We are ISO 27001 certified!

13 min read
last change: 8-10-2024

Exciting News: We Are Now ISO 27001 Certified!

The ShipitSmarter team is thrilled to announce that we have officially obtained ISO/IEC 27001:2023 (ISO 27001) certification! This prestigious international standard ensures that our products and services adhere to the best practices in information security management.

By following this set of standards, we can better protect critical assets such as financial data, intellectual property, employee information, and third-party data entrusted to us.

What is ISO 27001?

ISO/IEC 27001 is the world’s best-known standard for Information Security Management Systems (ISMS). It outlines the requirements that an ISMS must fulfill.

This standard offers guidance to companies of all sizes and industries on how to establish, implement, maintain, and continually improve their information security management system. Achieving compliance with ISO/IEC 27001 demonstrates that an organization has implemented a system to manage risks related to data security and adheres to the best practices and principles outlined in this International Standard.

Why Did We Pursue ISO 27001 Certification?

We are dedicated to maintaining a high-quality and consistent security management system, verified through independent expert assessments. ISO 27001 has allowed us to develop and implement processes and procedures that establish, maintain, and continually improve our information security management system. This systematic approach helps us safeguard sensitive company information by managing risks across people, processes, and IT systems.

Achieving ISO 27001 certification is the result of extensive effort and collaboration across the entire ShipitSmarter team. We continuously strive to enhance our services, ensuring we provide the highest level of security and privacy that not only meet but also exceed our customers’ expectations, while also adhering to GDPR and other relevant regulations.

Here’s why it’s important:

  • Enhanced Data Security: We now follow a rigorous framework to ensure that all sensitive data is protected from unauthorized access, breaches, and cyber threats.
  • Risk Management: Our processes now include proactive identification, assessment, and mitigation of potential security risks, keeping your information safe.
  • Continuous Improvement: ISO 27001 requires regular audits and updates, meaning we are always working to enhance our security measures and stay ahead of evolving threats.

What It Means for You

As a valued partner, you can trust that:

  • Your confidential data is handled with the highest level of security.
  • Our systems are built to mitigate risks, ensuring a more secure and reliable experience.
  • We are fully aligned with global security standards, demonstrating our commitment to protecting your business and reputation.

At ShipitSmarter, we understand the critical importance of information security in today’s connected world. This certification is just one part of our ongoing effort to ensure that we provide secure, reliable, and trusted services to all our customers.

Thank You for Your Support

We want to take this opportunity to thank our customers and partners for their continued trust. Your confidence in us has driven our pursuit of this certification, and we are excited to keep delivering excellence in every aspect of our operations.

You can find our Information Security Management Policy in our Trust Center.

iso27001

Statement of Applicability

Download our Statement of Applicability (SOA) here.

