Hack23/ISMS-PUBLIC
Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure
๐ Hack23 AB โ Information Security Management System
Security Excellence Through Transparency
Enterprise-grade ISMS for Innovation-driven Security Consulting
Document Owner: CEO | Version: 3.2 | Last Updated: 2026-01-25 (UTC)
๐ Review Cycle: Quarterly | โฐ Next Review: 2026-04-25
๐ Phase 1 Foundation Excellence โ COMPLETE (November 2025)
Hack23 AB has achieved enterprise-grade security maturity through systematic implementation of ISO 27001:2022, NIST CSF 2.0, and CIS Controls v8.1. Our radical transparency approach โ publishing 70% of our ISMS publicly โ demonstrates that security through robust processes creates competitive advantages, not vulnerabilities.
Security Posture Summary
Live Security Evidence:
๐ Real-Time Monitoring: ISMS Metrics Dashboard โข Security Metrics
๐ค Why Radical Transparency?
Hack23 AB's 70% public ISMS (only credentials, account numbers, and financial details redacted) represents a strategic competitive advantage:
๐ For Clients:
- Accelerated Trust: Self-service security validation eliminates lengthy diligence questionnaires
- Proof of Expertise: Live demonstration of enterprise-grade security implementation
- Transparency Accountability: Public commitment to security excellence drives continuous improvement
๐๏ธ For Auditors:
- Audit Efficiency: Pre-packaged evidence is estimated to reduce audit preparation time by up to 60%
- Framework Alignment: Clear ISO 27001, NIST CSF, CIS Controls mappings with live evidence
- Continuous Validation: Real-time OpenSSF Scorecard, SonarCloud, FOSSA results
๐ผ Business Impact:
- Target: compress sales cycles from 6 months โ 3 months
- Premium pricing justified by demonstrable security maturity
- Competitive moat: transparency barrier competitors cannot replicate without similar investment
"True security comes from robust processes and continuous improvement, not from hiding our methodologies."
โ James Pether Sรถrling, CEO/CISO
๐ฏ Executive Statement
Welcome to Hack23 AB's comprehensive ISMS documentation. Founded in June 2025 (Organization Number: 559534-7807), Hack23 AB operates as a Swedish cybersecurity consulting company demonstrating radical transparency through our industry-first public ISMS.
๐ข Single-Person Company: Hack23 AB is operated by CEO/Founder James Pether Sรถrling. Our ISMS demonstrates that enterprise-grade security is achievable through innovative compensating controls: temporal separation, automation, external validation, and audit trail preservation.
Note: The hack23.com website was registered in 2008 by the CEO, operating as an independent professional before formally establishing Hack23 AB in June 2025.
As CEO with CISM/CISSP certifications and three decades of experience, I've structured Hack23 AB around a fundamental principle: our Information Security Management System (ISMS) is not separate from our business - it IS our business model. This integration allows us to deliver security consulting services while simultaneously developing products that demonstrate these principles in action.
Our commitment to transparency extends beyond our open-source projects. This ISMS documentation itself serves as a testament to our belief that security through obscurity is a failed strategy. True security comes from robust processes, continuous improvement, and a culture where every decision considers security implications.
โ James Pether Sรถrling, CEO/Founder
๐๏ธ Quick Start for Auditors
Conducting ISO 27001, NIST CSF, or CIS Controls audit? Start here:
1. Framework Compliance Evidence
- ๐ Compliance Checklist โ Complete ISO 27001, NIST CSF, CIS Controls mappings with evidence links
- โ ISO 27001 Annex A Controls โ 100% control implementation status
- ๐ OpenSSF Scorecard Mapping โ Supply chain security evidence
2. Security Architecture & Controls
- ๐ Information Security Strategy โ Strategic security framework and governance
- ๐๏ธ Security Architecture โ Technical control implementation
- ๐ Cryptography Policy โ Encryption standards and key management
3. Risk Management & Business Continuity
- ๐ Risk Register โ Comprehensive risk inventory with treatments
- ๐ Risk Assessment Methodology โ Systematic risk scoring framework
- ๐ Business Continuity Plan โ Resilience and recovery procedures
4. Operational Security
- ๐จ Incident Response Plan โ Security incident handling procedures
- ๐ Vulnerability Management โ Vulnerability lifecycle management
- ๐ ๏ธ Secure Development Policy โ DevSecOps pipeline and SDLC security
5. Real-Time Security Metrics
- ๐ Security Metrics Dashboard โ Live KPI tracking and Phase 1 achievements
- ๐ ISMS Metrics Dashboard โ Policy review status and document health
Audit Efficiency: All evidence pre-linked with real-time validation. Target average audit preparation time: <8 hours, estimated based on pre-packaged evidence and subject to validation through actual audit cycles.
