Skip to content

Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure

License

Notifications You must be signed in to change notification settings

Hack23/ISMS-PUBLIC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Hack23 Logo

๐Ÿ” Hack23 AB โ€” Information Security Management System

Security Excellence Through Transparency
Enterprise-grade ISMS for Innovation-driven Security Consulting

Owner Version Effective Date Review Cycle

Document Owner: CEO | Version: 3.0 | Last Updated: 2025-11-25 (UTC)
๐Ÿ”„ Review Cycle: Quarterly | โฐ Next Review: 2026-02-25

Link Validation Documentation Validation CI


๐ŸŽฏ Executive Statement

Welcome to Hack23 AB's comprehensive ISMS documentation. Founded in June 2025 (Organization Number: 559534-7807), Hack23 AB operates as a Swedish cybersecurity consulting company demonstrating radical transparency through our industry-first public ISMS.

๐Ÿ† Phase 1 Foundation Excellence โ€” Complete (November 2025):

  • โœ… 100% ISMS documentation published (70% public, 30% sensitive values redacted)
  • โœ… OpenSSF Scorecard 8.7 average (CIA, CIA Compliance Manager, Black Trigram)
  • โœ… CII Best Practices Gold/Passing level achieved across all repositories
  • โœ… Zero critical vulnerabilities outstanding (Dependabot monitoring)
  • โœ… 95% compliance control coverage (ISO 27001, NIST CSF 2.0, CIS Controls v8.1)

๐Ÿข Single-Person Company: Hack23 AB is operated by CEO/Founder James Pether Sรถrling. Our ISMS demonstrates that enterprise-grade security is achievable through innovative compensating controls: temporal separation, automation, external validation, and audit trail preservation.

๐ŸŒ Radical Transparency: We publish 70% of our ISMS openly to demonstrate security through robust processes rather than obscurity. Only specific sensitive values (credentials, account numbers, contract pricing) are redacted.

Note: The hack23.com website was registered in 2008 by the CEO, operating as an independent professional before formally establishing Hack23 AB in June 2025.

As CEO with CISM/CISSP certifications and three decades of experience, I've structured Hack23 AB around a fundamental principle: our Information Security Management System (ISMS) is not separate from our business - it IS our business model. This integration allows us to deliver security consulting services while simultaneously developing products that demonstrate these principles in action.

Our commitment to transparency extends beyond our open-source projects. This ISMS documentation itself serves as a testament to our belief that security through obscurity is a failed strategy. True security comes from robust processes, continuous improvement, and a culture where every decision considers security implications.

โ€” James Pether Sรถrling, CEO/Founder


๐Ÿš€ Quick Start

New to our ISMS? Start with these foundational documents:

๐Ÿ” Core Security Policies

๐Ÿ“Š Risk & Compliance

๐Ÿ›ก๏ธ Operational Security

๐Ÿ—๏ธ Product Security

๐Ÿ“– Documentation Standards


๐ŸŽ–๏ธ Security & Compliance Posture

Security Certifications:

OpenSSF Scorecard CII Best Practices SLSA

Compliance Frameworks (100% Coverage):

ISO 27001 NIST CSF CIS Controls GDPR NIS2 EU CRA


๐Ÿš€ CI/CD Status

Validate Documentation

All ISMS documentation is continuously validated against:

  • โœ… Markdown linting standards
  • ๐Ÿ”— Link integrity checks
  • ๐Ÿ“‹ Document structure requirements
  • ๐Ÿ”’ Security and sensitive data scanning
  • ๐ŸŽจ STYLE_GUIDE.md v2.1 compliance (with documented exemptions for 12 legacy files)

๐Ÿข About Hack23 AB

Hack23 AB is a Swedish innovation hub founded in 2025, specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting. With a commitment to realism and authenticity, our flagship project, Black Trigram, combines traditional Korean martial arts with educational gameplay, while our information security services leverage advanced open-source tools and methodologies to protect digital integrity, confidentiality, and availability. At Hack23 AB, we're driven by a passion for precision, creativity, and uncompromising security.


