Security Excellence Through Transparency
Enterprise-grade ISMS for Innovation-driven Security Consulting
Document Owner: CEO | Version: 3.0 | Last Updated: 2025-11-25 (UTC)
๐ Review Cycle: Quarterly | โฐ Next Review: 2026-02-25
Welcome to Hack23 AB's comprehensive ISMS documentation. Founded in June 2025 (Organization Number: 559534-7807), Hack23 AB operates as a Swedish cybersecurity consulting company demonstrating radical transparency through our industry-first public ISMS.
๐ Phase 1 Foundation Excellence โ Complete (November 2025):
- โ 100% ISMS documentation published (70% public, 30% sensitive values redacted)
- โ OpenSSF Scorecard 8.7 average (CIA, CIA Compliance Manager, Black Trigram)
- โ CII Best Practices Gold/Passing level achieved across all repositories
- โ Zero critical vulnerabilities outstanding (Dependabot monitoring)
- โ 95% compliance control coverage (ISO 27001, NIST CSF 2.0, CIS Controls v8.1)
๐ข Single-Person Company: Hack23 AB is operated by CEO/Founder James Pether Sรถrling. Our ISMS demonstrates that enterprise-grade security is achievable through innovative compensating controls: temporal separation, automation, external validation, and audit trail preservation.
๐ Radical Transparency: We publish 70% of our ISMS openly to demonstrate security through robust processes rather than obscurity. Only specific sensitive values (credentials, account numbers, contract pricing) are redacted.
Note: The hack23.com website was registered in 2008 by the CEO, operating as an independent professional before formally establishing Hack23 AB in June 2025.
As CEO with CISM/CISSP certifications and three decades of experience, I've structured Hack23 AB around a fundamental principle: our Information Security Management System (ISMS) is not separate from our business - it IS our business model. This integration allows us to deliver security consulting services while simultaneously developing products that demonstrate these principles in action.
Our commitment to transparency extends beyond our open-source projects. This ISMS documentation itself serves as a testament to our belief that security through obscurity is a failed strategy. True security comes from robust processes, continuous improvement, and a culture where every decision considers security implications.
โ James Pether Sรถrling, CEO/Founder
New to our ISMS? Start with these foundational documents:
- Information Security Policy โ Overarching security governance
- Information Security Strategy โ Strategic security roadmap
- Classification Framework โ CIA impact analysis methodology
- Risk Register โ Identified risks and treatments
- Compliance Checklist โ Framework alignment validation
- Security Metrics โ Performance measurement
- Incident Response Plan โ Security incident procedures
- Business Continuity Plan โ Operational resilience
- Disaster Recovery Plan โ Recovery procedures
- CIA Security Architecture โ Enterprise authentication
- CIA Compliance Manager Security Architecture โ Frontend-only rationale
- Black Trigram Security Architecture โ Gaming platform security
- Style Guide โ Formatting and consistency standards
- ISMS Transparency Plan โ Radical transparency methodology
Security Certifications:
Compliance Frameworks (100% Coverage):
All ISMS documentation is continuously validated against:
- โ Markdown linting standards
- ๐ Link integrity checks
- ๐ Document structure requirements
- ๐ Security and sensitive data scanning
- ๐จ STYLE_GUIDE.md v2.1 compliance (with documented exemptions for 12 legacy files)
Hack23 AB is a Swedish innovation hub founded in 2025, specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting. With a commitment to realism and authenticity, our flagship project, Black Trigram, combines traditional Korean martial arts with educational gameplay, while our information security services leverage advanced open-source tools and methodologies to protect digital integrity, confidentiality, and availability. At Hack23 AB, we're driven by a passion for precision, creativity, and uncompromising security.
Hack23 ISMS includes comprehensive Mermaid diagrams for improved understanding and navigation:
- ๐ ISMS Document Hierarchy: See below โ Policy organization and navigation structure
- ๐๏ธ ISO 27001 Compliance Mapping: Compliance_Checklist.md โ Annex A control coverage
- ๐๏ธ Product Security Architecture: Information_Security_Strategy.md โ Security control comparison across products
- ๐ Risk Management Workflow: Risk_Register.md โ Risk lifecycle process
- ๐จ Incident Response Flowchart: Incident_Response_Plan.md โ Incident handling process with escalation paths
- ๐ Segregation of Duties Workflow: Segregation_of_Duties_Policy.md โ Single-person compensating controls
- ๐ฏ Security Control Selection Framework: Information_Security_Strategy.md โ Classification-driven control decisions
Hack23 AB's ISMS follows a structured hierarchy from strategic vision to operational templates, demonstrating enterprise-grade governance and systematic security management.
