Skip to main content
Security & Compliance

ISO 27001:2022 certified information security

Terra Insight holds ISO 27001:2022 certification — the current revision of the international standard for information security management. This covers all 93 controls across four themes, including the 11 controls newly introduced in the 2022 update.

ISO 27001:2022
Current revision
93
Controls covered
4
Control themes
11
New 2022 controls
What the 2022 revision means

Structured for modern cloud and supply chain risk

ISO 27001:2022 replaced the 2013 standard in October 2022. The update restructured controls from 14 domains and 114 controls into 4 themes and 93 controls — and introduced 11 entirely new controls addressing threats that did not exist in 2013.

The new controls cover cloud services security, threat intelligence, ICT supply chain security, data masking, data leakage prevention, secure coding, web filtering, configuration management, physical security monitoring, and information deletion. Terra Insight is certified against all 11 of these additions.

For enterprise clients in financial services, healthcare, and regulated sectors, ISO 27001:2022 certification — not the 2013 version — is the relevant benchmark. The two are not equivalent.

11 new controls — 2022 additions
A.5.7 Threat intelligence
A.5.21 Managing information security in the ICT supply chain
A.5.23 Information security for use of cloud services
A.5.30 ICT readiness for business continuity
A.6.8 Information security event reporting
A.7.4 Physical security monitoring
A.8.9 Configuration management
A.8.10 Information deletion
A.8.11 Data masking
A.8.12 Data leakage prevention
A.8.16 Monitoring activities
A.8.23 Web filtering
A.8.28 Secure coding
A.5

Organisational Controls

37 controls

Policies, roles, and governance structures that define how security is managed at the organisational level.

A.5.1
Information security policies

Board-approved security policy reviewed annually.

A.5.2
Information security roles and responsibilities

CISO role and data owner responsibilities formally assigned.

A.5.3
Segregation of duties

Production access segregated from development and support functions.

A.5.4
Management responsibilities

Security responsibilities included in all employment contracts.

A.5.5
Contact with authorities

Defined escalation path to CERT-In and relevant law enforcement.

A.5.6
Contact with special interest groups

Active membership in Indian cyber-security information sharing forums.

A.5.7 New
Threat intelligence

Threat feeds monitored; intelligence integrated into risk assessment cycle.

A.5.8
Information security in project management

Security checkpoints embedded in product release pipeline.

A.5.9
Inventory of information and other associated assets

Asset register maintained with data classification labels.

A.5.10
Acceptable use of information and other assets

Acceptable use policy covers all devices, accounts, and data stores.

A.5.11
Return of assets

Offboarding checklist enforces return and revocation of all assets.

A.5.12
Classification of information

Four-tier classification: Public, Internal, Confidential, Restricted.

A.5.13
Labelling of information

Document and data labelling applied consistently across repositories.

A.5.14
Information transfer

Encryption required for all data transferred outside the production boundary.

A.5.15
Access control

Role-based access control enforced; quarterly access reviews conducted.

A.5.16
Identity management

Centralised identity provider; MFA mandatory for all privileged accounts.

A.5.17
Authentication information

Password policy enforced via identity provider; no shared credentials permitted.

A.5.18
Access rights

Principle of least privilege applied; access rights reviewed on role change.

A.5.19
Information security in supplier relationships

Supplier risk assessment conducted before onboarding; contracts include security clauses.

A.5.20
Addressing information security within supplier agreements

Data processing agreements in place with all sub-processors.

A.5.21 New
Managing information security in the ICT supply chain

Software component provenance tracked; open-source licence review performed.

A.5.22
Monitoring, review and change management of supplier services

Annual review of all cloud and SaaS suppliers against contracted SLAs.

A.5.23 New
Information security for use of cloud services

AWS shared responsibility model documented; cloud configuration baselines enforced.

A.5.24
Information security incident management planning and preparation

Incident response plan tested via annual tabletop exercise.

A.5.25
Assessment and decision on information security events

Triage criteria defined; severity classification consistent with CERT-In guidelines.

A.5.26
Response to information security incidents

Runbooks maintained for common incident types including data exposure and account compromise.

A.5.27
Learning from information security incidents

Post-incident reviews conducted within 5 business days; findings tracked to closure.

A.5.28
Collection of evidence

Evidence collection procedures aligned with Indian IT Act requirements.

A.5.29
Information security during disruption

Business continuity plan covers data access and processing during outage scenarios.