Cat.5Organizational ControlsDescriptionApplicableImplementedLawContractRisk Analysis
A.5.1Policies for information securityInformation security policies and subject-specific policies should be defined, approved by management, published, communicated to and acknowledged by relevant personnel and stakeholders and reviewed at planned intervals and as significant changes occur.YesYesX
A.5.2Information security roles and responsibilitiesRoles and responsibilities in information security should be defined and assigned according to the needs of the organization.YesYesX
A.5.3Segregation of dutiesConflicting tasks and conflicting responsibilities must be separated.YesYesX
A.5.4Management responsibilitiesManagement must require all personnel to practice information security in accordance with the organization’s established information security policy, subject-specific policies and procedures.YesYesX
A.5.5Contact with authoritiesThe organization must establish and maintain contact with the relevant authorities.YesYesXX
A.5.6Contact with special interest groupsThe organization should establish and maintain contacts with special interest groups or other specialized security forums and professional associations.YesYesXX
A.5.7Threat intelligenceInformation related to information security threats must be collected and analyzed to produce threat intelligence.YesYesX
A.5.8Information security in project managementInformation security must be integrated into project management.YesYesX
A.5.9Inventory of information and other associated assetsAn inventory of information and other related assets, including owners, should be established and maintained.YesYesX
A.5.10Acceptable use of information and other associated assetsRules for the acceptable use of and procedures for handling information and other related assets must be identified, documented and implemented.YesYesX
A.5.11Return of assetsPersonnel and other stakeholders, as appropriate, must return all organizational assets in their possession upon termination of their employment, contract or agreement.YesYesX
A.5.12Classification of informationInformation should be classified according to the information security needs of the organization, based on confidentiality, integrity, availability and relevant stakeholder requirements.YesYesX
A.5.13Labelling of informationTo label information, an appropriate set of procedures must be developed and implemented in accordance with the information classification scheme established by the organization.YesYesX
A.5.14Information transferInformation transfer rules, procedures or agreements must be in place for all types of communication facilities within the organization and between the organization and other parties.YesYesX
A.5.15Access controlRules based on business and information security requirements should be established and implemented to control physical and logical access to information and other related assets.YesYesX
A.5.16Identity managementThe entire identity lifecycle must be managed.YesYesX
A.5.17Authentication informationThe allocation and management of authentication information should be controlled through a management process that includes advising staff on the appropriate way to handle authentication information.YesYesX
A.5.18Access rightsAccess rights to information and other related assets must be provided, reviewed, modified, and removed in accordance with the organization’s subject-specific access security policies and rules.YesYesX
A.5.19Information security in supplier relationshipsProcesses and procedures must be established and implemented to manage information security risks associated with the use of the supplier’s products or services.YesYesX
A.5.20Addressing information security within supplier agreementsRelevant information security requirements must be identified and agreed with each supplier based on the type of supplier relationship.YesYesX
A.5.21Managing information security in the ICT supply chainProcesses and procedures should be defined and implemented to manage information security risks associated with the supply chain of ICT products and services.YesYesX
A.5.22Monitoring, review and change management of supplier servicesThe organization must regularly monitor, assess, evaluate and manage changes to information security practices and supplier services.YesYesX
A.5.23Information security for use of cloud servicesProcesses for acquiring, using, managing, and terminating cloud services should be established in accordance with the organization’s information security requirements.YesYesX
A.5.24Information security incident management planning and preparationThe organization must plan and prepare for managing information security incidents by defining, establishing and communicating processes, roles and responsibilities for managing information security incidents.YesYesX
A.5.25Assessment and decision on information security eventsThe organization must assess information security events and decide whether they should be categorized as information security incidents.YesYesX
A.5.26Response to information security incidentsInformation security incidents must be responded to in accordance with documented procedures.YesYesX
A.5.27Learning from information security incidentsKnowledge gained from information security incidents should be used to strengthen and improve information security.YesYesX
A.5.28Collection of evidenceThe organization must establish and implement procedures for identifying, collecting, obtaining and retaining evidence related to information security events.YesYesX
A.5.29Information security during disruptionThe organization must plan for ensuring information security at the appropriate level during a disruption.YesYesX
A.5.30ICT readiness for business continuityICT readiness must be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.YesYesX
