Skip to main content

Visitor Management System 

Statement of Applicability

SecuritEase Level 7

img-SELogo

Version 0.2

ThoughtLabs Limited

Document Control

AreaDetail
Document NameVisitor Management System - SoA
Document ClassificationInternal
Creation Date19/12/2024
Version0.2
AuthorTim Jackson - CSO ThoughtLabs Limited
OwnerBill Tonkin - Director - SecuritEase International

Introduction

Purpose

SecuritEase International (SecuritEase) is moving into a repurposed and upgraded physical floor at 25 Victoria Street.

The purpose of this document is to provide a mapping of the proposed solution (Solution) to the available topics under the various areas defined within the standard.

This is not designed to provide an assessment of the applicability of topics and Solution controls as this would be done as part of any assessment.

Scope

The following topics and controls are based on the currently available ISO 27001:2022 documentation.

They are only applicable to the scope of this project being the Visitor Management System (VMS), Level 7 Petone.

Stakeholders

The following table is a list of business and service owners.

NameRole
Tim JacksonDesign lead / implementation lead - VMS
James WinskillHead of Systems and Delivery
David HinkleyBusiness Owner
William TonkinDirector - SRO
Gavin WillbondConsultant - Governance and ISO lead

Initial Risk Assessment

IDAreaRiskLikelihoodImpactRisk LevelOwner
1Cyber RiskCompromise to systems from external attackLowLowLow
2Vulnerabilities in DevicesCompromise to operation of iPadLowLowLowJames Winskill
3Reception iPad compromiseCompromise of iPad leading to network accessMediumLowLowJames Winskill
4Cloud Security VulnerabilitiesVulnerabilities in SaaS applicationMediumMediumMediumJames Winskill
5Remote Access CompromiseAccess to local console leading to compromiseLowLowLowJames Winskill
6Configuration ManagementIncorrect configuration leading to vulnerability or access control policies.MediumLowLowJames Winskill
7Lack of Stakeholder OwnershipNo formal business owner documented.MediumMediumMediumGavin Willbond
8Compromise to wiringRemoval of printer or iPad and connecting to network leading to compromise of network / serviceLowLowLow
9Lack of Standard Incident ManagementAlerts and events are not acted on, and no process followed. Impact is compromise goes uncheckedMediumLowLowWilliam Tonkin
10Alerting and Action on Incident inconsistentWith no formal Incident Response process, luck of the draw on actions and investigationMediumHighMediumWilliam Tonkin
11Power outage impactsPower to system causes printer to failLowLowLowDavid Hinkley
12In formal Incident Response PlanProject provided Incident Response activities are not factored into organisation response planMediumMediumMediumWilliam Tonkin
13No formal change management policyNo current organisational change management policy exists for this type of system or service.MediumMediumMediumWilliam Tonkin
14Staff not trainedStaff unwilling, or unable to be trained to the degree of proficiency required.HighMediumMediumJames Winskill
15No formal acceptance processNo organisational acceptance and handover process.HighMediumMediumJames Winskill

ISO 27001:2022 Control Selection

Physical Security / Secure Configuration

A10.1 / 11.1

CategoryTopicControl JustificationStatus
5.37Documented operating proceduresThe project has created a number of documented procedures relating to the Scope.  These would be maintained as evidence in the organisational knowledgebase.Planned
6.07Remote workingNot Applicable in the Scope.Excluded
7.01Physical security perimetersThe physical parameters of the Scope are determined by the use of Zones.  This service is located in a public area. Zone 1.Planned
7.05Protecting against physical and environmental threatsThe System will prevent unauthorised access to Scope areas from external threats through the use of electronic access control.Planned
7.08Equipment siting and protectionIn Scope equipment is protected from unauthorised access using the following controls:
- iPad is locked using a metal lock and key
- iPad is securely bolted to the desk
- Cabling is integrated into desk, and not easily accessable
Planned
7.09Security of assets off-premisesNot in ScopeExcluded
7.10Storage mediaNot in ScopeExcluded
7.11Supporting utilitiesWithin the Scope of Services, this will include power and network access cabling.  The power is maintained by the building owner.
iPad has a battery backup for 8 hours without external power.
Planned
7.12Cabling securityCables are homerun from the endpoint, and the Hub.  The following controls apply to this area:

- Cables are in the wall or ceiling
- Cables are secured in cable runs or channels with other cables
- Cables are not labelled as security control
- Cables are point to point with no interconnects or splitters.
Planned
7.13Equipment maintenanceEquipment will be maintained according to the Warranty of the vendors.Planned
7.14Secure disposal or reuse of equipmentAny owned equipment will be disposed of according to the appropriate organisational secure disposal policy.Planned