๐ Quick Start for Clients
Evaluating Hack23 AB for cybersecurity consulting? Start here:
๐ Core Security Policies
- Information Security Policy โ Overarching security governance
- Information Security Strategy โ Strategic security roadmap
- Classification Framework โ CIA impact analysis methodology
๐ Risk & Compliance
- Risk Register โ Identified risks and treatments
- Compliance Checklist โ Framework alignment validation
- Security Metrics โ Performance measurement
๐ก๏ธ Operational Security
- Incident Response Plan โ Security incident procedures
- Business Continuity Plan โ Operational resilience
- Disaster Recovery Plan โ Recovery procedures
๐๏ธ Product Security
- CIA Security Architecture โ Enterprise authentication
- CIA Compliance Manager Security Architecture โ Frontend-only rationale
- Black Trigram Security Architecture โ Gaming platform security
- European Parliament MCP Server Security Architecture โ MCP server security
- EU Parliament Monitor Security Architecture โ Intelligence platform
- Riksdagsmonitor Security Architecture โ Swedish parliament monitor
๐ Documentation Standards
- Style Guide โ Formatting and consistency standards
- ISMS Transparency Plan โ Radical transparency methodology
๐๏ธ Security & Compliance Posture
Security Certifications:
Compliance Frameworks (100% Coverage):
๐ CI/CD Status
All ISMS documentation is continuously validated against:
- โ Markdown linting standards
- ๐ Link integrity checks
- ๐ Document structure requirements
- ๐ Security and sensitive data scanning
- ๐จ STYLE_GUIDE.md v2.1 compliance (with documented exemptions for 12 legacy files)
๐ค GitHub Copilot Integration
AI-Powered ISMS Development: Hack23 AB leverages GitHub Copilot with 8 specialized custom agents and a comprehensive skills library for intelligent, security-by-design automation.
๐ฏ Custom Agents
We've developed 8 domain-expert agents that understand Hack23's ISMS framework and execute with minimal clarification:
| Agent | Domain | Key Capabilities |
|---|---|---|
| ๐ security-documentation-specialist | ISMS Documentation | ISO 27001 policies, security procedures, execution-first approach |
| ๐ compliance-reviewer | Regulatory Compliance | ISO 27001, GDPR, NIS2 gap analysis, audit readiness |
| Risk Management | ISO 27005, NIST RMF, STRIDE threat modeling | |
| ๐ business-development-specialist | Business Growth | Sales strategy, partnerships, market analysis |
| ๐ข marketing-specialist | Marketing Strategy | Digital marketing, content strategy, brand positioning |
| ๐ political-analyst-intelligence-specialist | Intelligence Analysis | OSINT, strategic communications, transparency platforms |
| ๐จ ui-enhancement-specialist | UI/UX Development | Frontend development, accessibility, responsive design |
| ๐ฆ product-task-agent | Product Quality | GitHub automation, AWS/Playwright integration, quality orchestration |
๐ Full Agent Documentation โ
๐ Skills Library
65+ enforceable rules across 5 strategic skills that guide all agent behavior:
| Skill | Rules | Coverage |
|---|---|---|
| ๐ security-by-design | R1-R13 | Security requirements, threat modeling, SAST/SCA/DAST, secure deployment |
| ๐ isms-compliance | R1-R10 | Policy awareness, classification, evidence generation, Risk Register integration |
| ๐๏ธ architecture-documentation | R1-R7 | C4 models, security architecture, 14-document portfolio requirement |
