Taps.IM
ENTERPRISEISO 27001 Certificate
Official ISO/IEC 27001:2022 certification demonstrating our commitment to international information security management standards and systematic risk management approach.
Certificate Details
Scope of Certification
Information Security Management System for encrypted messaging platform and federation server operations
Clean certification audit with no major or minor non-conformities identified. The ISMS demonstrates effective implementation and continuous improvement.
Information Security Management System
Our ISMS follows the Plan-Do-Check-Act cycle ensuring continuous improvement and risk management
ISMS Status
ISO 27001:2022 Controls Implementation
Complete implementation of all 93 controls across 14 control categories with maturity assessment
A.5 - Information Security Policies
Key Controls
- Information security policy established and approved by management
- Policy reviewed annually and communicated to all personnel
A.6 - Organization of Information Security
Key Controls
- Information security responsibilities defined and allocated
- Mobile device policy and remote working guidelines
- Information security in project management
A.7 - Human Resource Security
Key Controls
- Background verification procedures for all personnel
- Confidentiality agreements and security awareness training
- Disciplinary process for information security incidents
A.8 - Asset Management
Key Controls
- Asset inventory maintained with ownership assignments
- Information classification scheme and handling procedures
- Media disposal and secure deletion procedures
A.9 - Access Control
Key Controls
- Access control policy with role-based permissions
- Multi-factor authentication for privileged access
- Regular access reviews and privilege management
A.10 - Cryptography
Key Controls
- Cryptographic controls policy with approved algorithms
- Key management procedures for the entire lifecycle
A.11 - Physical and Environmental Security
Key Controls
- Secure areas with physical access controls
- Equipment protection and maintenance procedures
- Clear desk and clear screen policies
A.12 - Operations Security
Key Controls
- Documented operating procedures with change control
- Malware protection and vulnerability management
- Information backup and logging procedures
A.13 - Communications Security
Key Controls
- Network security management and segregation
- Information transfer policies and procedures
- Electronic messaging security controls
A.14 - System Acquisition, Development & Maintenance
Key Controls
- Information security requirements in development lifecycle
- Secure development environment and testing procedures
- System security testing and acceptance procedures
A.15 - Supplier Relationships
Key Controls
- Information security policy for supplier relationships
- Security requirements in supplier agreements
- ICT supply chain security management
A.16 - Information Security Incident Management
Key Controls
- Incident response procedures with defined roles
- Incident reporting and evidence collection
- Learning from incidents and continuous improvement
A.17 - Information Security Aspects of Business Continuity
Key Controls
- Information security continuity planning
- ICT readiness for business continuity
- Regular testing of continuity procedures
A.18 - Compliance
Key Controls
- Compliance with legal and contractual requirements
- Independent review of information security
- Regular compliance monitoring and reporting
Risk Management
Systematic risk assessment and treatment based on ISO 27005:2022 methodology
Risk Profile
Key Risk Areas
Cryptographic Key Management
Hardware Security Modules (HSMs) implemented
Third-Party Integrations
Comprehensive supplier security assessments
Data Center Physical Security
Multi-layered physical controls with 24/7 monitoring
Certification Journey
Timeline of audits, assessments, and continuous improvement activities leading to certification
Stage 2 Certification Audit
Stage 1 Readiness Assessment
Internal Audit - Full Scope
Management Review
Verify ISO 27001 Certificate
Download the official certificate or verify its authenticity directly with BSI Group, the world's leading standards and certification body.