Portima Information Security Policy

Versie 1.4

 

 

Document summary

This document outlines Portima's commitment to protecting the confidentiality, integrity, availability, non-repudiation, and authentication of information (CIANA). The purpose of this policy is to ensure the protection of information assets and reduce the risk of information security incidents.

Intended Audience

Portima    employees,    contractors    and    any    other individuals who access Portima's systems and data.

Process

Information Security

Issue date

05/06/2025

Next review date

05/06/2026

Document manager

Portima ISMS Coordinator

Approval level

CODIR

Classification level

Public

Reference

ISMS 001 POL

Version

V.1.4

Status

Approved

Date

05/06/2025

 

 

 

 

The latest approved version of this document is available at:

Sharepoint and portima.com

 

 

History

Version

Updated by

Date

Description of changes

 1.0 09/08/2023 First approved version

1.1

ISMS

Coordinator

24/08/2023

Classification level adapted from internal to public

Audience for Data Privacy Policy

1.2

ISMS

Coordinator

25/01/2024Roles and responsibilities
1.3

ISMS

Coordinator

23/01/2025Included DORA related requirements
1.4ISMS Coordinator05/06/2025Adding AI Policy in the ISP framework

 

 

 

 

 

Table of Contents

 

  1. Introduction
  2. Scope
  3. Portima’s commitment to information security
  4. Information security policy framework
    1. 4.1 Network Protection Policy
    2. 4.2 Cryptographic Control Policy
    3. 4.3 Third Party Security Policy
    4. 4.4 Physical and Environmental Security Policy
    5. 4.5 Incident Management Policy
    6. 4.6 Business Continuity Management Plan
    7. 4.7 Secure Development Policy
  5. Information Security Risk Management
  6. Information security roles and responsibilities
  7. Data Classification
  8. Training and Awareness
  9. Review and Auditing
  10. Policy enforcement
  11. Reference
  12. Glossary

 

 

1. Introduction

This policy outlines Portima's commitment to protecting the confidentiality, integrity, availability, non-repudiation, and authentication of information. The purpose of this policy is to ensure the protection of information assets and reduce the risk of information security incidents.

The information security policy describes Portima’s responsibility to:

  • Protect the confidentiality, integrity, availability, non-repudiation, and authentication of business-critical information, based on good practices;
  • Ensure that the aforementioned information is exchanged with external parties (e.g., stakeholders, customers and/or suppliers) in a secure manner;
  • Prevent or minimizing the impact of information security incidents or breaches.
  • Protect Portima’s business, reputation and to safeguard our people; and
  • Ensure that Portima’s employees understand their roles and responsibilities.

It also defines procedures, baselines, and practices for the aforementioned resources to acquire adequate knowledge of the security policy and how to protect information from unauthorised use or disclosure.

 

2.  Scope

This policy applies to all employees, contractors, and any other individuals who access Portima's systems and data. It’s considered as an umbrella above other policies (see section 4).

This policy covers all information assets, including physical, electronic, and confidential information, stored in any format or location. Either these information assets are owned or controlled by Portima, including but not limited to:

  • Cloud infrastructure;
  • All servers, workstations, laptops, mobile devices, and other computing devices;
  • All network infrastructure, including routers, switches, and firewalls; and
  • All data stored on Portima's systems, including but not limited to: financial information, personal information, confidential business information, and intellectual property.

 

3.  Portima's commitment to information security

Portima’s CODIR acknowledges the expectations of both internal and external stakeholders regarding the information security posture of the organisation. More specifically, Portima’s CODIR is committed to achieve the following objectives:

  1. Protect the business processes and infrastructure related to software development, deployment and support of Brio and Portima Connect.
  2. Safeguarding the confidentiality, integrity, availability, non-repudiation, and authentication of its data, using a risk-based approach.
  3. Complying with the legal requirements and meeting its business partners’ expectations.

 

In order to support this commitment and achieve the information security objectives Portima established and operates an Information Security Management System (ISMS). This ISMS is comprised of information security policies, standards and procedures designed to maintain, review and continually improve information security across Portima from a risk-based perspective.

4.  Information security policy framework

As part of the risk-based ISMS, Portima established an information security policy framework comprised out of information security policies outlining the information security requirements to be adhered to by Portima employees and contractors. This information security policy framework is subject to the ISMS’ continual improvement process ensuring that these policies are maintained, reviewed and updated when relevant.

