Cyber Security Policy
Our comprehensive framework for protecting digital assets, ensuring data integrity, and maintaining the highest security standards across all operations.
1. Introduction
At Naestinn Pvt Ltd ("Naestinn," "we," "us," or "our"), cyber security is a top priority. This Cyber Security Policy establishes the framework for protecting our information assets, systems, and networks from unauthorized access, disclosure, disruption, modification, or destruction.
This policy applies to all employees, contractors, consultants, and third parties who have access to Naestinn's information systems and data.
2. Scope & Applicability
This policy covers:
- All information systems, networks, and devices owned or managed by Naestinn
- Client data and proprietary information entrusted to Naestinn
- Cloud services, third-party applications, and external integrations
- Physical and digital access to Naestinn facilities and resources
3. Security Principles
Our security framework is built on the following core principles:
Confidentiality
Ensuring that information is accessible only to authorized individuals and systems.
Integrity
Maintaining the accuracy and completeness of data throughout its lifecycle.
Availability
Ensuring that authorized users have reliable and timely access to information and resources.
4. Data Protection Measures
Encryption
All sensitive data is encrypted both at rest and in transit using industry-standard encryption protocols (AES-256, TLS 1.3).
Data Classification
We classify data into categories (Public, Internal, Confidential, Restricted) and apply appropriate security controls based on sensitivity.
Backup & Recovery
Regular automated backups are performed, with secure off-site storage. We maintain a comprehensive disaster recovery plan with defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO).
5. Access Control
Principle of Least Privilege
Users are granted the minimum level of access necessary to perform their job functions. Access rights are reviewed quarterly.
Multi-Factor Authentication (MFA)
MFA is mandatory for all employees and contractors accessing Naestinn systems, especially for administrative and privileged accounts.
Password Policy
- Minimum 12 characters with complexity requirements
- Password rotation every 90 days for privileged accounts
- No password reuse for the last 12 passwords
- Use of password managers is encouraged
6. Network Security
Our network security measures include:
- Firewalls: Next-generation firewalls with intrusion detection and prevention systems (IDS/IPS)
- Network Segmentation: Separation of production, development, and corporate networks
- VPN: Secure VPN access for remote workers with end-to-end encryption
- Monitoring: 24/7 network monitoring and logging for suspicious activities
7. Incident Response
We maintain a comprehensive Incident Response Plan (IRP) to quickly identify, contain, and remediate security incidents.
Response Process
- Detection & Reporting: Immediate reporting of suspected incidents to the security team
- Assessment: Rapid evaluation of incident severity and impact
- Containment: Isolation of affected systems to prevent spread
- Eradication: Removal of threats and vulnerabilities
- Recovery: Restoration of normal operations
- Post-Incident Review: Analysis and documentation of lessons learned
Security Incident Hotline: security@naestinn.com (monitored 24/7)
8. Employee Responsibilities
All employees and contractors must:
- Complete mandatory security awareness training annually
- Report suspicious emails, links, or activities immediately
- Use only approved software and applications
- Never share passwords or access credentials
- Lock workstations when unattended
- Follow the Clean Desk Policy for physical security
9. Third-Party Security
All third-party vendors and service providers with access to Naestinn systems or data must:
- Undergo security assessments before onboarding
- Sign Non-Disclosure Agreements (NDAs) and Data Processing Agreements (DPAs)
- Comply with our security standards and policies
- Participate in periodic security audits
10. Compliance & Audits
Naestinn is committed to compliance with applicable laws, regulations, and industry standards, including:
- GDPR (General Data Protection Regulation)
- ISO 27001 Information Security Management
- SOC 2 Type II compliance
- CCPA/CPRA (California privacy laws)
We conduct regular internal and external security audits to ensure ongoing compliance and identify areas for improvement.
11. Policy Updates
This Cyber Security Policy is reviewed and updated at least annually or whenever significant changes occur in our technology environment, threat landscape, or regulatory requirements.
12. Contact Information
For security-related questions or to report a security incident, please contact:
Security Team
security@naestinn.comGeneral Inquiries
info@naestinn.comNaestinn Pvt Ltd
Noida, Uttar Pradesh, India