| ๐ devsecops-workflow | R1-R20 | CI/CD security gates, pre-commit hooks, container scanning, monitoring |
| ๐งช testing-strategy | R1-R12 | Test pyramid, โฅ80% coverage, public evidence, WCAG 2.1 compliance |
๐ Skills Quick Reference โ | ๐ Skills Library Overview โ
๐ก Key Features
- Execution-First Approach: 80% reduction in clarifying questions through intelligent pattern recognition
- Rule-Based Enforcement: Explicit, auditable rules ensure ISO 27001/NIST/CIS alignment
- Skills-Based Architecture: Strategic rules separated from tactical agent implementation
- Pattern Recognition: Agents learn from 3-5 similar files to infer structure and style automatically
- Evidence Generation: All changes linked to ISMS policies and compliance frameworks
๐ Complete Implementation Summary โ
๐ข About Hack23 AB
Hack23 AB is a Swedish innovation hub founded in 2025, specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting. With a commitment to realism and authenticity, our flagship project, Black Trigram, combines traditional Korean martial arts with educational gameplay, while our information security services leverage advanced open-source tools and methodologies to protect digital integrity, confidentiality, and availability. At Hack23 AB, we're driven by a passion for precision, creativity, and uncompromising security.
๐ Visual Guides & Diagrams
Hack23 ISMS includes comprehensive Mermaid diagrams for improved understanding and navigation:
- ๐ ISMS Document Hierarchy: See below โ Policy organization and navigation structure
- ๐๏ธ ISO 27001 Compliance Mapping: Compliance_Checklist.md โ Annex A control coverage
- ๐๏ธ Product Security Architecture: Information_Security_Strategy.md โ Security control comparison across products
- ๐ Risk Management Workflow: Risk_Register.md โ Risk lifecycle process
- ๐จ Incident Response Flowchart: Incident_Response_Plan.md โ Incident handling process with escalation paths
- ๐ Segregation of Duties Workflow: Segregation_of_Duties_Policy.md โ Single-person compensating controls
- ๐ฏ Security Control Selection Framework: Information_Security_Strategy.md โ Classification-driven control decisions
๐ ISMS Document Hierarchy
Hack23 AB's ISMS follows a structured hierarchy from strategic vision to operational templates, demonstrating enterprise-grade governance and systematic security management.
flowchart TD
subgraph STRATEGIC["๐ฏ Strategic Level"]
STRATEGY[Information Security Strategy<br/>3-year roadmap and vision]
POLICY_ROOT[Information Security Policy<br/>Governance framework]
CLASSIFICATION[Classification Framework<br/>CIA impact methodology]
end
subgraph GOVERNANCE["๐ Governance Policies"]
RISK[Risk Register<br/>Risk identification & treatment]
COMPLIANCE[Compliance Checklist<br/>Multi-framework alignment]
METRICS[Security Metrics<br/>KPI measurement & reporting]
TRANSPARENCY[ISMS Transparency Plan<br/>Public disclosure strategy]
end
subgraph OPERATIONAL["โ๏ธ Operational Policies"]
ACCESS[Access Control Policy<br/>IAM & authentication]
CHANGE[Change Management<br/>Change control procedures]
INCIDENT[Incident Response Plan<br/>Security incident handling]
BCP[Business Continuity Plan<br/>Operational resilience]
DRP[Disaster Recovery Plan<br/>Technical recovery]
THIRD_PARTY[Third Party Management<br/>Vendor risk management]
end
subgraph TECHNICAL["๐ ๏ธ Technical Policies"]
SECURE_DEV[Secure Development Policy<br/>SDLC security requirements]