Network Security

CategoryTopicControlOwner
5.37Documented operating proceduresThe project has created a number of documented procedures relating to the Scope.  These would be maintained as evidence in the organisational knowledgebase.James Winskill
6.07Remote workingNot in ScopeJames Winskill
8.07Protection against malwareThe iPad will be maintained using Intune and will be set to automatically install new Apple iOS updates.James Winskill
8.18Use of privileged utility programsAccess to the components in the System are controlled via passcodes or using the software access control services.James Winskill
8.20Networks securityAll networks are secured using MAC based access control, reducing the impact of compromise.James Winskill
8.21Security of network servicesJames Winskill
8.22Segregation of networksThe networks are segmented using IETF RFC 2674 Virtual LAN (VLAN) segments for each of the three network security zones:
- Visitor Management Service vLAN

Device Isolation (ACL) is deployed to limit devices on the same network communicating.
James Winskill
8.23Web filteringNot Applicable in the Scope.James Winskill
8.25Secure development life cycleNot Applicable in the Scope.James Winskill
8.26Application security requirementsThe applications in Scope are listed below:

- SigninApp. Portal
- SigninApp iPad Application

These applications are provided by the vendor.  

The applications themselves are linked to the System via an Internet cloud based control plane hosted by the vendor.

Provision should be undertaken to do a SaaS security risk assessment on this.
8.27Secure system architecture and engineering principlesThe system is designed to be secure by default.  Existing site policies around secure access in the event of power outage.James Winskill
8.28Secure codingNot Applicable in the Scope.
8.29Security testing in development and acceptanceNot Applicable in the Scope.  No non production environment is in Scope.
8.30Outsourced developmentNot Applicable in the Scope.
8.31Separation of development, test and production environmentsNot Applicable in the Scope.
8.32Change managementAs per the Organisation standards for critical systems.  Documentation of this is not in Scope.James Winskill
8.34Protection of information systems during audit testingNot Applicable in the Scope.

Identity and Access Management

CategoryTopicControlOwner
5.37Documented operating proceduresThe project has created a number of documented procedures relating to the Scope.  These would be maintained as evidence in the organisational knowledgebase.James Winskill
8.02Privileged access rightsAccess to systems is controlled by Policy, with Identities being used to control access.

The System uses the following:

- Portal Access Control Policies
- Role based access to change
- Pin Code on iPad

Role based access control is enforced in the management and access to change across the following system domains:

- Portal Access Control

Assignment of rights is done using the principle of least privilege.
James Winskill
8.03Information access restrictionThis is controlled through the use of access permissions and audit logs.James Winskill
8.04Access to source codeNot Applicable in the Scope.James Winskill
8.05Secure authenticationAuthentication to all aspects of the System is controlled using a SignInApp centrally managed Identity.

All authentication is encrypted.

Authentication between the SignInApp Portal and the end user is maintained with the application. The following controls are deployed:
- Complex password
- 2MFA required
- Restricted set of users

Authentication between the Portal and Entra for the synchronisation of Staff is done via Entra App Management and uses:
- ClientID / Secret
- OAUTH callback
- Read Only
James Winskill

Information Security Event Management

CategoryTopicControlOwner
5.24Information security incident management planning and preparationThe Design includes a section called Incident Response Activity design.  This provides a method for alerting authorised support users of activities or events that need to be documented, and a response provided.  These are not deployed today, and no formal communication of current state provided.  

The Solution provides a method of formalising the response activities and the assignment of priorities and severities to physical access events.

The Scope of this project is not to refine the Organisations Incident Response plan, but provide a solution and process to ensure notification and escalation of good practice is undertaken.
James Winskill
5.25Assessment and decision on information security eventsNot Applicable in the Scope.
5.26Response to information security incidentsNot Applicable in the Scope.
5.27Learning from information security incidentsNot Applicable in the Scope.
5.28Collection of evidenceEvidence relating to events is recorded in the logs and notifications and audit component of the Portal.James Winskill
5.37Documented operating proceduresThe project has created a number of documented procedures relating to the Scope.  These would be maintained as evidence in the organisational knowledgebase.James Winskill
8.16Monitoring activitiesThis is covered in detail in the Design.James Winskill
8.17Clock synchronizationThe System provides Network Time Protocol (NTP) services and time sync is enforced to all devices and services.James Winskill

Continuity

CategoryTopicControlOwner
5.29Information security during disruptionNot Applicable in the Scope.
5.30ICT readiness for business continuityNot Applicable in the Scope.
5.37Documented operating proceduresThe project has created a number of documented procedures relating to the Scope.  These would be maintained as evidence in the organisational knowledgebase.James Winskill
8.06Capacity managementThe System is managed to capacity limits and has the current capacity deployed:
- Single site licensed (no limits documented by the vendor)
- Single iPad (no limits documented by the vendor on iPads - not an extra cost if more added.)
James Winskill
8.13Information backupAll backups are made automatically to the SignInApp AWS cloud.James Winskill
8.14Redundancy of information processing facilitiesThe current design has a single local Access Controller and Enterprise Hub.



There is no designed redundancy of information processing.
James Winskill