flowchart TD
subgraph STRATEGIC["๐ฏ Strategic Level"]
STRATEGY[Information Security Strategy<br/>3-year roadmap and vision]
POLICY_ROOT[Information Security Policy<br/>Governance framework]
CLASSIFICATION[Classification Framework<br/>CIA impact methodology]
end
subgraph GOVERNANCE["๐ Governance Policies"]
RISK[Risk Register<br/>Risk identification & treatment]
COMPLIANCE[Compliance Checklist<br/>Multi-framework alignment]
METRICS[Security Metrics<br/>KPI measurement & reporting]
TRANSPARENCY[ISMS Transparency Plan<br/>Public disclosure strategy]
end
subgraph OPERATIONAL["โ๏ธ Operational Policies"]
ACCESS[Access Control Policy<br/>IAM & authentication]
CHANGE[Change Management<br/>Change control procedures]
INCIDENT[Incident Response Plan<br/>Security incident handling]
BCP[Business Continuity Plan<br/>Operational resilience]
DRP[Disaster Recovery Plan<br/>Technical recovery]
THIRD_PARTY[Third Party Management<br/>Vendor risk management]
end
subgraph TECHNICAL["๐ ๏ธ Technical Policies"]
SECURE_DEV[Secure Development Policy<br/>SDLC security requirements]
CRYPTO[Cryptography Policy<br/>Encryption standards]
NETWORK[Network Security Policy<br/>Network controls & segmentation]
VULN[Vulnerability Management<br/>Security testing & patching]
BACKUP[Backup & Recovery Policy<br/>Data protection procedures]
DATA[Data Classification Policy<br/>Information handling]
end
subgraph SUPPORT["๐ Supporting Documents"]
STYLE[Style Guide<br/>Documentation standards]
QA[ISMS QA Checklist<br/>Quality assurance]
TEMPLATES[Templates<br/>Policy & procedure templates]
ASSET[Asset Register<br/>IT asset inventory]
end
STRATEGY --> POLICY_ROOT
POLICY_ROOT --> GOVERNANCE
POLICY_ROOT --> OPERATIONAL
POLICY_ROOT --> TECHNICAL
GOVERNANCE --> SUPPORT
style STRATEGIC fill:#1565C0,color:#fff
style GOVERNANCE fill:#4CAF50,color:#fff
style OPERATIONAL fill:#FF9800,color:#fff
style TECHNICAL fill:#D32F2F,color:#fff
style SUPPORT fill:#7B1FA2,color:#fff
Key Takeaways:
- ๐ฏ Strategic Level: Defines overarching security vision, governance framework, and impact classification methodology
- ๐ Governance: Establishes risk management, compliance tracking, metrics, and transparency commitments
- โ๏ธ Operational: Implements day-to-day security operations including access control, incident response, and business continuity
- ๐ ๏ธ Technical: Specifies technical security controls for development, cryptography, network, vulnerability, and data protection
- ๐ Support: Provides quality assurance, documentation standards, templates, and asset tracking
Related Documents:
- ๐ Information Security Policy โ Master governance policy
- ๐ท๏ธ Classification Framework โ Business impact definitions
- ๐ Style Guide โ Documentation and diagram standards
๐ View Live ISMS Metrics Dashboard - Real-time policy health monitoring with automated review tracking
Our ISMS Metrics Dashboard provides instant visibility into:
- ๐ฆ Review Status: Overdue, due soon, and current policy reviews
- ๐ Upcoming Reviews: Next 90 days calendar view
- ๐ Document Health Matrix: Complete status of all 40 ISMS documents
- ๐ Compliance Coverage: ISO 27001, NIST CSF, CIS Controls alignment
- ๐ Automated Updates: Weekly refresh via GitHub Actions
Last Updated: 2025-11-25 | Completion: 100% (40/40 policies)
| Policy Document | Status | Version | Last Updated | Single-Person Adapted | ISO 27001 | NIST CSF 2.0 | CIS v8.1 |
|---|---|---|---|---|---|---|---|
| ๐ Information Security Policy | โ Complete | 1.6 | 2025-11-19 | โ Yes | โ A.5.1 | โ GV | โ IG1 |
| ๐ฏ Information Security Strategy | โ Complete | 3.0 | 2025-11-10 | N/A (Strategy) | โ All | โ All | โ All |