๐Ÿ“Š Visual Guides & Diagrams

Hack23 ISMS includes comprehensive Mermaid diagrams for improved understanding and navigation:


๐Ÿ“Š ISMS Document Hierarchy

Hack23 AB's ISMS follows a structured hierarchy from strategic vision to operational templates, demonstrating enterprise-grade governance and systematic security management.

flowchart TD
    subgraph STRATEGIC["๐ŸŽฏ Strategic Level"]
        STRATEGY[Information Security Strategy<br/>3-year roadmap and vision]
        POLICY_ROOT[Information Security Policy<br/>Governance framework]
        CLASSIFICATION[Classification Framework<br/>CIA impact methodology]
    end
    
    subgraph GOVERNANCE["๐Ÿ“‹ Governance Policies"]
        RISK[Risk Register<br/>Risk identification & treatment]
        COMPLIANCE[Compliance Checklist<br/>Multi-framework alignment]
        METRICS[Security Metrics<br/>KPI measurement & reporting]
        TRANSPARENCY[ISMS Transparency Plan<br/>Public disclosure strategy]
    end
    
    subgraph OPERATIONAL["โš™๏ธ Operational Policies"]
        ACCESS[Access Control Policy<br/>IAM & authentication]
        CHANGE[Change Management<br/>Change control procedures]
        INCIDENT[Incident Response Plan<br/>Security incident handling]
        BCP[Business Continuity Plan<br/>Operational resilience]
        DRP[Disaster Recovery Plan<br/>Technical recovery]
        THIRD_PARTY[Third Party Management<br/>Vendor risk management]
    end
    
    subgraph TECHNICAL["๐Ÿ› ๏ธ Technical Policies"]
        SECURE_DEV[Secure Development Policy<br/>SDLC security requirements]
        CRYPTO[Cryptography Policy<br/>Encryption standards]
        NETWORK[Network Security Policy<br/>Network controls & segmentation]
        VULN[Vulnerability Management<br/>Security testing & patching]
        BACKUP[Backup & Recovery Policy<br/>Data protection procedures]
        DATA[Data Classification Policy<br/>Information handling]
    end
    
    subgraph SUPPORT["๐Ÿ“– Supporting Documents"]
        STYLE[Style Guide<br/>Documentation standards]
        QA[ISMS QA Checklist<br/>Quality assurance]
        TEMPLATES[Templates<br/>Policy & procedure templates]
        ASSET[Asset Register<br/>IT asset inventory]
    end
    
    STRATEGY --> POLICY_ROOT
    POLICY_ROOT --> GOVERNANCE
    POLICY_ROOT --> OPERATIONAL
    POLICY_ROOT --> TECHNICAL
    GOVERNANCE --> SUPPORT
    
    style STRATEGIC fill:#1565C0,color:#fff
    style GOVERNANCE fill:#4CAF50,color:#fff
    style OPERATIONAL fill:#FF9800,color:#fff
    style TECHNICAL fill:#D32F2F,color:#fff
    style SUPPORT fill:#7B1FA2,color:#fff
Loading

Key Takeaways:

  • ๐ŸŽฏ Strategic Level: Defines overarching security vision, governance framework, and impact classification methodology
  • ๐Ÿ“‹ Governance: Establishes risk management, compliance tracking, metrics, and transparency commitments
  • โš™๏ธ Operational: Implements day-to-day security operations including access control, incident response, and business continuity
  • ๐Ÿ› ๏ธ Technical: Specifies technical security controls for development, cryptography, network, vulnerability, and data protection
  • ๐Ÿ“– Support: Provides quality assurance, documentation standards, templates, and asset tracking

Related Documents:


๐Ÿ“Š ISMS Health Dashboard

๐Ÿ“ˆ View Live ISMS Metrics Dashboard - Real-time policy health monitoring with automated review tracking

Our ISMS Metrics Dashboard provides instant visibility into:

  • ๐Ÿšฆ Review Status: Overdue, due soon, and current policy reviews
  • ๐Ÿ“… Upcoming Reviews: Next 90 days calendar view
  • ๐Ÿ“‹ Document Health Matrix: Complete status of all 40 ISMS documents
  • ๐Ÿ“Š Compliance Coverage: ISO 27001, NIST CSF, CIS Controls alignment
  • ๐Ÿ”„ Automated Updates: Weekly refresh via GitHub Actions

๐Ÿ“‹ ISMS Documentation Status

Last Updated: 2025-11-25 | Completion: 100% (40/40 policies)

Policy Document Status Version Last Updated Single-Person Adapted ISO 27001 NIST CSF 2.0 CIS v8.1
๐Ÿ” Information Security Policy โœ… Complete 1.6 2025-11-19 โœ… Yes โœ… A.5.1 โœ… GV โœ… IG1
๐ŸŽฏ Information Security Strategy โœ… Complete 3.0 2025-11-10 N/A (Strategy) โœ… All โœ… All โœ… All
๐Ÿ”‘ Access Control Policy โœ… Complete 2.5 2025-11-24 โœ… Yes โœ… A.5.15-18 โœ… PR.AC โœ… IG1
โœ… Acceptable Use Policy โœ… Complete 1.0 2025-11-05 โœ… Yes โœ… A.6.2 โœ… PR.AT โœ… IG1
๐Ÿค– AI Governance Policy โœ… Complete 1.1 2025-11-17 N/A โœ… A.5.1 โœ… GV.RR โœ… IG2
๐Ÿ’ป Asset Register โœ… Complete 1.4 2025-11-05 โœ… Yes โœ… A.5.9 โœ… ID.AM โœ… IG1
๐Ÿ’พ Backup & Recovery Policy โœ… Complete 1.1 2025-11-17 N/A โœ… A.8.13 โœ… PR.IP โœ… IG1
๐Ÿ”„ Business Continuity Plan โœ… Complete 1.2 2025-11-24 โœ… Yes โœ… A.5.29-30 โœ… RC.RP โœ… IG2
๐Ÿท๏ธ Classification Framework โœ… Complete 1.2 2025-11-05 N/A โœ… A.5.12 โœ… ID.AM โœ… IG1
๐Ÿ›ก๏ธ CRA Conformity Assessment โœ… Complete 1.1 2025-11-14 N/A โœ… A.5.1 โœ… GV.SC โœ… IG2
๐Ÿ“ Change Management โœ… Complete 2.3 2025-11-24 โœ… Yes โœ… A.8.32 โœ… PR.IP โœ… IG2
โœ… Compliance Checklist โœ… Complete 2.1 2025-11-17 โœ… Yes โœ… A.5.1 โœ… GV.OC โœ… IG1
๐Ÿ”’ Cryptography Policy โœ… Complete 1.1 2025-11-17 N/A โœ… A.8.24 โœ… PR.DS โœ… IG2
๐Ÿท๏ธ Data Classification Policy โœ… Complete 2.2 2025-11-05 N/A โœ… A.5.12-13 โœ… ID.AM โœ… IG1
๐Ÿ†˜ Disaster Recovery Plan โœ… Complete 2.2 2025-11-17 N/A โœ… A.5.29 โœ… RC.RP โœ… IG2
๐Ÿค External Stakeholder Registry โœ… Complete 1.2 2025-11-17 N/A โœ… A.5.19 โœ… ID.BE โœ… IG1
๐Ÿšจ Incident Response Plan โœ… Complete 1.3 2025-11-24 โœ… Yes โœ… A.5.24-28 โœ… RS.AN โœ… IG1
๐Ÿ“ฑ Mobile Device Management โœ… Complete 1.0 2025-11-05 โœ… Yes โœ… A.6.7 โœ… PR.AC โœ… IG1
๐ŸŒ Network Security Policy โœ… Complete 2.2 2025-11-05 N/A โœ… A.8.20-22 โœ… PR.AC โœ… IG1
๐Ÿ›๏ธ NIS2 Compliance Service โœ… Complete 1.0 2025-11-18 N/A โœ… A.5.1 โœ… GV.OC โœ… IG2
๐Ÿ›ก๏ธ OWASP LLM Security Policy โœ… Complete 1.2 2025-11-17 N/A โœ… A.8.16 โœ… PR.DS โœ… IG3