4.1 Network Protection Policy

Portima defined, formalized, and implemented a comprehensive Network Security policy to protect Portima’s information systems and data from unauthorized access and potential threats. This policy outlines guidelines for network usage, define authorized users, enforce secure remote access with strong authentication, assesses potential risks, and establishes protective measures to prevent misuse. Portima ensures that the Network Security Policy is regularly reviewed and updated to address evolving threats and technology changes, maintaining a high standard of network security across the organization. (DORA Regulation (EU) 2022/2554 - Art. 15)

4.2 Cryptographic Control Policy

Portima defined, formalized, and implemented a comprehensive cryptographic controls policy to ensure the proper and effective use of encryption for protecting the confidentiality, integrity, and authenticity of sensitive information assets (in compliance with applicable regulation GDPR and DORA). Portima monitors adherence to these cryptographic controls and conduct regular audits to ensure compliance with this policy. (DORA Regulation (EU) 2022/2554 - Art. 15)

4.3 Third Party Security Policy

Portima defined, formalized, and implemented a comprehensive ICT Third-Party Security Policy. This policy outlines the security requirements and standards that all third-party ICT service providers must adhere to when accessing, processing, or managing Portima’s data and systems. The policy includes criteria for assessing, monitoring, and managing third-party security risks to ensure that these providers meet Portima’s security standards and effectively mitigate any associated risks. Portima regularly reviews and updates the ICT Third-Party Security Policy to ensure it remains aligned with evolving threats and regulatory requirements. (DORA Regulation (EU) 2022/2554 - Art. 15)

4.4 Physical and Environmental Security Policy

Portima defined, formalized, and implemented a robust Physical and Environmental Security Policy. This policy addresses the controls and procedures necessary to protect physical locations, prevent unauthorized access, and mitigate environmental risks. A visitor management procedure is documented. Clear desk requirements are adopted to ensure that classified information is securely stored and not accessible to unauthorized individuals. Portima regularly reviews and updates the Physical and Environmental Security Policy to adapt to emerging threats and ensure ongoing protection of its facilities and assets. (DORA Regulation (EU) 2022/2554 - Art. 15)

4.5 Incident Management Policy

Portima defined, formalized, and implemented an ICT incident management policy to effectively manage and respond to ICT incidents. This policy outlines a structured approach for identifying, reporting, investigating and remediating incidents to minimize the impact on operations, protect data, and prevent recurrence. The policy includes the requirement that any unauthorized access, modification, disclosure, or destruction of personal data, shall be reported immediately via the dedicated communication channels. undergo Additionally, it formalizes roles and responsibilities related to regarding communication and management of ICT incidents, ensuring that all stakeholders are aware of their duties in incident detection, response, and reporting. (DORA Regulation (EU) 2022/2554 - Art. 15)

4.6 Business Continuity Management Plan

Portima defined, formalized, and implemented a business continuity plan to restore critical functions, services, processes, and resources in the event of a major incident, crisis, or disaster, all within the defined and agreed-upon service levels. Portima regularly reviews and updates the Business Continuity Management Plan. During any business continuity event, Portima will maintain the same security standards as during normal operations, ensuring ongoing protection and resilience. (DORA Regulation (EU) 2022/2554 - Art. 11)

4.7 Secure Development Policy

Portima developed, documented, and implemented a comprehensive policy for the acquisition, development, and maintenance of Portima's ICT systems to ensure the confidentiality, integrity, availability, non-repudiation and authentication of data. This policy identifies security practices and methodologies, specifies technical requirements with a focus on ICT security, and defines measures to mitigate risks of alterations or manipulations. A documented policy outlines requirements for testing and approving ICT systems, including source code reviews and security testing before deployment. Only anonymized, pseudonymized, or randomized data are used in non-production environments to protect data integrity and confidentiality. Controls are implemented to secure in-house or third-party-developed source codes, and proprietary software are analyzed before production deployment. The policy also covers ICT systems managed by users outside the ICT function, using a risk-based approach.

 

5.  Information Security Risk Management

The Chief information security officer shall ensure that a risk assessment is conducted at least annually or when significant changes occur to Portima’s organisation or IT environment. This risk assessment shall be conducted in line with Portima’s Risk Assessment Methodology. The assessment shall provide a comprehensive explanation of the information security risks currently faced by Portima and determine specific treatment actions to manage these risks.