A.5.31Legal, statutory, regulatory and contractual requirementsLegal, statutory, regulatory and contractual requirements relevant to information security and the organization’s approach to meeting these requirements must be identified, documented and kept up to date.YesYesXXX
A.5.32Intellectual property rightsThe organization must implement appropriate procedures to protect intellectual property rights.YesYesXX
A.5.33Protection of recordsRecords must be protected against loss, destruction, falsification, unauthorized access and unauthorized disclosure.YesYesXX
A.5.34Privacy and protection of PIIThe organization must identify and comply with privacy preservation and personal data protection requirements under applicable laws, regulations and contractual requirements.YesYesXX
A.5.35Independent review of information securityThe organization’s approach to information security management and implementation, including people, processes and technologies, should be reviewed independently and at planned intervals or as significant changes occur.YesYesX
A.5.36Compliance with policies, rules and standards for information securityCompliance with the organization’s information security policies, subject-specific policies, rules and standards should be assessed regularly.YesYesXX
A.5.37Documented operating proceduresOperating procedures for information processing facilities should be documented and made available to the personnel who need them.YesYesX
Cat.6Organizational ControlsDescriptionApplicableImplementedLawContractRisk Analysis
A.6.1ScreeningThe background checks of all candidates for employment must be checked prior to joining the organization and repeated at regular intervals thereafter. This should take into account applicable legal, regulatory and ethical considerations and be proportionate to the business requirements, the classification of the information accessed and the risks identified.YesYesX
A.6.2Terms and conditions of employmentEmployment contracts should state the responsibilities of staff and the organization with regard to information security.YesYesX
A.6.3Information security awareness, education and trainingOrganizational personnel and relevant stakeholders should receive appropriate information security awareness, education and training and regular updates on the organization’s information security policies, subject-specific policies and procedures, as relevant to their role.YesYesX
A.6.4Disciplinary processThere must be a formal and communicated disciplinary process to take action against staff and other stakeholders who have committed a breach of the information security policy.YesYesX
A.6.5Responsibilities after termination or change of employmentResponsibilities and duties related to information security that survive termination or change of employment must be defined, enforced and communicated to relevant personnel and other stakeholders.YesYesX
A.6.6Confidentiality or non-disclosure agreementsConfidentiality or nondisclosure agreements that reflect the organization’s information protection needs should be identified, documented, regularly reviewed and signed by staff and other relevant stakeholders.YesYesX
A.6.7Remote workingWhen staff are working remotely, security measures should be implemented to protect information accessed, processed or stored outside the organization’s building and/or premises.YesYesX
A.6.8Information security event reportingThe organization must provide a mechanism for personnel to report observed or suspected information security events in a timely manner through appropriate channels.YesYesX
Cat.7Organizational ControlsDescriptionApplicableImplementedLawContractRisk Analysis
A.7.1Physical security perimetersAreas containing information and other related assets must be protected by defining and using security zones.YesYesX
A.7.2Physical entrySecure areas must be protected by appropriate access security measures and access points.YesYesX
A.7.3Securing offices, rooms and facilitiesPhysical security must be designed and implemented for offices, spaces and facilities.YesYesX
A.7.4Physical security monitoringThe building and grounds must be continuously monitored for unauthorized physical access.YesYesX
A.7.5Protecting against physical and environmental threatsProtection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure, must be designed and implemented.YesYesX
A.7.6Working in secure areasSecurity measures must be developed and implemented when working in secure areas.YesYesX
A.7.7Clear desk and clear screenClear desk rules for paper documents and removable storage media and clear screen rules for information processing facilities should be defined and appropriately enforced.YesYesX
A.7.8Equipment siting and protectionEquipment must be securely located and protected.YesYesX
A.7.9Security of assets off-premisesAssets outside the building and/or grounds must be protected.YesYesX
A.7.10Storage mediaStorage media must be managed throughout their life cycle of acquisition, use, transportation and disposal in accordance with the organization’s classification scheme and handling requirements.YesYesX
A.7.11Supporting utilitiesInformation processing facilities must be protected from power outages and other disruptions caused by utility disruptions.YesYesX
A.7.12Cabling securityPower cables and cables transmitting data or supporting information services must be protected from interception, interference or damage.YesYesX
A.7.13Equipment maintenanceEquipment must be properly maintained to ensure the availability, integrity and reliability of information.YesYesX
A.7.14Secure disposal or re-use of equipmentEquipment components containing storage media should be checked to ensure that sensitive data and licensed software have been deleted or securely overwritten before disposal or reuse.YesYesX