CRYPTO[Cryptography Policy<br/>Encryption standards]
NETWORK[Network Security Policy<br/>Network controls & segmentation]
VULN[Vulnerability Management<br/>Security testing & patching]
BACKUP[Backup & Recovery Policy<br/>Data protection procedures]
DATA[Data Classification Policy<br/>Information handling]
end
subgraph SUPPORT["๐ Supporting Documents"]
STYLE[Style Guide<br/>Documentation standards]
QA[ISMS QA Checklist<br/>Quality assurance]
TEMPLATES[Templates<br/>Policy & procedure templates]
ASSET[Asset Register<br/>IT asset inventory]
end
STRATEGY --> POLICY_ROOT
POLICY_ROOT --> GOVERNANCE
POLICY_ROOT --> OPERATIONAL
POLICY_ROOT --> TECHNICAL
GOVERNANCE --> SUPPORT
style STRATEGIC fill:#1565C0,color:#fff
style GOVERNANCE fill:#4CAF50,color:#fff
style OPERATIONAL fill:#FF9800,color:#fff
style TECHNICAL fill:#D32F2F,color:#fff
style SUPPORT fill:#7B1FA2,color:#fff
Key Takeaways:
- ๐ฏ Strategic Level: Defines overarching security vision, governance framework, and impact classification methodology
- ๐ Governance: Establishes risk management, compliance tracking, metrics, and transparency commitments
- โ๏ธ Operational: Implements day-to-day security operations including access control, incident response, and business continuity
- ๐ ๏ธ Technical: Specifies technical security controls for development, cryptography, network, vulnerability, and data protection
- ๐ Support: Provides quality assurance, documentation standards, templates, and asset tracking
Related Documents:
- ๐ Information Security Policy โ Master governance policy
- ๐ท๏ธ Classification Framework โ Business impact definitions
- ๐ Style Guide โ Documentation and diagram standards
- ๐ ISMS Workflows โ Operational procedures and automation
- ๐ Future Workflows โ Planned automation and tooling roadmap
๐ ISMS Health Dashboard
๐ View Live ISMS Metrics Dashboard - Real-time policy health monitoring with automated review tracking
Our ISMS Metrics Dashboard provides instant visibility into:
- ๐ฆ Review Status: Overdue, due soon, and current policy reviews
- ๐ Upcoming Reviews: Next 90 days calendar view
- ๐ Document Health Matrix: Complete status of all 40 ISMS documents
- ๐ Compliance Coverage: ISO 27001, NIST CSF, CIS Controls alignment
- ๐ Automated Updates: Weekly refresh via GitHub Actions
๐ ISMS Document Library
๐ Security Policies & Controls
- Information Security Policy โ Master security governance framework
- Information Security Strategy โ Strategic security direction (Phase 1 complete)
- Access Control Policy โ Identity and access management
- Cryptography Policy โ Encryption and key management standards
- Network Security Policy โ Network protection and segmentation
- Acceptable Use Policy โ User behavior and professional standards
- Physical Security Policy โ Home office and physical access security
- Mobile Device Management Policy โ Endpoint security controls
๐ Compliance & Frameworks
- Compliance Checklist โ ISO 27001, NIST CSF, CIS Controls alignment
- Classification Framework โ Business impact analysis and asset classification
- AI Policy โ AI governance and LLM security
- OWASP LLM Security Policy โ LLM Top 10 controls
- Privacy Policy โ GDPR compliance and privacy by design
- CRA Conformity Assessment Process โ EU Cyber Resilience Act compliance
- NIS2 Compliance Service โ NIS2 Directive compliance services
โก Operations & Resilience
