This document is under active development and has not been finalized.
Skip to content

Information Security Policy

Purpose

The Information Security Policy defines the framework for protecting all information technology systems, components and processes of the BAUER GROUP. It serves as the overarching directive of the ISMS and is approved by executive management.

Protection Goals

Protection GoalDefinitionMeasures
ConfidentialityInformation is accessible only to authorized personsAccess control, encryption, classification
IntegrityInformation is complete and unalteredHash verification, versioning, change control
AvailabilitySystems and data are accessible when neededRedundancy, backup, monitoring
AuthenticityIdentity of users and systems is verifiedMFA, certificates, digital signatures

Scope

The Information Security Policy applies to:

  • All employees, executive management and external service providers with system access
  • All information technology systems operated in-house and by third parties
  • All locations and remote workplaces
  • All phases of the information lifecycle (creation, processing, storage, deletion)

Responsibilities

RoleResponsibility
Executive ManagementApproval of the policy, provision of resources (§38 BSIG)
CISODevelopment, maintenance and monitoring of compliance
IT ManagementTechnical implementation of requirements
All EmployeesAdherence to policies, reporting of violations

§38 BSIG – MANAGEMENT OBLIGATIONS

Executive management must approve cybersecurity risk management measures and oversee their implementation. They are personally liable for breaches and are required to undergo regular cybersecurity training.

Review Cycle

ActivityIntervalResponsible
Policy reviewAnnuallyCISO + Executive Management
Event-driven reviewUpon significant changes or incidentsCISO
ApprovalAfter each reviewExecutive Management
CommunicationAfter approval to all employeesCISO

Classification Schema

LevelDescriptionExamplesMeasures
PublicNo restrictionsMarketing materials, published documentationNo special measures
InternalFor BAUER GROUP employees onlyInternal processes, organization chartsAccess control
ConfidentialBusiness-critical, restricted accessCustomer data, contracts, credentialsEncryption + access control
Strictly ConfidentialHighest protection levelKey material, security architectureEncryption + need-to-know + audit trail

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT