Crowdin Information Security Policy (hereinafter the Policy) defines the objectives and basic principles of information security. Information security means implementation and maintenance of the appropriate level of its properties.
The Policies requirements apply to the entire Crowdin organization and all business processes, and are available mandatory for all employees as well as those involved in these business processes. Compliance with the requirements of the Policy is an important aspect for achieving Crowdin’s strategic goals and objectives.
Crowdin information security policy meets the requirements of ISO / IEC 27001: 2022 and DSTU ISO / IEC 27001: 2015.
This policy sets up:
Information security processes are described, formally defined and approved, Crowdin’s guidance in the form of standards, policies, regulations and other internal regulatory documents.
According to ISO, defining the context of an Organization is a “business environment”, “a combination of internal and external factors and conditions that may influence the organization’s approach to its products, services and investments and interested parties”.
Crowdin is a product company with more than 2 million user accounts.
Crowdin’s software solution empowers companies of any shape and size to accelerate their growth by reaching people who speak different languages.
Crowdin team works passionately toward a shared goal: to expand the potential of agile localization. From day one till now, Crowdin’s mission has always been to keep it simple and wow Crowdin’s customers with an outstanding user experience and the latest technology solutions.
Crowdin’s main industrial sector is Software as a service.
The purpose of the ISMS is to ensure that Crowdin is still able to meet its defined business objectives and comply with its policies in the face of potential and actual security incidents.
Policies have been set by the organization in a variety of areas and these must be taken account of during the information security planning process to ensure that they are met.
The main relevant policies are:
There are a number of internal and external issues that are relevant to the purpose of Crowdin and that affect the ability of the ISMS to achieve its intended outcomes.
Internal issues:
External issues:
These general internal and external issues will be considered in more detail as part of the risk assessment process and will be regularly reviewed and monitored.
An interested party is defined as a person or organization that can affect, be affected by, or perceive themselves to be affected by a decision or activity.
The following are defined as interested parties that are relevant to the ISMS:
Interested party | Expectations | Requirement |
---|---|---|
Owners of the business | Effective information security influences the organization’s financial success | Return on capital |
Governance | Organisational reputation must be protected | Documentary and practical confirmation of the implementation of ISMS |
Customers, Customer user groups | The confidentiality, integrity and availability of data is secured at all times | ISMS ISO 27001 Certificate |
Suppliers and partners | Adhering to agreements and payment terms | Evidence of adhering to agreements and payment terms |
Regulatory bodies | The activities of the Organization comply with current legislation | Official confirmation of legal requirements (reports, certificates, etc.) |
Employees of the Organization | Personal data security, social welfare benefits, appropriate remuneration, training & support, safe working environment etc. | Legislative documents and regulations, NDA terms & conditions, clear instructions on how to handle sensitive data etc. |
Contractors providing services to the Organization | Adhering to agreements and payment terms; Personal data security, social welfare benefits, appropriate remuneration | Evidence of adhering to agreements and payment terms; Legislative documents and regulations, NDA, clear instructions on how to handle sensitive data etc. |
Competitors | The Organization responding to rival marketing campaigns with its own initiatives and set prices competitively | Results of market monitoring |
Investors | Profitability, expected return on investment | Return on investment, Financial Statements |
The media | Transparency regarding security incidents | Coverage of data breaches and a wider public interest in the way organisations protect personal information |
Auditors | Expect that a proportionate level of security controls are in place at all times to protect assets | Documentary and practical confirmation of the implementation of ISMS |
Emergency Services | Safe working environment etc. | Fire Safety, First aid provision etc. |
This strategic objectives are supported by annual KPIs, described in more detail in the ISMS-PL-Monitoring and evaluating the effectiveness of ISMS Policy policy:
Current policies, processes, and security measures will be continuously reviewed. Any gaps in alignment with ISO/IEC 27001:2022 standards will be identified and addressed.
A proactive risk management strategy will be maintained. This strategy includes conducting regular risk assessments, vulnerability scans, and security audits. Identified risks will be analyzed, and continuous mitigation measures will be implemented.
The ISMS Committee has the final responsibility for Information Security Risks across Crowdin.
Detailed information about the functions, regulation, duties and responsibilities of the ISMS Committee is in the Regulation on ISMS Committee.
Managers/Head of Departments are responsible for information security within their departments/teams. They must ensure that the department/team has communicated their own informational security needs to the CISO.
CISO is clearly accountable for the provision of appropriate, timely advice to the management to ensure that an effective information risk management framework is implemented, operated and maintained in alignment with the business strategy, the business and the legal requirements.
All personnel, regardless of function, level and role, shall have explicit personal responsibilities for Information Security Management.
Responsibilities are described in detail in the ISMS-FR-Information Security Management Framework, and in other corresponding policies.
Continuous monitoring and improvement of ISMS will be an ongoing task to maintain compliance.
Regular risk assessments and mitigation activities will be scheduled periodically. Vulnerability assessments will be conducted regularly as part of the organization’s ongoing security practices. Proactive measures will be implemented immediately upon identification of vulnerabilities to ensure continuous protection.
The Incident Response Plan is annually reviewed, updated and tested to ensure its effectiveness in minimizing potential damage in the event of a security incident.
Systems, processes and activities that can be monitored in the ISMS include, but are not limited to:
The organization’s compliance with ISO/IEC 27001:2022 is evaluated through internal audit, management review, ISMS committee meetings. Annual external audits conducted by certification bodies will further validate our compliance status.
Key performance indicators defined will be closely monitored. Any security breaches or incidents will trigger immediate investigation and corrective action to ensure the security of customer and employee data, as well as our internal business processes.
Monitoring and evaluating the effectiveness of ISMS processes is described in the ISMS-PL-Monitoring and evaluating the effectiveness of ISMS Policy