Skip to content

Commit 693bb72

Browse files
committed
Add Business Resiliency Policy and update navigation; refine email and remote access policies for clarity
1 parent 8e22fcc commit 693bb72

13 files changed

+86
-63
lines changed

src/data/nav-items.yaml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@
2222
path: /policies/acceptable_use_policy
2323
- title: Anti-virus Guidelines
2424
path: /policies/anti_virus_guidelines
25+
- title: Business Resiliency Policy
26+
2527
- title: Change Management and Control
2628
path: /policies/change_management_and_control
2729
- title: Cloud Computing Policy
@@ -34,10 +36,10 @@
3436
path: /policies/cybersecurity_executive_summary
3537
- title: Data Breach Response
3638
path: /policies/data_breach_response
37-
- title: Database Credentials Policy
38-
path: /policies/database_credentials_policy
3939
- title: Data Protection Policy
4040
path: /policies/data_protection_policy
41+
- title: Database Credentials Policy
42+
path: /policies/database_credentials_policy
4143
- title: Disaster Recovery plan Policy
4244
path: /policies/disaster_recovery_plan_policy
4345
- title: Email Policy
@@ -104,5 +106,7 @@
104106
path: /policies/technology_equipment_disposal_policy
105107
- title: Vendor Management Policy
106108
path: /policies/vendor_management_policy
109+
- title: Vulnerability Management Policy
110+
path: /policies/vulnerability_management_policy
107111
- title: Workstation Security for HIPPA Policy
108112
path: /policies/workstation_security_for_hipaa_policy

src/pages/policies/business_resilience_policy.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -27,17 +27,13 @@ The purpose of this policy is to ensure that Data Migrators can anticipate, prep
2727

2828
**Scope:** This policy applies to all employees, contractors, and third-party vendors. It covers all physical operations and cloud-hosted environments (e.g., AWS, Azure, GCP).
2929

30-
---
31-
3230
## 2. Resilience Objectives
3331
Our goal is to protect our people, our reputation, and our customers' data. We aim to achieve the following metrics:
3432

3533
* **Recovery Time Objective (RTO):** Critical customer-facing services must be restored within **4 business hours** of a declared disaster.
3634
* **Recovery Point Objective (RPO):** Maximum allowable data loss is **1 hour** of transactions.
3735
* **Availability:** Maintain a service level agreement (SLA) of **99.9%** uptime.
3836

39-
---
40-
4137
## 3. Governance and Roles
4238

4339
| Role | Responsibility |
@@ -47,8 +43,6 @@ Our goal is to protect our people, our reputation, and our customers' data. We a
4743
| **Product/DevOps Lead** | Ensuring software architecture supports high availability and DR. |
4844
| **Customer Success** | Managing communication with clients during service disruptions. |
4945

50-
---
51-
5246
## 4. Critical Business Functions (CBF)
5347
The following functions are prioritized for recovery in the event of a disruption:
5448

@@ -57,8 +51,6 @@ The following functions are prioritized for recovery in the event of a disruptio
5751
3. **Software Development Pipeline:** CI/CD tools required for security patching.
5852
4. **Financial Operations:** Payroll and accounts receivable/payable.
5953

60-
---
61-
6254
## 5. Resilience Strategy
6355

6456
### 5.1 Infrastructure & Data Resilience (DR)
@@ -75,17 +67,13 @@ The following functions are prioritized for recovery in the event of a disruptio
7567
* **Immutable Logs:** Maintain tamper-proof audit logs to detect and recover from ransomware.
7668
* **Security Patches:** Critical security vulnerabilities in the software must be patched within **[e.g., 24-48]** hours.
7769

78-
---
79-
8070
## 6. Testing and Maintenance
8171
A plan is only as good as its last test. Data Migrators commits to:
8272

8373
* **Tabletop Exercises:** Annual walkthroughs of "What-if" scenarios (e.g., AWS Region outage, Ransomware).
8474
* **DR Drills:** Semi-annual technical failover tests to confirm RTO/RPO targets are met.
8575
* **Policy Review:** This policy is reviewed annually or after any major architectural change.
8676

87-
---
88-
8977
## 7. Communication Plan
9078
In the event of a disruption affecting customers:
9179

Lines changed: 35 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,50 +1,75 @@
1+
---
2+
title: Capacity and Performance Management Policy
3+
description: Our Capacity and Performance Management Policy
4+
keywords: 'policy,capacity, performance management,security,markdown'
5+
---
6+
7+
<PageDescription>
8+
9+
This page describes Data Migrators' capacity and performance management policy
10+
11+
</PageDescription>
12+
13+
<AnchorLinks>
14+
<AnchorLink>Purpose</AnchorLink>
15+
<AnchorLink>Policy Statement</AnchorLink>
16+
<AnchorLink>Capacity Monitoring Procedures</AnchorLink>
17+
<AnchorLink>Resource Optimization</AnchorLink>
18+
<AnchorLink>Roles and Responsibilities</AnchorLink>
19+
<AnchorLink>Policy Compliance</AnchorLink>
20+
</AnchorLinks>
21+
122
# Capacity and Performance Management Policy
223

324
## 1. Purpose
25+
426
The purpose of this policy is to ensure that Data Migrators' systems are proactively monitored and managed to provide consistent performance, high availability, and scalability. This policy ensures that infrastructure capacity aligns with business growth and technical evolution.
527

628
## 2. Policy Statement
7-
**Our organization requires that system resources are monitored to ensure adequate capacity for new, upgraded, or enhanced systems.**
829

9-
To fulfill this requirement, Data Migrators shall:
30+
Our organization requires that system resources are monitored to ensure adequate capacity for new, upgraded, or enhanced systems. To fulfill this requirement, Data Migrators shall:
31+
1032
* Maintain a continuous baseline of resource utilization (CPU, memory, storage, and network).
1133
* Forecast future capacity requirements based on the product roadmap and sales projections.
1234
* Proactively identify and mitigate potential bottlenecks before they impact service delivery or customer experience.
1335

14-
---
15-
1636
## 3. Capacity Monitoring Procedures
1737

1838
### 3.1 Real-Time Monitoring and Alerting
19-
All production environments must be integrated with automated monitoring tools (e.g., AWS CloudWatch, Datadog).
39+
40+
All production environments must be integrated with automated monitoring tools (e.g., AWS CloudWatch).
41+
2042
* **Thresholds:** Automated alerts are configured to trigger when resource utilization exceeds **75%** of allocated capacity.
2143
* **Visibility:** Real-time dashboards must be maintained to provide the technical team with immediate visibility into system health.
2244

2345
### 3.2 Cloud Elasticity and Auto-Scaling
46+
2447
As a cloud-native ISV, we utilize dynamic scaling to ensure "adequate capacity" is available on-demand:
48+
2549
* **Auto-Scaling:** Critical application tiers must use Auto-Scaling Groups (ASGs) to handle traffic spikes.
2650
* **Quota Management:** AWS Service Quotas (limits) must be reviewed quarterly to ensure that account-level restrictions do not impede the ability to scale.
2751

2852
### 3.3 New and Upgraded Systems
53+
2954
Before the deployment of any new software system or significant feature enhancement:
55+
3056
* **Impact Assessment:** The engineering team must evaluate the expected resource consumption of the new code.
3157
* **Load Testing:** For major releases, load testing must be performed in a staging environment to validate that the production architecture can handle the anticipated increase in demand.
3258

33-
---
34-
3559
## 4. Resource Optimization
60+
3661
To balance resilience with cost-efficiency, the following practices are mandated:
62+
3763
* **Right-Sizing:** Monthly reviews of infrastructure utilization to downsize underutilized resources.
3864
* **Decommissioning:** Procedures must be in place to identify and remove "orphan" resources (e.g., unattached storage volumes) that no longer contribute to system capacity.
3965

40-
---
41-
4266
## 5. Roles and Responsibilities
67+
4368
* **Infrastructure/DevOps Team:** Responsible for implementing monitoring tools, managing auto-scaling logic, and responding to capacity alerts.
4469
* **Product Management:** Responsible for communicating forecasted increases in user load or data processing requirements.
4570
* **CTO/Engineering Lead:** Responsible for the strategic oversight of infrastructure spend and capacity planning.
4671

47-
---
4872

4973
## 6. Policy Compliance
74+
5075
Failure to comply with this policy may result in service degradation or outages. Compliance is verified through annual internal audits and periodic reviews of monitoring logs and scaling performance.