๐Ÿ”“ Open Source Policy โœ… Complete 2.2 2025-11-17 N/A โœ… A.5.23 โœ… ID.SC โœ… IG2
๐Ÿค Partnership Framework โœ… Complete 1.0 2025-11-19 โœ… Yes โœ… A.5.19 โœ… ID.BE โœ… IG2
๐Ÿ  Physical Security Policy โœ… Complete 1.0 2025-11-05 โœ… Yes โœ… A.7.1-4 โœ… PR.AC โœ… IG1
๐Ÿ” Privacy Policy โœ… Complete 1.0 2025-11-05 N/A โœ… A.5.34 โœ… PR.IP โœ… IG2
๐Ÿ“Š Risk Assessment Methodology โœ… Complete 1.0 2025-11-14 N/A โœ… A.5.7 โœ… ID.RM โœ… IG1
โš ๏ธ Risk Register โœ… Complete 2.1 2025-11-24 โœ… Yes โœ… A.5.7 โœ… ID.RM โœ… IG1
๐Ÿ—๏ธ Security Architecture โœ… Complete 1.0 2025-11-14 N/A โœ… A.8.1 โœ… PR.AC โœ… IG2
๐Ÿ“ Style Guide โœ… Complete 2.1 2025-11-17 โœ… Yes N/A N/A N/A
๐Ÿข Supplier Security Posture โœ… Complete 1.1 2025-11-14 N/A โœ… A.5.19-23 โœ… ID.SC โœ… IG2
๐Ÿ“Š SWOT Analysis โœ… Complete 1.0 2025-11-18 โœ… Yes N/A N/A N/A
๐Ÿ› ๏ธ Secure Development Policy โœ… Complete 1.4 2025-11-17 N/A โœ… A.8.25-31 โœ… PR.DS โœ… IG2
๐Ÿ“Š Security Metrics โœ… Complete 1.3 2025-11-05 N/A โœ… A.5.8 โœ… GV.OV โœ… IG2
๐Ÿšซ Segregation of Duties โœ… Complete 2.0 2025-11-24 โœ… Yes โœ… A.5.3 โœ… PR.AC โœ… IG2
๐Ÿ‘ฅ Third Party Management โœ… Complete 2.1 2025-11-17 N/A โœ… A.5.19-23 โœ… ID.SC โœ… IG2
๐ŸŽฏ Threat Modeling โœ… Complete 1.2 2025-11-17 N/A โœ… A.8.25 โœ… ID.RA โœ… IG2
๐Ÿ” Vulnerability Management โœ… Complete 2.0 2025-11-14 N/A โœ… A.8.8 โœ… DE.CM โœ… IG1
๐Ÿ“Š ISMS Metrics Dashboard โœ… Complete 1.0 2025-11-25 N/A โœ… A.5.8 โœ… GV.OV โœ… IG2
๐Ÿ“‹ ISMS QA Checklist โœ… Complete 1.0 2025-11-14 N/A โœ… A.5.8 โœ… GV.OV โœ… IG2
๐ŸŒ ISMS Transparency Plan โœ… Complete 2.1 2025-11-17 N/A โœ… A.5.1 โœ… GV.OC โœ… IG1

๐Ÿ“Š Completion Status

  • โœ… Complete: 40 documents (100%)
  • โณ In Progress: 0 documents
  • ๐Ÿ“… Planned: 0 documents
  • Total: 40 core documents
  • Completion Rate: 100%

๐Ÿข Single-Person Adaptations

  • โœ… Adapted Policies: 15 policies include single-person company compensating controls
  • ๐Ÿ” Temporal Separation: Time-based role separation for conflicting duties
  • ๐Ÿค– Automation Controls: Tool-based enforcement and validation
  • ๐Ÿ“œ Audit Trail Preservation: Immutable logging and external validation
  • ๐Ÿค External Validation: Partnership framework for capacity overflow

๐ŸŽ‰ ISMS Implementation Complete

Hack23 AB's Information Security Management System is now fully documented and operational. This comprehensive ISMS demonstrates enterprise-grade security practices while supporting our dual mission of cybersecurity consulting excellence and innovative product development.