Cat.8Organizational ControlsDescriptionApplicableImplementedLawContractRisk Analysis
A.8.1User endpoint devicesInformation stored on, processed by, or accessible through user endpoint devices must be protected.YesYesX
A.8.2Privileged access rightsThe assignment and use of special access rights must be restricted and managed.YesYesX
A.8.3Information access restrictionAccess to information and other related assets must be restricted in accordance with established subject-specific access security policies.YesYesX
A.8.4Access to source codeRead and write access to source code, development tools and software libraries should be appropriately managed.YesYesX
A.8.5Secure authenticationWe need secure authentication technologies and procedures are implemented based on information access restrictions and subject-specific access security policies.YesYesX
A.8.6Capacity managementThe use of resources should be monitored and adjusted according to current and expected capacity requirements.YesYesX
A.8.7Protection against malwareProtection against malware must be implemented and supported by appropriate user awareness.YesYesX
A.8.8Management of technical vulnerabilitiesInformation about technical vulnerabilities of information systems in use should be obtained, the organization’s exposure to such vulnerabilities should be assessed and appropriate measures should be taken.YesYesX
A.8.9Configuration managementConfigurations, including security configurations, of hardware, software, services and networks must be identified, documented, implemented, monitored and assessed.YesYesX
A.8.10Information deletionInformation stored in information systems, devices or other storage media should be deleted when it is no longer required.YesYesX
A.8.11Data maskingData must be masked in accordance with the organization’s subject-specific access security policy and other related subject-specific policies, and business requirements, taking into account applicable law.YesYesX
A.8.12Data leakage preventionMeasures to prevent data leaks should be applied in systems, networks and other devices on or through which sensitive information is processed, stored or transported.YesYesXX
A.8.13Information backupBackups of information, software and systems should be retained and tested regularly in accordance with the agreed subject-specific backup policy.YesYesX
A.8.14Redundancy of information processing facilitiesInformation processing facilities must be implemented with sufficient redundancy to meet availability requirements.YesYesX
A.8.15LoggingLog files recording activities, exceptions, errors and other relevant events must be produced, stored, protected and analyzed.YesYesX
A.8.16Monitoring activitiesNetworks, systems and applications should be monitored for anomalous behavior and appropriate measures should be taken to evaluate potential information security incidents.YesYesX
A.8.17Clock synchronizationThe clocks of information processing systems used by the organization must be synchronized with approved time sources.YesYesX
A.8.18Use of privileged utility programsThe use of system tools that may be capable of bypassing systems and applications should be limited and closely monitored.YesYesX
A.8.19Installation of software on operational systemsProcedures and measures should be implemented to safely manage the installation of software on operational systems.YesYesX
A.8.20Networks securityNetworks and network devices must be secured, managed and controlled to protect information in systems and applications.YesYesX
A.8.21Security of network servicesSecurity mechanisms, service levels and service requirements for all network services must be identified, implemented and monitored.YesYesX
A.8.22Segregation of networksGroups of information services, users, and information systems must be segmented into the organization’s networks.YesYesX
A.8.23Web filteringAccess to external websites should be controlled to limit exposure to malicious content.YesYesX
A.8.24Use of cryptographyRules for the effective use of cryptography, including the management of cryptographic keys, should be defined and implemented. Yes Yes X X
A.8.25Secure development life cycleRules must be established and applied for the safe development of software and systems.YesYesX
A.8.26Application security requirementsInformation security requirements must be identified, specified and approved when developing or purchasing applications.YesYesX
A.8.27Secure system architecture and engineering principlesSecure systems design principles must be established, documented, maintained, and applied to all information systems development activities.YesYesX
A.8.28Secure codingSecure coding principles should be applied to software development.YesYesX
A.8.29Security testing in development and acceptanceSecurity testing processes must be defined and implemented in the development cycle.YesYesX
A.8.30Outsourced developmentThe organization must direct, monitor and assess the activities associated with outsourced system development.NoNo
A.8.31Separation of development, test and production environmentsDevelopment, test and production environments must be separated and secured.YesYesX
A.8.32Change managementChanges to information processing facilities and information systems must be subject to change control procedures.YesYesX
A.8.33Test informationTest data must be appropriately selected, protected and managed.YesYesX
A.8.34Protection of information systems during audit testingAudit testing and other audit activities assessing operational systems should be planned and agreed between the tester and responsible management.YesYesX
{post.data.author}
Johan de Grijff, Commercial Director
published on: 8-10-2024

Next

Latest UPS integration (via REST API) now available