π― Kudo π
The open-source and practical book on cybersecurity
The formula is simple:
Applies to governments, investors, companies, clients, users among others...
π‘οΈ Cybersecurity Policy¶
-
Cybersecurity Policy
We believe in a digital world built on freedom, responsibility, and integrity.
Cybersecurity is not just about defense or attack β itβs about mutual respect. Itβs about striving to do your best that every interaction, every line of code, and every user experience reflects a commitment agreement on what is defined in policies and procedures that shine for their extensive and theoretical content.
π€ Sections¶
π― Why use this site?¶
- Trust among stakeholders: Applies to investors, governments, companies, clients, and users.
- Define baseline policies: Establishes a common framework for security management.
- Team training: Supports initial and ongoing training for collaborators.
- Simplify audits: Demonstrates a structured approach during external evaluations.
- Scale security practices: Enables replication of best practices across different contexts.
- Optimize Business as Usual (BaU): Improves operational efficiency and risk management.
π Compliance¶
We're referring to the Cloud Security Alliance because we've found it aligns with the reality of cloud environments. We invite you to visit their website and attend their events; they're great role models.
graph LR
CSA[Cloud Security Alliance]
DOMAINS[17 Domains]
DOM1[A&A - Audit and Assurance]
DOM2[AIS β Application and Interface Security]
DOM3[BCR β Business Continuity and Operational Resilience]
DOM4[CCC β Change Control and Configuration Management]
DOM5[CEK β Cryptography, Encryption, and Key Management]
DOM6[STA - Supply Chain Mgmt, Transparency & Accountability]
DOM7[DCS β Datacenter Security]
DOM8[DSP β Data Security and Privacy Lifecycle Management]
DOM9[GRC β Governance, Risk, and Compliance]
DOM10[HRS β Human Resources Security]
DOM11[IAM β Identity and Access Management]
DOM12[IPY β Interoperability and Portability]
DOM13[IVS β Infrastructure and Virtualization Security]
DOM14[LOG β Logging and Monitoring]
DOM15[SEF β Security Incident Management, E-Discovery & Forensics]
DOM16[TVM β Threat and Vulnerability Management]
DOM17[UEM β Universal Endpoint Management]
NOTWHEEL[Note: We only use Cloud Security Alliance domain names as a reference.]
CSA --> DOMAINS
DOMAINS --> DOM1
DOMAINS --> DOM2
DOMAINS --> DOM3
DOMAINS --> DOM4
DOMAINS --> DOM5
DOMAINS --> DOM6
DOMAINS --> DOM7
DOMAINS --> DOM8
DOMAINS --> DOM9
DOMAINS --> DOM10
DOMAINS --> DOM11
DOMAINS --> DOM12
DOMAINS --> DOM13
DOMAINS --> DOM14
DOMAINS --> DOM15
DOMAINS --> DOM16
DOMAINS --> DOM17
NOTWHEEL
ποΈ Document Governance¶
Enterprise Context¶
This means that the documents are not only applicable to a specific project or team but are intended to be used across the entire organization.
All documents are created and maintained in a hypothetical business context is your name is DivisionCero
.
π Hypothetical Business Context¶
- A technology company offering software as a service (SaaS).
- Has teams for software development, infrastructure, quality, and security; also applicable in outsourced contexts.
- Operates its infrastructure across multiple Cloud Service Providers (CSPs).
- Serves clients in various countries.
- Employs collaborators working both on-site and remotely.
πͺͺ Roles and Responsibilities¶
- CISO or similar roles: Sponsor of the information security and governance policy.
- GRC / Risk: Curators of the document architecture. Responsible for the document lifecycle.
- Process Owners: Responsible for keeping the policies and procedures applicable to their areas up to date.
- Internal Audit / Quality: Verify validity and traceability.
- Collaborators: Responsible for complying with established policies and procedures.
π Document life cycle¶
graph LR
A[π Need] --> B[βοΈ Creation]
B --> C[π Review]
C --> D[π Versioning]
D --> E[π’ Publication]
E --> F[π Update]
F --> A
π Philosophy¶
Letβs build technology that is worthy of trustβnot just designed to make attacks harder.
Letβs write code meant to be shared, not hidden.
Each line of code is a link in a global chain with the potential to improve peopleβs lives.
Letβs stand together against the ego in cybersecurity that has affected us all, often leading to the creation of redundant frameworks, standards, references, and guidelinesβeach centered on its own vision, without truly aiming to unify or bring greater value to a safer world. This fragmentation has resulted in decades of best practices that, while valid, remain disconnected from real and widespread applicability. True progress will only come when we stop competing and start collaborating for cybersecurity that is more accessible and effective for everyone.
Finally, letβs always remember that technology exists to serve people. We must not allow technological advancement to dehumanize us or pull us away from our essential purpose: to create tools that empower, protect, and uplift people in their everyday lives. Cybersecurity is, above all, an ethical responsibility to those who trust us to safeguard their privacy, their rights, and their freedom in the cyberspace.
π Documentation structure¶
/Cybersecurity Compliance/
βββ Policies/
βββ Best Practices/
β βββ Baseline/
β βββ Tools/
β βββ Courses/
πΎ Clarifications¶
Versioning
The versioning of documents follows this nomenclature:
-
Continuous changes vX.Y.Z
- X: Major version (significant changes)
- Y: Minor version (improvements or minor changes)
- Z: Patch version (bug fixes)
- Example: v1.0.0 (initial version), v1.1.0 (improvements), v1.1.1 (bug fixes)
-
Releases grouped on the site at a general level are referenced by year and quarter:
- Example: 2025-Q2 (initial version of the second quarter of 2025)
Change Control
Change control is carried out continuously with traceability through the git flow; specifically through Pull Requests (PR), which can be validated in the following repository. At the top right of the website, there is a direct link.
Scope
We aim for the scope of this project to be broad and for its applicability in each context to be general, not segmented. Therefore, each document is intended to be applicable to any context and not just a specific one.