- Incident Response Plan โ Security incident handling (AI-enhanced)
- Business Continuity Plan โ Operational resilience
- Disaster Recovery Plan โ Recovery procedures
- Change Management โ Controlled change processes
- Backup Recovery Policy โ Data protection
- Segregation of Duties Policy โ Single-person compensating controls
๐ฏ Strategy & Risk Management
- SWOT Analysis โ Strategic positioning and AI agent ecosystem
- Risk Register โ Comprehensive risk inventory
- Risk Assessment Methodology โ Risk scoring framework
- External Stakeholder Registry โ Authority relationships
- Threat Modeling โ STRIDE methodology and attack trees
- Partnership Framework โ Strategic partnerships addressing dependency risks
๐ Metrics & Reporting
- Security Metrics โ Live KPI dashboard (Phase 1 achievements)
- ISMS Metrics Dashboard โ Policy health monitoring
- Asset Register โ Infrastructure inventory
- Supplier Security Posture โ Vendor risk assessments
๐ ๏ธ Development & Technical
- Secure Development Policy โ DevSecOps and SDLC security
- Vulnerability Management โ Vulnerability lifecycle
- Open Source Policy โ OSS governance
- Third Party Management โ Supplier risk management
- Data Classification Policy โ Information handling
- Security Architecture โ ISMS repository security
๐ Standards & Quality
- Style Guide โ Documentation formatting standards
- ISMS QA Checklist โ Quality assurance procedures
- ISMS Transparency Plan โ Public disclosure strategy
๐ Full Document Index: Complete Policy List with review status
๐ ISMS Documentation Status
Last Updated: 2026-01-25 | Completion: 100% (45/45 policies)
| Policy Document | Status | Version | Last Updated | Single-Person Adapted | ISO 27001 | NIST CSF 2.0 | CIS v8.1 |
|---|---|---|---|---|---|---|---|
| ๐ Information Security Policy | โ Complete | 2.0 | 2026-01-25 | โ Yes | โ A.5.1 | โ GV | โ IG1 |
| ๐ฏ Information Security Strategy | โ Complete | 3.2 | 2026-01-25 | N/A (Strategy) | โ All | โ All | โ All |
| ๐ Access Control Policy | โ Complete | 2.6 | 2026-01-25 | โ Yes | โ A.5.15-18 | โ PR.AC | โ IG1 |
| โ Acceptable Use Policy | โ Complete | 1.1 | 2026-01-25 | โ Yes | โ A.6.2 | โ PR.AT | โ IG1 |
| ๐ค AI Governance Policy | โ Complete | 2.2 | 2026-01-25 | N/A | โ A.5.1 | โ GV.RR | โ IG2 |
| ๐ป Asset Register | โ Complete | 1.5 | 2026-01-25 | โ Yes | โ A.5.9 | โ ID.AM | โ IG1 |
| ๐พ Backup & Recovery Policy | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.8.13 | โ PR.IP | โ IG1 |
| ๐ Business Continuity Plan | โ Complete | 1.3 | 2026-01-25 | โ Yes | โ A.5.29-30 | โ RC.RP | โ IG2 |
| ๐ท๏ธ Classification Framework | โ Complete | 1.3 | 2026-01-25 | N/A | โ A.5.12 | โ ID.AM | โ IG1 |
| ๐ก๏ธ CRA Conformity Assessment | โ Complete | 1.3 | 2026-01-25 | N/A | โ A.5.1 | โ GV.SC | โ IG2 |
| ๐ Change Management | โ Complete | 3.2 | 2026-01-25 | โ Yes | โ A.8.32 | โ PR.IP | โ IG2 |
| โ Compliance Checklist | โ Complete | 2.2 | 2026-01-25 | โ Yes | โ A.5.1 | โ GV.OC | โ IG1 |
| ๐ Cryptography Policy | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.8.24 | โ PR.DS | โ IG2 |
| ๐ท๏ธ Data Classification Policy | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.5.12-13 | โ ID.AM | โ IG1 |
| ๐ Disaster Recovery Plan | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.5.29 | โ RC.RP | โ IG2 |
| ๐ค External Stakeholder Registry | โ Complete | 1.4 | 2026-01-25 | N/A | โ A.5.19 | โ ID.BE | โ IG1 |
| ๐จ Incident Response Plan | โ Complete | 1.5 | 2026-01-25 | โ Yes | โ A.5.24-28 | โ RS.AN | โ IG1 |
| ๐ฑ Mobile Device Management | โ Complete | 1.1 | 2026-01-25 | โ Yes | โ A.6.7 | โ PR.AC | โ IG1 |
| ๐ Network Security Policy | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.8.20-22 | โ PR.AC | โ IG1 |
| ๐๏ธ NIS2 Compliance Service | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.5.1 | โ GV.OC | โ IG2 |
| ๐ก๏ธ OWASP LLM Security Policy | โ Complete | 1.3 | 2026-01-25 | N/A | โ A.8.16 | โ PR.DS | โ IG3 |
| ๐ Open Source Policy | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.5.23 | โ ID.SC | โ IG2 |
| ๐ค Partnership Framework | โ Complete | 1.1 | 2026-01-25 | โ Yes | โ A.5.19 | โ ID.BE | โ IG2 |
| ๐ Physical Security Policy | โ Complete | 1.1 | 2026-01-25 | โ Yes | โ A.7.1-4 | โ PR.AC | โ IG1 |
| ๐ Privacy Policy | โ Complete | 1.1 | 2026-01-25 | N/A | โ A.5.34 | โ PR.IP | โ IG2 |
| ๐ Risk Assessment Methodology | โ Complete | 2.1 | 2026-01-25 | N/A | โ A.5.7 | โ ID.RM | โ IG1 |
| โ Complete | 3.5 | 2026-01-25 | โ Yes | โ A.5.7 | โ ID.RM | โ IG1 | |
| ๐๏ธ Security Architecture | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.8.1 | โ PR.AC | โ IG2 |
| ๐ Style Guide | โ Complete | 2.4 | 2026-01-25 | โ Yes | N/A | N/A | N/A |
| ๐ข Supplier Security Posture | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.5.19-23 | โ ID.SC | โ IG2 |
| ๐ SWOT Analysis | โ Complete | 1.3 | 2026-01-25 | โ Yes | N/A | N/A | N/A |
| ๐ ๏ธ Secure Development Policy | โ Complete | 2.1 | 2026-01-25 | N/A | โ A.8.25-31 | โ PR.DS | โ IG2 |
| ๐ Security Metrics | โ Complete | 3.3 | 2026-01-25 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ซ Segregation of Duties | โ Complete | 2.1 | 2026-01-25 | โ Yes | โ A.5.3 | โ PR.AC | โ IG2 |
| ๐ฅ Third Party Management | โ Complete | 2.2 | 2026-01-25 | N/A | โ A.5.19-23 | โ ID.SC | โ IG2 |
| ๐ฏ Threat Modeling | โ Complete | 1.3 | 2026-01-25 | N/A | โ A.8.25 | โ ID.RA | โ IG2 |
| ๐ Vulnerability Management | โ Complete | 2.2 | 2026-01-25 | N/A | โ A.8.8 | โ DE.CM | โ IG1 |
| ๐ ISMS Metrics Dashboard | โ Complete | 1.3 | 2026-01-25 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ ISMS QA Checklist | โ Complete | 1.2 | 2026-01-25 | N/A | โ A.5.8 | โ GV.OV | โ IG2 |
| ๐ ISMS Transparency Plan | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.5.1 | โ GV.OC | โ IG1 |
| ๐ ISMS Workflows | โ Complete | 2.3 | 2026-01-25 | N/A | โ A.5.1 | โ GV.OC | โ IG2 |
| ๐ Future Workflows | โ Complete | 2.2 | 2026-01-25 | N/A | โ A.5.1 | โ GV.OC | โ IG2 |
๐ Completion Status
- โ Complete: 45 documents (100%)
- โณ In Progress: 0 documents
- ๐ Planned: 0 documents
- Total: 45 core documents
- Completion Rate: 100%
๐ข Single-Person Adaptations
- โ Adapted Policies: 15 policies include single-person company compensating controls
- ๐ Temporal Separation: Time-based role separation for conflicting duties
- ๐ค Automation Controls: Tool-based enforcement and validation
- ๐ Audit Trail Preservation: Immutable logging and external validation
- ๐ค External Validation: Partnership framework for capacity overflow
๐ ISMS Implementation Complete
Hack23 AB's Information Security Management System is now fully documented and operational. This comprehensive ISMS demonstrates enterprise-grade security practices while supporting our dual mission of cybersecurity consulting excellence and innovative product development.
