. Asset management

  1. Management maintains an inventory of information and IT assets operated by the company.

  2. Company assets (e.g. laptop, mobile phone, etc) should be returned to the company at the conclusion of the need for the use of these assets.

  3. All employees must agree to the Code of Conduct for Security and Privacy, which lays out the acceptable use of IT assets.

9. Access control

9.1 Business requirements

  1. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis.

  2. Users accessing systems must be authenticated according to guidelines.

  3. The principle of least privilege is applied for access to Cognise’s information. New employees, or employees changing roles will be assessed for the access they need in order to perform their job.

9.2 User access management

  1. Access to information systems should be authorised and/or implemented by the Operations team, on a "need to know" basis, regulated by the user’s role in the company.

  2. Periodic review should be performed for high-risk accounts to detect and prevent that unauthorised employees still have access.

9.3 User responsibilities

  1. Users are assigned a unique username when starting to work for Cognise and an initial password.

  2. Users are responsible for any usage of their company accounts and passwords.

  3. Users should keep their passwords confidential and not disclose them.

  4. Employees must change their password to one of their own choice immediately.

  5. Employees should use a company-approved password manager with automatically generated, unique passwords for all work-related accounts that are not the Computer Password or the Password Manager credentials.

  6. User-chosen passwords must comply with the following complexity requirements:
    - 8 characters minimum

    - At least one capital letter

    - At least one special character (e.g. !@#$%^&*(){}[] )

    - No dictionary words

  7. All employees must use 2-Step Verification using Google Authenticator or Microsoft Authenticator to access Google G Suite (e.g. Cognise Email). This must be enforced on the company level.

  8. For any other service the company uses that offers two factor authentication, it is required to enable it (e.g. Bitbucket, JIRA, AWS).

9.4 System and application access control

  1. Applications and systems should automatically enforce access controls based on the user’s privilege level.

  2. Access to privileged accounts and sensitive areas should be restricted.

  3. Only authorised employees can have access to Cognise’s source code repositories.

  4. Source code must not be publicly shared unless authorised by management, or when the source code has been released under Cognise’s open-source program.

  5. Only authorised employees are allowed access to staging and production systems.

10. Cryptography

Where technically possible, all personal data as well as authentication data should be appropriately protected by encryption and/or cryptographic hashing. In the case of customer data:

  • For encryption at rest, AWS built-in encryption features such as KMS should be used AES-256/Bcrypt for hashing where appropriate.

  • For encryption in transit, always use TLS encryption (typically provided through AWS load balancers)

All laptops issued by Cognise should be encrypted using the built-in disk encryption software (Apple FileVault 2), and the company should retain the recovery keys in a safe location.

11. Physical and environmental security

11.1 Secure areas

  1. Cognise does not have systems with (customer) data at office locations. All infrastructure is outsourced to Amazon Web Services (AWS), a professional organisation with multiple security certifications and third-party reports such as ISO 27001, ISO 27017, ISO 27018, SOC1, SOC2, SOC3, PCI-DSS, etc. More info about AWS compliance is available at
    http:// aws.amazon.com/compliance/

  2. Offices are located in shared office space or, operated by a commercial landlord. The shared office space provider is responsible for enforcing access controls (based on instructions by Cognise). Cognise does not operate internal IT systems hosted in any private office network in its offices.

11.2 Equipment

  1. Information classified as "sensitive" (e.g. customer data) should not be stored on portable data carriers (e.g. cell phones, memory sticks, USB hard drives etc.). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted.

  2. During travel, portable computer equipment should be treated as carry-on luggage.

  3. Password protected screen savers should be enabled and should protect the computer within 10 minutes of user inactivity. Computers should not be unattended with the user logged on and no password protected screen saver active. Users should not leave their computers unlocked.

  4. Employees must report all lost or stolen devices to management immediately.

12. Operations security

  1. All important actions in the production systems must be logged centrally, and the logs protected from deletion and modification.

  2. Relevant logs should be review regularly to ensure proper working of the systems.

  3. Computer clocks on all production systems should be synchronised.

  4. All systems that are typically susceptible to malware should have adequate malware protection installed.

  5. All servers should be kept up-to-date with the latest security updates within two weeks of patches being released, except for emergency patches, which should be deployed within 48 hours.

  6. Employees should install security updates on their company laptop as soon as they become available.

  7. Backups should be taken according to a predefined schedule in accordance with the company’s recovery point objective and recovery time objective.

  8. Audits should be appropriately planned to minimise disruption to the production systems.

13. Communications security

  1. For all systems in the AWS environment, appropriate firewall rules (security groups) need to be configured.

  2. Electronic messaging is outsourced to Google G Suite, or Intercom, which provides adequate safeguards for the security of emails.

14. System acquisition, development and maintenance

14.1 Security requirements for information systems

  1. When building new systems or making changes to existing systems, security requirements and considerations must be an integral part of the process.

  2. All software developed by Cognise must comply with the Privacy by Design and Privacy by Default philosophies.

14.2 Security in development and support processes

  1. All application code must be stored in source control (Git).

  2. All software changes must go through the regular change process: via development, then staging, then to production.

  3. Code reviews should be performed to keep the source code quality high and minimise the risk of security issues.

  4. Developers should be trained on the principles of secure coding and apply those principles to the Cognise software.

  5. In case of emergency changes, some steps of the change process can be bypassed temporarily. Testing procedure and formal acceptance should then be performed retrospectively.

  6. Applications and infrastructure configurations must be appropriately hardened according to industry best practices.

14.3 Test data

  1. Without approval from the CTO, it is not permitted for Cognise staff to use privacy sensitive customer data in a development or staging environment.

15. Supplier relationships

  1. Before engaging a new service provider that will process information for which high or medium security requirements are necessary, due diligence should be performed in order to assess whether the service provider is able to adequately protect the data. Due diligence can be performed by researching public information, verifying security certifications or codes of conduct, performing an audit, or by engaging in a conversation with the service provider.

  2. For service providers that process information for which high security requirements are necessary, their security certifications should be reviewed annually.

16. Information security incident management

  1. All breaches of security, including the use of information systems contrary to operating procedure, should be treated as incidents.

  2. All employees are responsible for reporting (possible) breaches of security. Incidents should be directly reported to management.

  3. A procedure should be available detailing how to handle breaches of personal data, including the legal and contractual notification requirements.

17. Business continuity management

  1. A disaster recovery plan must be developed and documented which contains a process enabling Cognise to restore any loss of data in the event of a system failure.

  2. In the situation of a disaster, Cognise’s CTO will be in charge of the recovery operation.

  3. The disaster and recovery plan should be evaluated and tested annually.

  4. Applications servers should not contain any user data. User data should always be stored within the storage system.

  5. Every day a backup should be made of the customer data. The backups should (also) be stored in a different AWS Region than the original data.

18. Compliance

  1. All legal and contractual requirements should be identified and complied with.

Did this answer your question?