Circular Software IT Security Policy / 2025

 1. Purpose

  • To ensure the confidentiality, integrity and availability of Circular Software’s systems, code and customer data by definingclear security responsibilities and controls.

2. Scope

  • Applies to all company personnel (the soledirector/employee and any contractors), all systems, code repositories and environments used to develop, deploy and support Circular Software’s AdobeInDesign app/plugin.

3. Roles & Responsibilities

  • Director (Security Owner): Overall accountability for security, approves changes, conducts reviews.
  • Contractors: Must comply with this policy, complete security training, and follow secure development practices.
  • Third‐party Providers (e.g. AWS, GitHub, Webflow, Dropbox): Must maintain their own security certifications and controls as per their published policies.

4. Human Resource Security

  • Onboarding: All new contractors undergo reference and background checks (including DBS/security vetting).
  • Training: security awareness training via LinkedIn Learning (covering OWASP Top Ten, phishing, secure coding).
  • Offboarding: Documented process to disable all system accounts, revoke keys/badges, and collect company assets, secure disposal of data/assets if required.
  • Confidentiality: All personnel sign NDAs and confidentiality clauses in contracts.

5. Asset Management

  • Inventory: Maintain an inventory of coderepositories, cloud resources, API keys and development tools.
  • Classification: Code classified as“Confidential,” encrypted at rest and in transit.

6. Access Control

  • Least Privilege: Access to production and development environments granted on a need-to-know basis.
  • Multi-factor authentication enforced on all systems (GitHub, Webflow, Airtable, Dropbox, email, VPN).
  • Strong password requirements (minimum 12characters, complexity).
  • Account Lockout: Automatic lockout after fiveunsuccessful login attempts; account unlock via director.

7. Cryptography

  • Data at Rest: Cloud provider encryption(AES-256) for all storage volumes and backups.

8. System Development & Maintenance

  • Secure Development:
  • Follow OWASP Secure Coding Practices.
  • Peer review of all code changes; use pullrequests on private GitHub.
  • Change Management:
  • All changes logged in our project tracker.
  • Stakeholders notified of any changes that could affect functionality or security.
  • Vulnerability Management:
  • Weekly automated vulnerability scans of all code and cloud infrastructure.
  • Critical findings remediated within 72 hours; tracked in issue tracker.

9. Network & Infrastructure Security

  • Firewalls: Software and hardware firewallsenforce network segmentation between development, test and production systems.
  • VPN: Mandatory for all remote access to internalcloud resources.
  • IDS/IPS: Not deployed (low-traffic, cloud-onlyenvironment); cloud provider’s managed threat detection is relied upon.

10. Supplier & Third-Party Security

  • Due Diligence: Only engage cloud and service providers with published security certifications (e.g., ISO 27001, SOC 2).
  • Contracts: review provider policies annually.

11. Monitoring & Logging

  • Audit Logs: Enable system-level logs for all environments.
  • Retention: Logs retained for 90 days for incident investigation.
  • Review: Director reviews critical logs monthly.

12. Incident Response & Business Continuity

  • Incident Response Plan: Documented steps fordetection, containment, eradication, recovery and lessons learned.
  • Notification: Customers notified within 24 hoursof any incident with potential customer impact.
  • Backups: Weekly full backups of databases and code repositories.
  • Stored in a separate cloud region; restore tested semi-annually.
  • Disaster Recovery: in event of major outage,systems can be rebuilt from code and backups within 24 hours.

13. Compliance & Review

  • Compliance: This policy aligns with industrybest practices; no formal certification due to company size.
  • Review Cycle: Policy reviewed and updatedannually or after any major change in environment or personnel.