Key Achievements
- 45 complete policy documents covering all aspects of information security
- Q1 2026 refresh complete with all documents updated to 2026-01-25
- Strategic Partnership Framework addressing single-person dependency risk (R-FOUNDER-001) with capacity overflow procedures
- NIS2 Compliance Service Package with โฌ2.6M 3-year revenue projection
- 7 NIS2 client templates (scoping, gap analysis, incident reporting, risk register, supply chain, checklist, management reporting)
- Security Architecture Documentation demonstrating ISMS repository security controls and GitHub-based security
- Acceptable Use Policy establishing clear behavioral expectations and professional standards
- Physical Security Policy demonstrating home office security for remote operations
- Mobile Device Management Policy demonstrating pragmatic endpoint security for single-person operations
- OWASP LLM Top 10 2025 alignment with comprehensive AI security controls
- GDPR-compliant privacy framework with comprehensive Privacy Policy for user-facing applications
- 6-level privacy classification system from Special Category data to Anonymized/NA
- Comprehensive risk assessment with 23 identified and managed risks
- Full supplier security posture analysis across 18 active services
- Enterprise-grade AWS security with 27 active services and 8 dedicated security tools
- Complete business continuity planning with defined RTO/RPO objectives
- Transparent documentation approach showcasing security expertise to potential clients
Business Value Delivered
- Client Demonstration Platform: Live ISMS serves as proof of our cybersecurity consulting capabilities
- Operational Excellence: Systematic approach to security enables business growth and innovation
- Compliance Readiness: Framework supports ISO 27001, GDPR, NIS2, and other regulatory requirements
- Risk Management: Proactive identification and treatment of business and security risks
- Stakeholder Confidence: Transparent security posture builds trust with clients, partners, and investors
This ISMS implementation validates our core principle: enterprise-grade security expertise directly enables innovation rather than constraining it.
๐ Security Services Overview
| Service Area | Offerings | Target Market | Delivery Model |
|---|---|---|---|
| Security Architecture | Enterprise design, risk assessment, strategy | Large enterprises | Remote/On-site |
| Cloud Security | AWS security, DevSecOps, IaC security | Tech companies | Remote |
| NIS2 Compliance | NIS2 assessment & implementation (4 packages) | Essential/Important entities | Hybrid |
| Compliance | GDPR, ISO 27001, SOC 2 implementation | Regulated industries | Hybrid |
| Open Source Security | OSPO setup, vulnerability management | Software companies | Remote |
| Security Training | Developer education, executive briefings | All organizations | Virtual/Physical |
๐๏ธ Security Badge Health Status
Our ISMS documentation maintains transparent security posture through public evidence badges. The badge monitoring system validates badge accessibility and security scores across all documentation.
Badge Health Metrics
| Metric | Status | Target | Description |
|---|---|---|---|
| Total Badges | 47+ | N/A | Security, quality, compliance, and build status badges |
| Health Score | 95%+ | 95% | Percentage of accessible badges |
| Security Badges | โ Active | 100% | OpenSSF Scorecard, SLSA, FOSSA |
| Quality Badges | โ Active | 100% | SonarCloud, code coverage |
| Compliance Badges | โ Active | 100% | ISO 27001, NIST CSF, CIS Controls |
| Monitoring | โ Automated | Continuous | On Push/PR + on-demand checks |
Badge Categories
๐ Security Badges (Critical)
- OpenSSF Scorecard: Supply chain security assessment for all repositories (live badges)
- SLSA Provenance: Build provenance and integrity verification (Level 3)
- FOSSA License: Open source license compliance and vulnerability detection
๐ Quality Badges (High Priority)
- SonarCloud Quality Gate: Code quality and security scanning (Target: Passed)
- Security Rating: Vulnerability detection and analysis (Target: A rating)
- Code Coverage: Test coverage metrics (Target: 80%+)
โ Compliance Badges (Documentation)
- ISO 27001 Aligned: Information security management framework
- NIST CSF 2.0 Aligned: Cybersecurity framework compliance
- CIS Controls v8.1 Aligned: Security control implementation
- AWS Well-Architected: Cloud security best practices
๐จ Build Status Badges (Operational)
- GitHub Actions CI: Continuous integration pipeline status
- Release Workflows: Automated release and deployment status
Reference Implementations
Our badge standards are demonstrated across Hack23 projects:
| Project | Security Badges | Quality Badges | Status |
|---|---|---|---|
| ๐๏ธ CIA | OpenSSF, SLSA, FOSSA | SonarCloud, Coverage | โ Complete |
| ๐ฎ Black Trigram | OpenSSF, SLSA, FOSSA | SonarCloud, Lighthouse | โ Complete |
| ๐ CIA Compliance | OpenSSF, SLSA, FOSSA | SonarCloud, Coverage | โ Complete |
| ๐ช๐บ EP MCP Server | OpenSSF, SLSA | Vitest, E2E Tests | โ Complete |
| ๐ช๐บ EU Parliament Monitor | OpenSSF, SLSA | News Generation | โ Complete |
| ๐ณ๏ธ Riksdagsmonitor | OpenSSF | Quality Checks | โ Complete |
For detailed badge requirements and standards, see the ๐จ Style Guide - Security Badge Standards.