A.5.30 New
ICT readiness for business continuity

RTO and RPO targets defined per service tier; tested annually via failover drill.

A.5.31
Legal, statutory, regulatory and contractual requirements

Compliance register covers IT Act 2000, DPDP Act, GST, TDS, and sectoral regulations.

A.5.32
Intellectual property rights

Software licence tracking in place; patent applications filed for proprietary algorithms.

A.5.33
Protection of records

Retention schedule defined; audit logs retained for 7 years per regulatory minimum.

A.5.34
Privacy and protection of personal information

Privacy impact assessments conducted for all features processing personal financial data.

A.5.35
Independent review of information security

Annual third-party audit conducted by accredited certification body.

A.5.36
Compliance with policies, rules and standards for information security

Internal audit programme covers all controls; findings tracked in risk register.

A.5.37
Documented operating procedures

Standard operating procedures maintained for all critical security functions.

A.6

People Controls

8 controls

Controls governing the security obligations of individuals — before, during, and after employment.

A.6.1
Screening

Background verification conducted for all employees and contractors handling client data.

A.6.2
Terms and conditions of employment

Information security obligations explicit in every employment agreement.

A.6.3
Information security awareness, education and training

Annual security awareness training mandatory; phishing simulation run quarterly.

A.6.4
Disciplinary process

Formal disciplinary process covers security policy violations.

A.6.5
Responsibilities after termination or change of employment

Confidentiality obligations survive employment; NDA in place for all data-handling roles.

A.6.6
Confidentiality or non-disclosure agreements

NDAs executed with all third parties before access to client or system information.

A.6.7
Remote working

Remote working policy defines device, network, and data handling standards.

A.6.8 New
Information security event reporting

All personnel required to report suspected security events within 1 hour of detection.

A.7

Physical Controls

14 controls

Controls protecting physical access to facilities, equipment, and physical media.

A.7.1
Physical security perimeters

Office premises secured with access card and visitor log.

A.7.2
Physical entry

Server and network infrastructure located in SOC 2 Type II certified data centre.

A.7.3
Securing offices, rooms and facilities

Sensitive discussions and document handling confined to designated secure areas.

A.7.4 New
Physical security monitoring

CCTV and access logs reviewed periodically; alerts configured for after-hours access.

A.7.5
Protecting against physical and environmental threats

Data centre meets Tier III standards for power, cooling, and environmental controls.

A.7.6
Working in secure areas

Clear-desk and clear-screen policy enforced across all office locations.

A.7.7
Clear desk and clear screen

Policy enforced; screen lock required after 5 minutes of inactivity.

A.7.8
Equipment siting and protection

Production hardware located exclusively in the managed data centre (AWS Mumbai). No physical servers at office locations.

A.7.9
Security of assets off-premises

Endpoint encryption mandatory on all devices used outside the office perimeter.

A.7.10
Storage media

Removable media prohibited in production environments; portable drives encrypted.

A.7.11
Supporting utilities

UPS and generator redundancy at data centre; monitoring alerts on power events.

A.7.12
Cabling security

Network cabling within data centre meets structured cabling standards.

A.7.13
Equipment maintenance

Hardware maintenance schedule maintained; only authorised personnel permitted.

A.7.14
Secure disposal or re-use of equipment

Cryptographic wipe performed before any storage media is decommissioned or reassigned.

A.8

Technological Controls

34 controls

Technical controls embedded in systems, infrastructure, and software to protect information.

A.8.1
User end point devices

MDM policy enforces encryption, screen lock, and remote wipe on all managed devices.

A.8.2
Privileged access rights

Privileged accounts reviewed monthly; just-in-time access for production systems.

A.8.3
Information access restriction

Data access scoped to role and client; no cross-tenant data access possible.

A.8.4
Access to source code

Source code repository access restricted; changes require peer review and approval.

A.8.5
Secure authentication

MFA enforced on all external-facing systems and cloud management consoles.

A.8.6
Capacity management

Infrastructure capacity monitored; scaling policies prevent resource exhaustion.

A.8.7
Protection against malware

Endpoint protection deployed on all managed devices; signatures updated daily.

A.8.8
Management of technical vulnerabilities

Vulnerability scans run fortnightly; critical findings remediated within 72 hours.

A.8.9 New
Configuration management

Infrastructure-as-code enforced; configuration drift detection alerts operational.