Key Achievements

  • 40 complete policy documents covering all aspects of information security
  • Strategic Partnership Framework addressing single-person dependency risk (R-FOUNDER-001) with capacity overflow procedures
  • NIS2 Compliance Service Package with โ‚ฌ2.6M 3-year revenue projection
  • 7 NIS2 client templates (scoping, gap analysis, incident reporting, risk register, supply chain, checklist, management reporting)
  • Security Architecture Documentation demonstrating ISMS repository security controls and GitHub-based security
  • Acceptable Use Policy establishing clear behavioral expectations and professional standards
  • Physical Security Policy demonstrating home office security for remote operations
  • Mobile Device Management Policy demonstrating pragmatic endpoint security for single-person operations
  • OWASP LLM Top 10 2025 alignment with comprehensive AI security controls
  • GDPR-compliant privacy framework with comprehensive Privacy Policy for user-facing applications
  • 6-level privacy classification system from Special Category data to Anonymized/NA
  • Comprehensive risk assessment with 23 identified and managed risks
  • Full supplier security posture analysis across 18 active services
  • Enterprise-grade AWS security with 27 active services and 8 dedicated security tools
  • Complete business continuity planning with defined RTO/RPO objectives
  • Transparent documentation approach showcasing security expertise to potential clients

Business Value Delivered

  • Client Demonstration Platform: Live ISMS serves as proof of our cybersecurity consulting capabilities
  • Operational Excellence: Systematic approach to security enables business growth and innovation
  • Compliance Readiness: Framework supports ISO 27001, GDPR, NIS2, and other regulatory requirements
  • Risk Management: Proactive identification and treatment of business and security risks
  • Stakeholder Confidence: Transparent security posture builds trust with clients, partners, and investors

This ISMS implementation validates our core principle: enterprise-grade security expertise directly enables innovation rather than constraining it.


๐Ÿ” Security Services Overview

Service Area Offerings Target Market Delivery Model
Security Architecture Enterprise design, risk assessment, strategy Large enterprises Remote/On-site
Cloud Security AWS security, DevSecOps, IaC security Tech companies Remote
NIS2 Compliance NIS2 assessment & implementation (4 packages) Essential/Important entities Hybrid
Compliance GDPR, ISO 27001, SOC 2 implementation Regulated industries Hybrid
Open Source Security OSPO setup, vulnerability management Software companies Remote
Security Training Developer education, executive briefings All organizations Virtual/Physical

๐ŸŽ–๏ธ Security Badge Health Status

Our ISMS documentation maintains transparent security posture through public evidence badges. The badge monitoring system validates badge accessibility and security scores across all documentation.

Badge Health Metrics

Metric Status Target Description
Total Badges 47+ N/A Security, quality, compliance, and build status badges
Health Score 95%+ 95% Percentage of accessible badges
Security Badges โœ… Active 100% OpenSSF Scorecard, SLSA, FOSSA
Quality Badges โœ… Active 100% SonarCloud, code coverage
Compliance Badges โœ… Active 100% ISO 27001, NIST CSF, CIS Controls
Monitoring โœ… Automated Continuous On Push/PR + on-demand checks

Badge Categories

๐Ÿ” Security Badges (Critical)

  • OpenSSF Scorecard: Supply chain security assessment for all repositories (8.7 average)
  • SLSA Provenance: Build provenance and integrity verification (Level 3)
  • FOSSA License: Open source license compliance and vulnerability detection