src/pages/policies/change_management_and_control.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,20 @@ This page describes Data Migrators’ policy on change management and control.
1515
<AnchorLink>Purpose</AnchorLink>
1616
<AnchorLink>Scope</AnchorLink>
1717
<AnchorLink>Policy</AnchorLink>
18+
<AnchorLink>Operational Procedures</AnchorLink>
19+
<AnchorLink>Documented Change</AnchorLink>
20+
<AnchorLink>Risk Management</AnchorLink>
21+
<AnchorLink>Change Classification</AnchorLink>
22+
<AnchorLink>Testing</AnchorLink>
23+
<AnchorLink>Changes Affecting SLA‘s</AnchorLink>
24+
<AnchorLink>Version Control</AnchorLink>
25+
<AnchorLink>Approval</AnchorLink>
26+
<AnchorLink>Communicating Changes</AnchorLink>
27+
<AnchorLink>Implementation</AnchorLink>
28+
<AnchorLink>Fall Back</AnchorLink>
29+
<AnchorLink>Documentation</AnchorLink>
30+
<AnchorLink>Business Continuity Plans (BCP)</AnchorLink>
31+
<AnchorLink>Change Monitoring</AnchorLink>
1832
<AnchorLink>Roles And Responsibilities</AnchorLink>
1933
<AnchorLink>Policy Compliance</AnchorLink>
2034
<AnchorLink>Exceptions</AnchorLink>
@@ -87,7 +101,7 @@ All change requests shall be prioritised in terms of benefits, urgency, effort r
87101

88102
Changes shall be tested in an isolated, controlled, and representative environment (where such an environment is feasible) prior to implementation to minimise the effect on the relevant business process, to assess its impact on operations and security and to verify that only intended and approved changes were made.
89103

90-
### Changes Affecting Sla‘s
104+
### Changes Affecting SLA‘s
91105

92106
The impact of change on existing SLA’s shall be considered. Where applicable, changes to the SLA shall be controlled through a formal change process which includes contractual amendments.
93107

@@ -116,7 +130,7 @@ Procedures for aborting and recovering from unsuccessful changes shall be docume
116130
Information resources documentation shall be updated on the completion of each change and old documentation shall be archived or disposed of as per the documentation and data retention policies.
117131
Information resources documentation is used for reference purposes in various scenarios i.e. further development of existing information resources as well as ensuring adequate knowledge transfer in the event of the original developer and/or development house being unavailable. It is therefore imperative that information resources documentation is complete, accurate and kept up to date with the latest changes. Policies and procedures, affected by software changes, shall be updated on completion of each change.
118132

119-
### Business Continuity Plans (Bcp)
133+
### Business Continuity Plans (BCP)
120134

121135
Business continuity plans shall be updated with relevant changes, managed through the change control process. Business continuity plans rely on the completeness, accuracy and availability of BCP documentation. BCP documentation is the road map used to minimise disruption to critical business processes where possible, and to facilitate their rapid recovery in the event of disasters.
122136

src/pages/policies/communications_equipment_policy.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ equipment such as laptops and phones.
1212
</PageDescription>
1313

1414
<AnchorLinks>
15-
<AnchorLink>Overview</AnchorLink>
16-
<AnchorLink>Purpose</AnchorLink>
17-
<AnchorLink>Scope</AnchorLink>
18-
<AnchorLink>Policy</AnchorLink>
19-
<AnchorLink>Policy Compliance</AnchorLink>
20-
<AnchorLink>Exceptions</AnchorLink>
21-
<AnchorLink>Non-compliance</AnchorLink>
22-
<AnchorLink>Related Documents</AnchorLink>
23-
<AnchorLink>Definitions and Terms</AnchorLink>
15+
<AnchorLink>Overview</AnchorLink>
16+
<AnchorLink>Purpose</AnchorLink>
17+
<AnchorLink>Scope</AnchorLink>
18+
<AnchorLink>Policy</AnchorLink>
19+
<AnchorLink>Policy Compliance</AnchorLink>
20+
<AnchorLink>Exceptions</AnchorLink>
21+
<AnchorLink>Non-compliance</AnchorLink>
22+
<AnchorLink>Related Documents</AnchorLink>
23+
<AnchorLink>Definitions and Terms</AnchorLink>
2424
</AnchorLinks>
2525

2626
## Overview

src/pages/policies/email_policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This policy covers appropriate use of any email sent from a Data Migrators email
3636

3737
## Policy
3838

39-
1. All use of email must be consistent with Data Migrators policies and procedures of ethical conduct, safety, compliance with applicable laws and proper business practices. 
39+
1. All use of email must be consistent with Data Migrators policies and procedures of ethical conduct, safety, compliance with applicable laws and proper business practices.
4040

