Last Updated at
1.1 Purpose
This Security Policy outlines BrainPayroll UK Ltd.’s overall security posture and practices. Its goal is to establish a unified framework to ensure the confidentiality, integrity, and availability of payroll and personal data, safeguard organizational assets, and comply with legal and regulatory requirements, including ISO 27001, NIST, and UK GDPR.
This policy serves as an umbrella document that references detailed policies on specific security aspects and provides a holistic overview of our security practices. All employees, contractors, and third-party vendors are expected to comply with the principles set out in this policy.
1.2 Scope
This Security Policy applies to all employees, contractors, third-party vendors, and affiliates with access to BrainPayroll UK Ltd.'s systems and data. It covers the protection of sensitive payroll and personal data, access controls, compliance with legal requirements, third-party management, and secure software development practices. All individuals with access are responsible for following the security measures outlined in this policy.
1.3 Governance and Compliance
1.3.1 Security Governance
BrainPayroll follows a top-down approach to security governance, ensuring that information security is embedded in the organization's culture. The AVP IT Infra and Security is responsible for overseeing the execution of security policies and ensuring compliance with ISO 27001, and UK GDPR.
1.3.2 Legal and Regulatory Compliance
We comply with all applicable data protection regulations, including:
All security practices are designed to ensure compliance with these standards and to uphold the privacy and security of personal data
1.4 Data Security and Privacy
1.4.1 Data Classification and Protection
BrainPayroll classifies data based on its sensitivity and applies appropriate protection measures. Sensitive payroll data is classified as confidential and protected with encryption, access controls, and other security measures.
1.4.2 Data Minimization and Retention
We collect only the minimum amount of personal data necessary for payroll processing and retain it for only as long as needed to fulfil business or legal obligations. Data retention periods are defined and managed according to legal and operational requirements.
1.4.3 Data Processing Agreements (DPA)
We ensure that all third-party service providers who process payroll data are bound by a formal Standard Contractual contract (SCC) or Data Processing Agreement (DPA) that defines the terms of data handling, security obligations, and liability in case of a breach. These DPAs ensure that all data processors comply with the UK GDPR and other regulatory standards.
1.4.4 Data Subject Rights
We respect the rights of data subjects as outlined in the UK GDPR and provide mechanisms for employees and other data subjects to:
Requests are handled in accordance with the applicable legal timelines.
1.4.5 Data Breach Notification
In the event of a data breach, BrainPayroll will comply with UK GDPR Article 33 for breach notification. The breach will be reported to the relevant authorities within 72 hours, and affected individuals will be notified as per the guidelines in GDPR.
1.5 Access Control
Access control systems are implemented to protect the company's IT resources and ensure a secure, accessible working environment. These systems perform user identification, authentication, and authorization to verify and grant access based on required credentials, including passwords, PINs, security tokens, or other authentication factors.
Access to confidential, restricted, and protected information is limited to authorized personnel whose job responsibilities necessitate such access. Requests for access permissions, including granting, changing, or revoking access, must be submitted in writing.
Password issuance, strength requirements, and management are controlled through a formal process, with settings for password length, complexity, and expiration enforced through the Windows Active Directory Group Policy and other required tools and technologies.
1.5.1 Role-Based Access Control (RBAC)
BrainPayroll employs Role-Based Access Control (RBAC) to ensure that employees and contractors only have access to payroll data and systems necessary for their roles. Access permissions are regularly reviewed to prevent unauthorized access.
1.5.2 Authentication and Authorization
1.5.3 Access Review and Revocation
Access to payroll systems is reviewed quarterly to ensure that permissions are still required. When employees or contractors leave the organization, their access is promptly revoked to prevent unauthorized access.
1.5. Network and System Security
1.5.1 Network Security
We implement a variety of network security controls to safeguard systems and data, including:
1.5.2 Server Security
1.5.3 Encryption
1.5.4 Data Processing Security
Remote Support Team Infrastructure
1.6 Incident Management
1.6.1 Incident Response
BrainPayroll has a formal Incident Management Policy and Data Breach Policy that define how security incidents are identified, reported, and resolved. All employees are trained in how to report security incidents.
1.6.2 Security Logging and Monitoring
We log and monitor all critical system activities to detect suspicious behaviours or potential security threats. Logs are stored with a centralized SIEM solution, retained for 3 years for forensic analysis, and protected from tampering.