| ๐ Access Control Policy | โ Complete | 2.5 | 2025-11-24 | โ Yes | โ A.5.15-18 | โ PR.AC | โ IG1 |
| โ Acceptable Use Policy | โ Complete | 1.0 | 2025-11-05 | โ Yes | โ A.6.2 | โ PR.AT | โ IG1 |
| ๐ค AI Governance Policy | โ Complete | 1.1 | 2025-11-17 | N/A | โ A.5.1 | โ GV.RR | โ IG2 |
| ๐ป Asset Register | โ Complete | 1.4 | 2025-11-05 | โ Yes | โ A.5.9 | โ ID.AM | โ IG1 |
| ๐พ Backup & Recovery Policy | โ Complete | 1.1 | 2025-11-17 | N/A | โ A.8.13 | โ PR.IP | โ IG1 |
| ๐ Business Continuity Plan | โ Complete | 1.2 | 2025-11-24 | โ Yes | โ A.5.29-30 | โ RC.RP | โ IG2 |
| ๐ท๏ธ Classification Framework | โ Complete | 1.2 | 2025-11-05 | N/A | โ A.5.12 | โ ID.AM | โ IG1 |
| ๐ก๏ธ CRA Conformity Assessment | โ Complete | 1.1 | 2025-11-14 | N/A | โ A.5.1 | โ GV.SC | โ IG2 |
| ๐ Change Management | โ Complete | 2.3 | 2025-11-24 | โ Yes | โ A.8.32 | โ PR.IP | โ IG2 |
| โ Compliance Checklist | โ Complete | 2.1 | 2025-11-17 | โ Yes | โ A.5.1 | โ GV.OC | โ IG1 |
| ๐ Cryptography Policy | โ Complete | 1.1 | 2025-11-17 | N/A | โ A.8.24 | โ PR.DS | โ IG2 |
| ๐ท๏ธ Data Classification Policy | โ Complete | 2.2 | 2025-11-05 | N/A | โ A.5.12-13 | โ ID.AM | โ IG1 |
| ๐ Disaster Recovery Plan | โ Complete | 2.2 | 2025-11-17 | N/A | โ A.5.29 | โ RC.RP | โ IG2 |
| ๐ค External Stakeholder Registry | โ Complete | 1.2 | 2025-11-17 | N/A | โ A.5.19 | โ ID.BE | โ IG1 |
| ๐จ Incident Response Plan | โ Complete | 1.3 | 2025-11-24 | โ Yes | โ A.5.24-28 | โ RS.AN | โ IG1 |
| ๐ฑ Mobile Device Management | โ Complete | 1.0 | 2025-11-05 | โ Yes | โ A.6.7 | โ PR.AC | โ IG1 |
| ๐ Network Security Policy | โ Complete | 2.2 | 2025-11-05 | N/A | โ A.8.20-22 | โ PR.AC | โ IG1 |
| ๐๏ธ NIS2 Compliance Service | โ Complete | 1.0 | 2025-11-18 | N/A | โ A.5.1 | โ GV.OC | โ IG2 |
| ๐ก๏ธ OWASP LLM Security Policy | โ Complete | 1.2 | 2025-11-17 | N/A | โ A.8.16 | โ PR.DS | โ IG3 |
| ๐ Open Source Policy | โ Complete | 2.2 | 2025-11-17 | N/A | โ A.5.23 | โ ID.SC | โ IG2 |
| ๐ค Partnership Framework | โ Complete | 1.0 | 2025-11-19 | โ Yes | โ A.5.19 | โ ID.BE | โ IG2 |
| ๐ Physical Security Policy | โ Complete | 1.0 | 2025-11-05 | โ Yes | โ A.7.1-4 | โ PR.AC | โ IG1 |
| ๐ Privacy Policy | โ Complete | 1.0 | 2025-11-05 | N/A | โ A.5.34 | โ PR.IP | โ IG2 |
| ๐ Risk Assessment Methodology | โ Complete | 1.0 | 2025-11-14 | N/A | โ A.5.7 | โ ID.RM | โ IG1 |
| โ Complete | 2.1 | 2025-11-24 | โ Yes | โ A.5.7 | โ ID.RM | โ IG1 | |
| ๐๏ธ Security Architecture | โ Complete | 1.0 | 2025-11-14 | N/A | โ A.8.1 | โ PR.AC | โ IG2 |
| ๐ Style Guide | โ Complete | 2.1 | 2025-11-17 | โ Yes | N/A | N/A | N/A |
| ๐ข Supplier Security Posture | โ Complete | 1.1 | 2025-11-14 | N/A | โ A.5.19-23 | โ ID.SC | โ IG2 |
| ๐ SWOT Analysis | โ Complete | 1.0 | 2025-11-18 | โ Yes | N/A | N/A | N/A |
| ๐ ๏ธ Secure Development Policy | โ Complete | 1.4 | 2025-11-17 | N/A | โ A.8.25-31 | โ PR.DS | โ IG2 |
| ๐ Security Metrics | โ Complete | 1.3 | 2025-11-05 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ซ Segregation of Duties | โ Complete | 2.0 | 2025-11-24 | โ Yes | โ A.5.3 | โ PR.AC | โ IG2 |
| ๐ฅ Third Party Management | โ Complete | 2.1 | 2025-11-17 | N/A | โ A.5.19-23 | โ ID.SC | โ IG2 |
| ๐ฏ Threat Modeling | โ Complete | 1.2 | 2025-11-17 | N/A | โ A.8.25 | โ ID.RA | โ IG2 |
| ๐ Vulnerability Management | โ Complete | 2.0 | 2025-11-14 | N/A | โ A.8.8 | โ DE.CM | โ IG1 |
| ๐ ISMS Metrics Dashboard | โ Complete | 1.0 | 2025-11-25 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ ISMS QA Checklist | โ Complete | 1.0 | 2025-11-14 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ ISMS Transparency Plan | โ Complete | 2.1 | 2025-11-17 | N/A | โ A.5.1 | โ GV.OC | โ IG1 |
- โ Complete: 40 documents (100%)
- โณ In Progress: 0 documents