 

6.  Information Security roles and responsabilities

Information security roles and responsibilities are defined and assigned at the different levels of Portima’s organisation while ensuring the segregation of duties. These roles and responsibilities are outlined and documented as part of the organisation’s ISMS Manual.

Role

Description

Name

CEO

  • The CEO is accountable for the overall information security within Portima.
  • The CEO approves and validates the information security objectives escalated by the CIO

Jan Peeters

Chief Information Officer (CIO)

  • The CIO reports the ISMS performance, risks and overall security posture towards the Board of Directors (CODIR).

  • The CIO participates in the Portima CODIR Meeting and ensures information security is taken into account within IT.

Christophe Cloesen (CIO)

Chief Information Security Officer (CISO)

  • The Chief Information Security Officer (CISO) has the overall responsibility for the management of information security and the management of the ISMS.
  • The CISO ensures that Portima’s information security objectives are captured in information security policies.
  • Monitors compliance to information security policies.
  • Create and maintain information security awareness for all Portima staff and relevant third-parties.
  • The CISO coordinates the Risk Management within the ISMS.(e.g., follow up on treatment actions status).
  • The CISO defines ISMS key performance indicators to be reported to the ISMS Forum.
  • The CISO is responsible for registering, tracking & handling information security incidents & non- conformities towards policies and standards, problems & corrective actions.
  • The CISO maintains contact with different interested parties & information security subject-matter experts and fora.
  • The CISO reports to the CIO.

Mohamed Amine Youssef 

 

ISMS

Coordinator

  • The Information Security Management System (ISMS) coordinator is responsible for the day-to-day management of the ISMS.
  • The ISMS coordinator ensures compliance to the ISO 27001:2022 standard.
  • The ISMS coordinator follows-up on the different tasks

tracked within the ISMS.

  • The ISMS coordinator tracks ISMS key performance indicators to be reported to the ISMS Forum.
  • The ISMS coordinator drives the ISMS management review in the Portima’s CODIR meeting and ISMS Forum.
  • The ISMS coordinator coordinates External and Internal audits.
  • Review of the statement of applicability.

  • The ISMS coordinator reports to Cécile Louvrier (CODIR member) and works in close collaboration with the CISO under the state of ISMS.

Valérie Dechamps

System owner

  • Responsible for the security aspect related to system such as approving authentication, hardening.

Cécile Louvrier (Director Portima Connect)

Christophe Cloesen

Data Protection Officer (DPO)

  • Ensures that Portima is compliant with data protection regulations.

  • Collaborates with the CISO to identify data protection requirements to be considered in IT projects and operations.

Valérie Dechamps

Chapter lead

Product Owner

  • The PO / CL is responsible for information security and privacy aspects for products within his/her responsibility.

  • The PO / CL is responsible to serve as first point of contact regarding information security requirements and incident for products within his/her responsibility.

Julien Rolland (PC)

Matthieu Legros (PC)

Daniel Wuidart (Brio)

Koen Ramakers (Brio)

Bart Pollet (Infra)

Christophe Arnould (BCC)

John Croon (Facility Mgr)

 

Risk Officer

  • Establish and maintain security risk methodology

  • Coordinate with CIO, CISO, DPO, PO and CL to regularly identify and assess security risks of ISMS

  • Maintain a security risk register

  • Coordinate with CIO, CISO, DPO, PO and CL to define security risk treatments

  • Maintain a security risk treatment plan

Caline Villacres

Product security champion

  • The immediate contact for the security of the product within his/her responsibility.

  • Responsible to serve as first point of contact regarding information security requirements and incident within his/her product.

Mohamed Amine Youssef

 

7.  Data Classification

All Portima’s employees should classify and handle information based on Portima classification scheme outlined below:

 

Classification Levels

Description

Confidential

Confidential data is information available only for authorised users who really need access to the information (e.g., strategic information, broker client data).

Internal use

By default, all documents and data belonging to Portima are considered “internal use”, except if they are classified “public” or “confidential”

Public

Public data is information that everyone has access to. It’s public information, freely accessible and can thus be openly used, reused and shared.

 

8.  Training and Awareness

Portima shall provide regular information security training and awareness activities (eg: phishing campaigns) to raise resources having access to its systems and data awareness regarding information security.