4141
2. Data Migrators email account should be used primarily for Data Migrators business-related purposes; personal communication is permitted on a limited basis, but non-Data Migrators related commercial uses are prohibited.
4242

@@ -55,7 +55,7 @@ This policy covers appropriate use of any email sent from a Data Migrators email
5555

5656
7. Users are prohibited from automatically forwarding Data Migrators email to a third party email system (noted in 4.8 below). Individual messages which are forwarded by the user must not contain Data Migrators confidential or above information.
5757

58-
8. Users are prohibited from using third-party email systems and storage servers such as Google, Yahoo, and MSN Hotmail etc. to conduct Data Migrators business, to create or memorialize any binding transactions, or to store or retain email on behalf of Data Migrators.  Such communications and transactions should be conducted through proper channels using Data Migrators-approved documentation. 
58+
8. Users are prohibited from using third-party email systems and storage servers such as Google, Yahoo, and MSN Hotmail etc. to conduct Data Migrators business, to create or memorialize any binding transactions, or to store or retain email on behalf of Data Migrators. Such communications and transactions should be conducted through proper channels using Data Migrators-approved documentation.
5959

6060
9. Using a reasonable amount of Data Migrators resources for personal emails is acceptable, but non-work related email shall be saved in a separate folder from work related email. Sending chain letters or joke emails from a Data Migrators email account is prohibited.
6161

src/pages/policies/employee_confidentiality_policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This page describes Data Migrators' employee confidentiality policy.
2020

2121
## Purpose
2222

23-
We designed our company confidentiality policy to explain how we expect our employees to treat confidential information. Employees will unavoidably receive and handle personal and private information about clients, partners and our company. We want to make sure that this information is well-protected.
23+
We designed our company confidentiality policy to explain how we expect our employees to treat confidential information. Employees will unavoidably receive and handle personal and private information about clients, partners and our company. We want to make sure that this information is well protected.
2424

2525
We must protect this information for two reasons. It may:
2626
- Be legally binding (e.g. sensitive customer data.)

src/pages/policies/internet_usage_policy.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The Internet usage Policy applies to all Internet users (individuals
5555
working for the company, including permanent full-time and part-time
5656
employees, contract workers, temporary agency workers, business
5757
partners, and vendors) who access the Internet through the computing or
58-
networking resources. The company\'s Internet users are expected to be
58+
networking resources. The company's Internet users are expected to be
5959
familiar with and to comply with this policy, and are also required to
6060
use their common sense and exercise their good judgment while using
6161
Internet services.
@@ -320,9 +320,9 @@ various systems across which it has been transmitted.
320320

321321
When using company resources to access and use the Internet, users must
322322
realize they represent the company. Whenever employees state an
323-
affiliation to the company, they must also clearly indicate that \"the
323+
affiliation to the company, they must also clearly indicate that "the
324324
opinions expressed are my own and not necessarily those of the
325-
company\". Questions may be addressed to the IT Department.
325+
company". Questions may be addressed to the Directors.
326326

327327
### Company Materials
328328

@@ -391,8 +391,7 @@ potential Internet user is required to read this Internet usage Policy
391391
and sign an acknowledgment form (located on the last page of this
392392
document). The signed acknowledgment form should be turned in and will
393393
be kept on file at the facility granting the access. For questions on
394-
the Internet usage Policy, contact the Information Technology (IT)
395-
Department.
394+
the Internet usage Policy, contact the Directors.
396395

397396
## Related Documents
398397

src/pages/policies/remote_access_policy.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,10 +75,9 @@ information and definitions, see the *Acceptable Use Policy*.
7575
Authorized Users will not use Data Migrators networks to access the
7676
Internet for outside business interests.
7777

78-
For additional information regarding Data Migrators\'s remote access
78+
For additional information regarding Data Migrators's remote access
7979
connection options, including how to obtain a remote access login, free
80-
anti-virus software, troubleshooting, etc., go to the Remote Access
81-
Services website (company url).
80+
anti-virus software, troubleshooting, etc., contact the Directors.
8281

8382
### Requirements
8483

src/pages/policies/risk_assessment_policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,7 @@ disciplinary action, up to and including termination of employment.
7171

7272
## Related Documents
7373

74-
- Risk Assessment Process
75-
76-
- Third Party Agreement
74+
- [Risk Management Policy](risk_management_policy)
7775

7876
## Definitions and Terms
7977

0 commit comments

Comments
 (0)