- ๐ Planned: 0 documents
- Total: 40 core documents
- Completion Rate: 100%
- โ Adapted Policies: 15 policies include single-person company compensating controls
- ๐ Temporal Separation: Time-based role separation for conflicting duties
- ๐ค Automation Controls: Tool-based enforcement and validation
- ๐ Audit Trail Preservation: Immutable logging and external validation
- ๐ค External Validation: Partnership framework for capacity overflow
Hack23 AB's Information Security Management System is now fully documented and operational. This comprehensive ISMS demonstrates enterprise-grade security practices while supporting our dual mission of cybersecurity consulting excellence and innovative product development.
- 40 complete policy documents covering all aspects of information security
- Strategic Partnership Framework addressing single-person dependency risk (R-FOUNDER-001) with capacity overflow procedures
- NIS2 Compliance Service Package with โฌ2.6M 3-year revenue projection
- 7 NIS2 client templates (scoping, gap analysis, incident reporting, risk register, supply chain, checklist, management reporting)
- Security Architecture Documentation demonstrating ISMS repository security controls and GitHub-based security
- Acceptable Use Policy establishing clear behavioral expectations and professional standards
- Physical Security Policy demonstrating home office security for remote operations
- Mobile Device Management Policy demonstrating pragmatic endpoint security for single-person operations
- OWASP LLM Top 10 2025 alignment with comprehensive AI security controls
- GDPR-compliant privacy framework with comprehensive Privacy Policy for user-facing applications
- 6-level privacy classification system from Special Category data to Anonymized/NA
- Comprehensive risk assessment with 23 identified and managed risks
- Full supplier security posture analysis across 18 active services
- Enterprise-grade AWS security with 27 active services and 8 dedicated security tools
- Complete business continuity planning with defined RTO/RPO objectives
- Transparent documentation approach showcasing security expertise to potential clients
- Client Demonstration Platform: Live ISMS serves as proof of our cybersecurity consulting capabilities
- Operational Excellence: Systematic approach to security enables business growth and innovation
- Compliance Readiness: Framework supports ISO 27001, GDPR, NIS2, and other regulatory requirements
- Risk Management: Proactive identification and treatment of business and security risks
- Stakeholder Confidence: Transparent security posture builds trust with clients, partners, and investors
This ISMS implementation validates our core principle: enterprise-grade security expertise directly enables innovation rather than constraining it.
| Service Area | Offerings | Target Market | Delivery Model |
|---|---|---|---|
| Security Architecture | Enterprise design, risk assessment, strategy | Large enterprises | Remote/On-site |
| Cloud Security | AWS security, DevSecOps, IaC security | Tech companies | Remote |
| NIS2 Compliance | NIS2 assessment & implementation (4 packages) | Essential/Important entities | Hybrid |
| Compliance | GDPR, ISO 27001, SOC 2 implementation | Regulated industries | Hybrid |
| Open Source Security | OSPO setup, vulnerability management | Software companies | Remote |
| Security Training | Developer education, executive briefings | All organizations | Virtual/Physical |
Our ISMS documentation maintains transparent security posture through public evidence badges. The badge monitoring system validates badge accessibility and security scores across all documentation.