During onboarding, the employee/contractor shall also attend awareness sessions on the following topics:

  • General ICT Security awareness
  • GDPR, DORA
  • Phishing reporting
  • Human firewall

All those trainings and security awareness activities are mandatory.

 

9.  Review and Auditing

[1] Portima shall review and audit in a yearly basis its security policies and practices to ensure that they are effective, up-to-date and reflect changes in technology, business processes, and regulatory requirements.

[2] The Information Security Management System (ISMS) shall be audited at least once a year, with the results shared with the financial client upon request, in accordance with Regulation (EU) 2022/2554, Art. 6, par. 5. This audit will incorporate an annual ICT internal audit plan, which shall be defined, formalized, and periodically reviewed to ensure ongoing effectiveness, as required by Regulation (EU) 2022/2554, Art. 6, par. 6.

[3] ICT audits shall be conducted by independent internal auditors with the necessary knowledge and skills to assess ICT risks effectively, as per Regulation (EU) 2022/2554, Art. 6, par. 6.

[4] The frequency and focus of ICT audits shall be guided by identified ICT risks, ensuring higher-risk areas receive appropriate attention, in line with Regulation (EU) 2022/2554, Art. 6, par. 6.

[5] A defined and formalized process shall be in place to monitor remediation actions for critical ICT audit findings, ensuring timely resolution and compliance with Regulation (EU) 2022/2554, Art. 6, par. 7

 

10.  Policy enforcement

The policy statements containing the terms “shall” and “shall not” indicate a requirement, while the terms “should” and “should not” indicate a recommendation.

Violation of this information security policy or any of Portima security policies or security procedures, whether through negligence or with malicious intent might be subject to administrative discipline and possible criminal pursuit.

 

11.  Reference

ISO 27001:2022 Controls (Annex A)

5. Leadership

6. Planning

A.5.1 Policies for information security

A.5.2 Information security roles and responsibilities

A.5.12 Classification of information

A.5.13 Labelling of information

A.5.24 Information security incident management planning and preparation

DORA Regulation
DORA Regulation (EU) 2022/2554 - Art.6, 11, 14, 15
DORA JC_2023_86_
Final_report_on_draft_RTS_on_ICT_Risk_Management_Framework

 

12.  Glossary

 

 

Term

Description

Availability

A principle of assuring that information is accessible to

and usable by an authorised individual or entity when required.

Confidentiality

Preserving authorized access to ensure that information and systems are only accessible to authorised users.

Integrity

The guarding against improper information modification or destruction.

Information

Knowledge concerning objects, such as facts, events, things, processes, or ideas that, within a certain context,

has a particular meaning.

Information security

The set of the administrative and the technical measures (practices and methods) taken to ensure the protection of the Portima’s information and information systems.

Information security incidentA single or a series of unwanted or unexpected cyber security events that are likely to compromise organisational activities.
ICT incidentICT-related incident means a single event or a series of linked events unplanned that compromises the security of the network and information systems, and have an adverse impact on the availability, authenticity, integrity or confidentiality of data, or on the services provided by the entity
RiskThe degree of danger that a threat might materialise if one or more vulnerabilities in an information system were to be exploited.
ISMSA management system comprised of information security policies, roles and responsibilities to structurally identify and manage cyber risks while creating visibility on Portima’s information security posture.
Network securityThe protection of a computer network and its resources from unauthorized access, misuse, or damage, ensuring data confidentiality, integrity, and availability
AuthorizationThe process of granting or denying access to specific resources or actions within a system based on assigned permissions.
AuthenticationThe verification of the identity of a user, device, or program before allowing access to a system or its resources.
Non-RepudiationThe assurance that a party cannot deny the authenticity of their signature or the validity of a transaction, providing proof of the origin and integrity of the data involved.
CryptographyThe practice of securing information by converting it into an unreadable format to prevent unauthorized access.
EncryptionThe process of encoding information into a secure format that can only be decoded by authorized entities.
Third-party securityThe protection of an organization’s data and systems when accessed or managed by external service providers or vendors.
Physical and Environmental SecurityThe protecting of an organization’s physical assets from threats such as unauthorized access, theft, or natural disasters.
Business ContinuityThe planning and processes to ensure that critical functions and services can continue during and after a major disruption.
Cyber resilienceThe ability of an organization to withstand, respond to, and recover from cyberattacks or other disruptions to its digital operations.