๐Ÿ“Š Quality Badges (High Priority)

  • SonarCloud Quality Gate: Code quality and security scanning (Target: Passed)
  • Security Rating: Vulnerability detection and analysis (Target: A rating)
  • Code Coverage: Test coverage metrics (Target: 80%+)

โœ… Compliance Badges (Documentation)

  • ISO 27001 Aligned: Information security management framework
  • NIST CSF 2.0 Aligned: Cybersecurity framework compliance
  • CIS Controls v8.1 Aligned: Security control implementation
  • AWS Well-Architected: Cloud security best practices

๐Ÿ”จ Build Status Badges (Operational)

  • GitHub Actions CI: Continuous integration pipeline status
  • Release Workflows: Automated release and deployment status

Reference Implementations

Our badge standards are demonstrated across Hack23 projects:

Project Security Badges Quality Badges Status
๐Ÿ›๏ธ CIA OpenSSF, SLSA, FOSSA SonarCloud, Coverage โœ… Complete
๐ŸŽฎ Black Trigram OpenSSF, SLSA, FOSSA SonarCloud, Lighthouse โœ… Complete
๐Ÿ“Š CIA Compliance OpenSSF, SLSA, FOSSA SonarCloud, Coverage โœ… Complete

For detailed badge requirements and standards, see the ๐ŸŽจ Style Guide - Security Badge Standards.


๐Ÿค Community & Transparency

Hack23 AB's ISMS is open for community review and feedback. We believe security through transparency creates stronger security than security through obscurity.

How to Contribute:

  • ๐Ÿ“ Feedback: Contact us with suggestions, questions, or corrections
  • ๐Ÿ” Security Research: Review our documentation for security insights you can apply to your organization
  • ๐ŸŽ“ Educational Use: Our ISMS is freely available for educational and research purposes
  • ๐Ÿ† Best Practices: Learn from our single-person company adaptations and compensating controls

Community Guidelines:

  • Be respectful and professional in all interactions
  • Protect sensitive information (even though we publish 70%, some values remain confidential)
  • Report security issues responsibly via our Incident Response Plan

Recognition: Thank you to the open-source security community, OpenSSF Scorecard, CII Best Practices, and all contributors to the frameworks we align with.


๐Ÿ“… Recent Updates

  • 2025-11-25: README.md updated with Phase 1 achievements and accurate policy status table
  • 2025-11-24: Phase 1 Foundation Excellence complete โ€” 100% ISMS documentation
  • 2025-11-24: Segregation of Duties Policy v2.0 published with comprehensive compensating controls
  • 2025-11-19: Partnership Framework published addressing founder dependency risk
  • 2025-11-18: NIS2 Compliance Service package complete with revenue projections
  • 2025-11-17: Multiple policy updates with single-person adaptations
  • 2025-11-10: Information Security Strategy v3.0 updated with Phase 1 achievements
  • 2025-06-17: Hack23 AB founded (Organization Number: 559534-7807)

๐Ÿ”— Key Resources


๐Ÿ“œ License & Usage

ISMS Documentation License: Creative Commons Attribution 4.0 International (CC BY 4.0)
You are free to share and adapt this ISMS documentation for any purpose, even commercially, under the following terms:

  • Attribution: You must give appropriate credit to Hack23 AB and link to this repository
  • No Endorsement: You may not imply Hack23 AB endorses your use of this material

Disclaimer: This ISMS is tailored for Hack23 AB's specific risk profile and operational model. Organizations adopting these policies should perform their own risk assessments and customize policies to their context.


๐Ÿ“‹ Document Control:
โœ… Approved by: James Pether Sรถrling, CEO
๐Ÿ“ค Distribution: Public
๐Ÿท๏ธ Classification: Confidentiality: Public
๐Ÿ“… Effective Date: 2025-11-25
โฐ Next Review: 2026-02-25
๐ŸŽฏ Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls


ยฉ 2025 Hack23 AB (559534-7807) โ€” Stockholm, Sweden
Transparency in Security. Security through Transparency.