Alerts are generated for unusual activities, such as unauthorized access attempts, and are reviewed by the Security teams.
1.7 Vendor and Third-Party Management
1.7.1 Third-Party Security Risk Assessment
All third-party vendors who access payroll data are subject to a thorough security risk assessment. Third-party vendors must meet BrainPayroll's security standards, including data protection requirements and the implementation of appropriate controls.
1.7.2 Third-Party Audits
We conduct regular third-party security audits to verify that our vendors comply with the necessary security standards, including ISO 27001, NIST, GDPR and Cyber Essential.
1.8 Business Continuity and Disaster Recovery
1.8.1 Business Continuity Planning
BrainPayroll maintains a Business Continuity Plan (BCP) to ensure the availability of critical services even in the event of a disaster. The BCP includes procedures for maintaining operational functionality during disruptions.
1.8.2 Disaster Recovery Plan
We have a Disaster Recovery Plan (DRP) to ensure the quick recovery of payroll systems and data in the event of an incident. The DRP is tested at least annually through simulation exercises.
1.8.3 Data Backup
1.9 Security and Awareness Training
1.9.1 Employee Training
All employees undergo mandatory security awareness training when they join BrainPayroll and annually thereafter. The training includes topics on GDPR compliance, data protection, recognizing phishing attacks, and reporting security incidents.
1.9.2 Secure Coding Training
BrainPayroll follows secure coding practices to minimize vulnerabilities in software development. Developers adhere to industry standards such as OWASP guidelines to prevent common security issues like SQL injection and cross-site scripting (XSS).
Security is integrated throughout the SDLC, with regular code reviews, static and dynamic analysis tools, and penetration testing to identify and fix vulnerabilities. These practices ensure that all payroll applications are secure and compliant with data protection standards.
1.10 Service and data availability
BrainPayroll ensures the availability of its critical systems and data through a variety of measures designed to prevent disruptions. This includes the use of multiple internet lines for redundant connectivity, ensuring continuous access to our systems even during outages.
For power reliability, DG sets (Diesel Generators) and UPS (Uninterruptible Power Supply) systems provide backup electricity, enabling uninterrupted service during power failures.
All critical data is stored on RAID disks (Redundant Array of Independent Disks), which provide redundancy and fault tolerance in case of disk failures.
Additionally, data backup is performed regularly, with offsite backups stored securely at our Disaster Recovery (DR) sites, ensuring that data can be recovered quickly in case of system failures, natural disasters, or other emergencies. These measures are continuously tested to ensure high availability and business continuity.
1.11 Secure Software Development Life Cycle (SSDLC)
At BrainPayroll, security is embedded throughout each phase of the Software Development Life Cycle (SDLC) to ensure that applications are developed with the highest security standards. The following outlines our approach to security, from architecture design to monitoring.
1.11.1 Architecture: Threat Modelling of Application Design:
1.11.2 Secure Coding Guidelines
1.11.3 Testing: Security Test Cases and Penetration Testing
1.11.4 Continuous Integration (CI): Automated Security Testing
Once deployed, continuous system monitoring is conducted to track system performance and identify any abnormal activity that could indicate a security breach.
1.12 Source Code Security and Management
BrainPayroll implements comprehensive Source Control Security and Management practices to safeguard the integrity, confidentiality, and security of code throughout the development lifecycle. All source code is stored in a secure version control system, with access restricted to authorized personnel only. Key aspects of the management process include:
1.13 Standard Release Process
The release process at BrainPayroll ensures that all software deployments, whether planned or emergency, are conducted securely and efficiently. We have defined processes for Planned Releases, Emergency Releases, and General Releases, each with its own set of procedures, testing, and approval mechanisms
1.13.1 Planned Release
1.13.2 Emergency Release
1.13.3 General Release Process Highlights
1.14 Vulnerability Management
BrainPayroll follows a structured approach to Vulnerability Management to address and mitigate security risks based on their severity. Vulnerabilities are categorized using the Common Vulnerability Scoring System (CVSS), and corrective actions are taken based on their priority:
1.15 Policy Enforcement and Review
1.15.1 Policy Enforcement
This Comprehensive Security Policy is enforced through regular audits and reviews. Employees and contractors are required to comply with all aspects of the policy, and non-compliance may result in disciplinary action.
1.15.2 Policy Review
The policy is reviewed annually, and updates are made as necessary to address emerging threats, changes in regulatory requirements, or improvements in security practices.