A.8.10 New
Information deletion

Data deletion procedures verified for client offboarding and retention schedule expiry.

A.8.11 New
Data masking

Production data masked before use in development or testing environments; no live financial data in non-production systems.

A.8.12 New
Data leakage prevention

DLP controls monitor outbound data movement; rules cover reconciliation output files and bank statement data.

A.8.13
Information backup

Daily encrypted backups; restoration tested quarterly against defined RTO.

A.8.14
Redundancy of information processing facilities

Multi-AZ deployment on AWS; no single point of failure in production path.

A.8.15
Logging

All authentication events, data access, and API calls logged with tamper-evident storage.

A.8.16 New
Monitoring activities

SIEM aggregates logs; anomaly detection alerts reviewed by on-call team within 15 minutes.

A.8.17
Clock synchronisation

All systems synchronised to NTP; log timestamps consistent across environments.

A.8.18
Use of privileged utility programs

Use of system utilities restricted; activity logged and reviewed.

A.8.19
Installation of software on operational systems

Change management process required for all production software changes.

A.8.20
Networks security

Network segmentation separates production, staging, and corporate environments.

A.8.21
Security of network services

TLS 1.2+ enforced on all network services; deprecated protocols disabled.

A.8.22
Segregation of networks

VPC architecture with private subnets for data processing; no direct internet access to database tier.

A.8.23 New
Web filtering

Outbound web filtering applied to corporate network; DNS-based blocking for malicious domains.

A.8.24
Use of cryptography

AES-256 for data at rest; TLS 1.2+ for data in transit; key management via AWS KMS.

A.8.25
Secure development lifecycle

Security requirements defined at design stage; OWASP Top 10 addressed in development standards.

A.8.26
Application security requirements

Security acceptance criteria included in every feature specification.

A.8.27
Secure systems architecture and engineering principles

Defence-in-depth architecture; principle of least privilege applied at every layer.

A.8.28 New
Secure coding

Secure coding standards enforced; SAST tooling integrated into CI/CD pipeline; no deployment without security scan pass.

A.8.29
Security testing in development and acceptance

DAST and penetration testing conducted before every major release.

A.8.30
Outsourced development

Third-party development engagements subject to the same secure coding and review standards.

A.8.31
Separation of development, test and production environments

Strict environment separation; production credentials not accessible from development or test.

A.8.32
Change management

All production changes follow documented change control; emergency changes logged within 24 hours.

A.8.33
Test information

Production data prohibited in test environments without masking (see A.8.11).

A.8.34
Protection of information systems during audit testing

Audit testing performed in isolated environment; no impact on production operations.

Security by design

How ISO 27001:2022 applies to TransactIG

TransactIG processes bank statements, ledger records, TDS deduction data, and settlement files for enterprise clients. The controls below are directly relevant to how client data is handled throughout the reconciliation pipeline.

Data isolation

Client data is processed in isolated tenant contexts. No cross-client data access is architecturally possible. Production environments are separated from development and test environments — and production data is never used in non-production systems without masking (A.8.11).

Encryption in transit and at rest

All reconciliation data is encrypted at rest using AES-256 via AWS KMS (A.8.24). All data in transit — including API calls, file uploads, and bank statement imports — uses TLS 1.2 or higher. Deprecated protocols are disabled at the infrastructure level (A.8.21).

Audit trails

Every match decision, exception classification, and manual override is logged with user identity and timestamp (A.8.15). Logs are stored in tamper-evident storage. Audit queries on reconciliation results can be resolved in under 4 hours from log data alone.

Access control

Role-based access control limits each user to the data sets and functions required for their role (A.5.15, A.8.3). Privileged access to production systems requires just-in-time approval and is reviewed monthly (A.8.2).

Vulnerability management

Infrastructure is scanned fortnightly. Critical findings — CVSS score 9.0+ — are remediated within 72 hours (A.8.8). SAST tooling runs on every code commit; no deployment proceeds without a clean security scan (A.8.28).

Business continuity

TransactIG runs on multi-AZ AWS infrastructure with no single point of failure (A.8.14). RTO and RPO targets are defined per service tier and tested annually via failover drill (A.5.30). Backups are encrypted and restoration is tested quarterly (A.8.13).

Security documentation available on request

Enterprise clients and procurement teams can request our ISO 27001:2022 certificate, security questionnaire responses, and data processing agreement for review.