Skip to main content

ISO 27001 — Information Security Management System

Last updated: April 2026

This document describes FeatureSignals' Information Security Management System (ISMS) aligned with ISO/IEC 27001:2022.

ISMS Scope

The ISMS covers the design, development, deployment, and operation of the FeatureSignals feature flag management platform, including:

  • Cloud-hosted SaaS application
  • On-premises deployment packages
  • SDKs and client libraries
  • Supporting infrastructure and processes

Leadership and Commitment

Information Security Policy

FeatureSignals is committed to:

  • Protecting the confidentiality, integrity, and availability of information assets
  • Meeting applicable legal, regulatory, and contractual requirements
  • Continually improving the ISMS
  • Providing resources for information security

Roles and Responsibilities

RoleResponsibility
Security LeadISMS ownership, risk management, policy maintenance
Engineering LeadSecure development practices, vulnerability remediation
Operations LeadInfrastructure security, incident response, monitoring
All StaffAdhering to security policies, reporting incidents

Risk Assessment Framework

Risk Identification

Risks are identified through:

  • Threat modeling for new features
  • Vulnerability scanning (automated and manual)
  • Incident analysis and post-mortems
  • Industry threat intelligence

Risk Assessment Criteria

LikelihoodDescription
Rare (1)Less than once per year
Unlikely (2)Once per year
Possible (3)Once per quarter
Likely (4)Once per month
Almost Certain (5)Weekly or more
ImpactDescription
Insignificant (1)No customer impact, internal only
Minor (2)Minor service degradation, no data loss
Moderate (3)Partial service outage or limited data exposure
Major (4)Extended outage or significant data breach
Catastrophic (5)Complete service loss or large-scale data breach

Risk Score = Likelihood × Impact

Risk LevelScore RangeTreatment
Low1–5Accept and monitor
Medium6–12Mitigate within quarter
High13–19Mitigate within month
Critical20–25Immediate action required

Risk Register (Summary)

RiskLIScoreTreatmentControl
Unauthorized access to customer data2510MitigateRBAC, MFA, audit logging
SQL injection155MitigateParameterized queries, input validation
Dependency vulnerability339MitigateAutomated scanning, patching
DDoS attack339MitigateRate limiting, CDN, cloud scaling
Insider threat144AcceptAccess reviews, audit logging
Data loss155MitigateBackups, replication
License key compromise236MitigateKey rotation, monitoring

Annex A Controls — Statement of Applicability

A.5 — Organizational Controls

ControlApplicableImplementation
A.5.1 Policies for information securityYesSecurity policy documented
A.5.2 Information security rolesYesRoles defined above
A.5.3 Segregation of dutiesYesRBAC in product and development
A.5.7 Threat intelligenceYesCVE monitoring, security advisories
A.5.8 Information security in project managementYesSecurity review in PR process
A.5.23 Information security for cloud servicesYes12-factor architecture, encryption
A.5.29 Information security during disruptionYesDR plan, graceful degradation
A.5.30 ICT readiness for business continuityYesMulti-region capability, backups

A.6 — People Controls

ControlApplicableImplementation
A.6.1 ScreeningYesBackground checks for team members
A.6.3 Information security awarenessYesSecurity training program
A.6.4 Disciplinary processYesPolicy violation procedures
A.6.5 Responsibilities after terminationYesAccess revocation procedure

A.7 — Physical Controls

ControlApplicableImplementation
A.7.1 Physical security perimetersPartialCloud provider responsibility (shared model)
A.7.9 Security of assets off-premisesYesEndpoint encryption, VPN
A.7.10 Storage mediaYesEncrypted storage, secure disposal

A.8 — Technological Controls

ControlApplicableImplementation
A.8.1 User endpoint devicesYesManaged devices with encryption
A.8.2 Privileged access rightsYesSeparate admin accounts, MFA
A.8.3 Information access restrictionYesRBAC, per-environment permissions
A.8.5 Secure authenticationYesJWT, API keys, MFA, SSO
A.8.7 Protection against malwareYesContainer scanning, dependency scanning
A.8.8 Management of technical vulnerabilitiesYesgovulncheck, npm audit, Trivy
A.8.9 Configuration managementYesInfrastructure as Code (Helm, Terraform)
A.8.12 Data leakage preventionYesSecrets scanning, no PII in logs
A.8.15 LoggingYesStructured logging, audit trail
A.8.16 Monitoring activitiesYesHealth checks, alerting
A.8.20 Networks securityYesTLS, firewall rules, private networks
A.8.24 Use of cryptographyYesTLS 1.3, AES-256, bcrypt, SHA-256
A.8.25 Secure development lifecycleYesCode review, CI/CD, testing
A.8.26 Application security requirementsYesOWASP-aligned, input validation
A.8.28 Secure codingYesParameterized SQL, type safety

Continual Improvement

ActivityFrequency
Risk assessment reviewAnnual (or after significant changes)
Internal auditAnnual
Management reviewQuarterly
Security awareness trainingAnnual
Incident response drillSemi-annual
Policy reviewAnnual

Certification Roadmap

  1. Current: Controls implemented, documentation maintained
  2. Stage 1 Audit: Document review (planned)
  3. Stage 2 Audit: Implementation verification (planned)
  4. Surveillance Audits: Annual post-certification