| Metric | Status | Target | Description |
|---|---|---|---|
| Total Badges | 47+ | N/A | Security, quality, compliance, and build status badges |
| Health Score | 95%+ | 95% | Percentage of accessible badges |
| Security Badges | โ Active | 100% | OpenSSF Scorecard, SLSA, FOSSA |
| Quality Badges | โ Active | 100% | SonarCloud, code coverage |
| Compliance Badges | โ Active | 100% | ISO 27001, NIST CSF, CIS Controls |
| Monitoring | โ Automated | Continuous | On Push/PR + on-demand checks |
- OpenSSF Scorecard: Supply chain security assessment for all repositories (8.7 average)
- SLSA Provenance: Build provenance and integrity verification (Level 3)
- FOSSA License: Open source license compliance and vulnerability detection
- SonarCloud Quality Gate: Code quality and security scanning (Target: Passed)
- Security Rating: Vulnerability detection and analysis (Target: A rating)
- Code Coverage: Test coverage metrics (Target: 80%+)
- ISO 27001 Aligned: Information security management framework
- NIST CSF 2.0 Aligned: Cybersecurity framework compliance
- CIS Controls v8.1 Aligned: Security control implementation
- AWS Well-Architected: Cloud security best practices
- GitHub Actions CI: Continuous integration pipeline status
- Release Workflows: Automated release and deployment status
Our badge standards are demonstrated across Hack23 projects:
| Project | Security Badges | Quality Badges | Status |
|---|---|---|---|
| ๐๏ธ CIA | OpenSSF, SLSA, FOSSA | SonarCloud, Coverage | โ Complete |
| ๐ฎ Black Trigram | OpenSSF, SLSA, FOSSA | SonarCloud, Lighthouse | โ Complete |
| ๐ CIA Compliance | OpenSSF, SLSA, FOSSA | SonarCloud, Coverage | โ Complete |
For detailed badge requirements and standards, see the ๐จ Style Guide - Security Badge Standards.
Hack23 AB's ISMS is open for community review and feedback. We believe security through transparency creates stronger security than security through obscurity.
How to Contribute:
- ๐ Feedback: Contact us with suggestions, questions, or corrections
- ๐ Security Research: Review our documentation for security insights you can apply to your organization
- ๐ Educational Use: Our ISMS is freely available for educational and research purposes
- ๐ Best Practices: Learn from our single-person company adaptations and compensating controls
Community Guidelines:
- Be respectful and professional in all interactions
- Protect sensitive information (even though we publish 70%, some values remain confidential)
- Report security issues responsibly via our Incident Response Plan
Recognition: Thank you to the open-source security community, OpenSSF Scorecard, CII Best Practices, and all contributors to the frameworks we align with.
- 2025-11-25: README.md updated with Phase 1 achievements and accurate policy status table
- 2025-11-24: Phase 1 Foundation Excellence complete โ 100% ISMS documentation
- 2025-11-24: Segregation of Duties Policy v2.0 published with comprehensive compensating controls
- 2025-11-19: Partnership Framework published addressing founder dependency risk
- 2025-11-18: NIS2 Compliance Service package complete with revenue projections
- 2025-11-17: Multiple policy updates with single-person adaptations
- 2025-11-10: Information Security Strategy v3.0 updated with Phase 1 achievements
- 2025-06-17: Hack23 AB founded (Organization Number: 559534-7807)
- Company Website: hack23.com
- GitHub Organization: github.com/Hack23
- CEO/Founder LinkedIn: James Pether Sรถrling
- OpenSSF Scorecard Dashboard: All Hack23 Repositories
- CII Best Practices:
ISMS Documentation License: Creative Commons Attribution 4.0 International (CC BY 4.0)
You are free to share and adapt this ISMS documentation for any purpose, even commercially, under the following terms:
- Attribution: You must give appropriate credit to Hack23 AB and link to this repository
- No Endorsement: You may not imply Hack23 AB endorses your use of this material
Disclaimer: This ISMS is tailored for Hack23 AB's specific risk profile and operational model. Organizations adopting these policies should perform their own risk assessments and customize policies to their context.
๐ Document Control:
โ
Approved by: James Pether Sรถrling, CEO
๐ค Distribution: Public
๐ท๏ธ Classification:
๐
Effective Date: 2025-11-25
โฐ Next Review: 2026-02-25
๐ฏ Framework Compliance:
ยฉ 2025 Hack23 AB (559534-7807) โ Stockholm, Sweden
Transparency in Security. Security through Transparency.