๐ค Community & Transparency
Hack23 AB's ISMS is open for community review and feedback. We believe security through transparency creates stronger security than security through obscurity.
How to Contribute:
- ๐ Feedback: Contact us with suggestions, questions, or corrections
- ๐ Security Research: Review our documentation for security insights you can apply to your organization
- ๐ Educational Use: Our ISMS is freely available for educational and research purposes
- ๐ Best Practices: Learn from our single-person company adaptations and compensating controls
Community Guidelines:
- Be respectful and professional in all interactions
- Protect sensitive information (even though we publish 70%, some values remain confidential)
- Report security issues responsibly via our Incident Response Plan
Recognition: Thank you to the open-source security community, OpenSSF Scorecard, CII Best Practices, and all contributors to the frameworks we align with.
๐ Recent Updates
- 2026-01-25: Q1 2026 ISMS refresh โ All 45 documents updated with AI Policy references, categorized Related Documents, and version bumps
- 2025-12-26: README.md enhanced with Phase 1 narrative, auditor quick start, and reorganized navigation
- 2025-11-25: README.md updated with Phase 1 achievements and accurate policy status table
- 2025-11-24: Phase 1 Foundation Excellence complete โ 100% ISMS documentation
- 2025-11-24: Segregation of Duties Policy v2.0 published with comprehensive compensating controls
- 2025-11-19: Partnership Framework published addressing founder dependency risk
- 2025-11-18: NIS2 Compliance Service package complete with revenue projections
- 2025-11-17: Multiple policy updates with single-person adaptations
- 2025-11-10: Information Security Strategy v3.0 updated with Phase 1 achievements
- 2025-06-17: Hack23 AB founded (Organization Number: 559534-7807)
๐ Key Resources
- Company Website: hack23.com
- GitHub Organization: github.com/Hack23
- CEO/Founder LinkedIn: James Pether Sรถrling
- OpenSSF Scorecard Dashboard: All Hack23 Repositories
- CII Best Practices:
๐ License & Usage
ISMS Documentation License: Creative Commons Attribution 4.0 International (CC BY 4.0)
You are free to share and adapt this ISMS documentation for any purpose, even commercially, under the following terms:
- Attribution: You must give appropriate credit to Hack23 AB and link to this repository
- No Endorsement: You may not imply Hack23 AB endorses your use of this material
Disclaimer: This ISMS is tailored for Hack23 AB's specific risk profile and operational model. Organizations adopting these policies should perform their own risk assessments and customize policies to their context.
๐ Document Control:
โ
Approved by: James Pether Sรถrling, CEO
๐ค Distribution: Public
๐ท๏ธ Classification:
๐
Effective Date: 2026-01-25
โฐ Next Review: 2026-04-25
๐ Last Major Update: 2026-01-25 (Q1 2026 ISMS refresh)
๐ ISMS Policies: 45/45 documented | ๐ Public Transparency: 70%
๐ฏ Framework Compliance:
ยฉ 2025 Hack23 AB (559534-7807) โ Gothenburg, Sweden
Transparency in Security. Security through Transparency.