Sche| **Privileg| **BCDR Testing a| **| **| **Workforce Screening and Background Check Procedure** (OP-PROC-006) | Human Resources (HR) | Outlines the formal process for conducting mandated background checks on all candidates for employment. |obile Device Onboarding and Security Configuration Procedure** (OP-PROC-002) | IT Security Team | Details the steps for enrolling a mobile device in the MDM system and ensuring it meets security mandates. |IPAA Breach Risk Assessment Procedure** ([RES-PROC-002]) | Privacy Officer | Guides the formal risk assessment mandated to determine if an incident qualifies as a notifiable HIPAA breach. |d Exercise Procedure** ([RES-PROC-007]) | Business Continuity Manager | Details the mandates for planning and executing the annual disaster recovery tests and business continuity exercises. |d Infrastructure Access Review Procedure** (ENG-PROC-006) | Security Team | Outlines the steps for conducting and documenting the mandated quarterly reviews of all user accounts with privileged access. |ule of Security Procedures (ISMS-SUP-001)

Quarterly Procedures

These procedures shall be conducted and documented every three months to ensure ongoing compliance and security posture management.

Procedure (Code) Primary Owner Description
Information Security Committee Charter Procedure (SEC-PROC-001) Committee Chair Defines the operating rules and responsibilities of the Information Security Committee, which holds quarterly meetings.
Facility Access Management Procedure (SEC-PROC-006) Facilities/Security Team Describes the process for managing physical facility access, including conducting and documenting quarterly access reviews.
User Access Review Procedure (AC-PROC-003) IT/Security Team Defines the process for conducting periodic reviews of user access rights to ensure adherence to the principle of least privilege.
Privileged Infrastructure Access Review Procedure (ENG-PROC-006) Security Team Outlines the steps for conducting and documenting the required quarterly reviews of all user accounts with privileged access.

Annual Procedures

These procedures shall be performed at least once per year to satisfy major compliance, assessment, and testing mandates.

Procedure (Code) Primary Owner Description
Internal Audit Procedure (SEC-PROC-002) Head of Internal Audit Outlines the process for planning, conducting, and reporting on annual internal audits of the Information Security Management System.
Risk Assessment Procedure (SEC-PROC-004) Security Officer Establishes a systematic process for conducting risk assessments annually and on an ad-hoc basis when significant changes occur.
Incident Response Plan (IRP) ([RES-PROC-001]) Security Team Provides actionable steps for responding to incidents, including conducting annual training and simulation exercises.
Business Impact Analysis (BIA) Procedure ([RES-PROC-004]) Business Continuity Manager Defines the methodology for conducting the annual Business Impact Analysis to identify critical functions and establish recovery objectives.
BCDR Testing and Exercise Procedure ([RES-PROC-007]) Business Continuity Manager Details the requirements for planning and executing the annual disaster recovery tests and business continuity exercises.
Cryptographic Key Lifecycle Management Procedure (OP-PROC-001) Security Engineering Team Provides technical steps for the secure lifecycle of cryptographic keys, including their annual rotation.
Application Security Testing Procedure (ENG-PROC-001) Security Team Details the process for conducting security testing, including annual penetration tests for applications handling sensitive data.

Ad-Hoc / As-Needed / Event-Driven Procedures

These procedures are not performed on a fixed schedule but are triggered by specific events such as a new hire, a security incident, or a request for a new system.

Procedure (Code) Primary Owner Description
Password Policy Exception Procedure (SEC-PROC-003) Security Officer Provides a formal process for requesting, reviewing, and documenting exceptions to the Password Policy.
Vendor Risk Assessment and Onboarding Procedure (SEC-PROC-005) Security Team Details the process for assessing a new vendor’s security posture before engagement.
AI Tool Risk Assessment and Approval Procedure (SEC-PROC-007) AI Governance Committee Defines the process for performing a risk assessment on new AI tools before they are approved for use.
Vulnerability Management Procedure (SEC-PROC-008) Security Team Describes the continuous workflow for identifying, prioritizing, remediating, and verifying system vulnerabilities.
Vulnerability Management Exception Procedure (SEC-PROC-009) Security Officer Outlines the process for formally requesting and documenting an exception to a vulnerability remediation Service Level Agreement (SLA).
Acceptable Use Policy Violation Investigation Procedure (AC-PROC-001) Security Officer Defines the process for investigating and responding to reported violations of the acceptable use policy.
Bring Your Own Device (BYOD) Onboarding Procedure (AC-PROC-002) IT Department Establishes the process for registering and securing a personally-owned device for access to company resources.
Access Control Management Procedure (AC-PROC-004) IT Department Defines the process for managing the lifecycle of user access, including provisioning, modification, and revocation.
HIPAA Breach Risk Assessment Procedure ([RES-PROC-002]) Privacy Officer Guides the formal risk assessment required to determine if an incident qualifies as a notifiable HIPAA breach.
Post-Incident Review Procedure ([RES-PROC-003]) Incident Commander Outlines the process for conducting a formal ‘lessons learned’ review after a significant incident is resolved.
IT Disaster Recovery Plan (DRP) ([RES-PROC-005]) BCDR Steering Committee Provides technical procedures for recovering IT infrastructure in the event of a declared disaster.
Business Continuity Plan (BCP) ([RES-PROC-006]) BCDR Steering Committee Outlines procedures for activating emergency response and continuing critical business functions during a disruption.
Mobile Device Onboarding and Security Configuration Procedure (OP-PROC-002) IT Security Team Details the steps for enrolling a mobile device in the MDM system and ensuring it meets security requirements.
Lost or Stolen Mobile Device Response Procedure (OP-PROC-003) IT Security Team Provides the immediate steps to take when a mobile device used for company business is reported lost or stolen.
Secure Media Disposal and Sanitization Procedure (OP-PROC-004) IT Team Provides instructions for securely destroying or sanitizing media that is at the end of its lifecycle.
Legal Hold Procedure (OP-PROC-005) Legal Team Outlines the steps for issuing, tracking, and releasing a legal hold on information relevant to legal matters.
Workforce Screening and Background Check Procedure (OP-PROC-006) Human Resources (HR) Outlines the formal process for conducting required background checks on all candidates for employment.
Employee Onboarding and Offboarding Security Procedure (OP-PROC-007) Human Resources (HR) Provides a formal checklist to ensure all security tasks are completed during employee onboarding and termination.
Security Policy Sanction Procedure (OP-PROC-008) Manager & HR Describes the process for documenting security policy violations and applying appropriate disciplinary actions.
Third-Party Component Security Review Procedure (ENG-PROC-002) Development Team Lead Defines the steps for reviewing and approving the use of new third-party software components.
Standard Change Management Procedure (ENG-PROC-003) Engineering Lead Details the process for managing a standard, non-emergency change to a production application or configuration.
Emergency Change Management Procedure (ENG-PROC-004) Engineering & Security Teams Outlines the expedited process for authorizing and deploying an emergency change to resolve a critical issue.
System Hardening and Baselining Procedure (ENG-PROC-005) Security Team Describes the process for applying security baselines to new systems and verifying their ongoing compliance.