top of page

Rymx ISP Certification

Ownership of a Rymx ISP Certificate is proof that an organization has undergone the development of a battle-tested Information Security Program with the Rymx Web3 Operational Security Team. An Information Security Program consists of over 20 policies and procedures that ensure best practices across all of an organization's systems, technical and non-technical.

Information Security Program
Overview

Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Plan
Change Management Policy
Code of Conduct
Data Classification Policy
Data Deletion Policy
Data Protection Policy
Disaster Recovery Plan
Encryption Policy
Incident Response Plan
Information Security Policy
Password Policy
Physical Security Policy
Responsible Disclosure Policy
Risk Assessment Policy
Software Development Lifecycle Policy
Vendor Management Policy
On-Chain Wallet Policy
 

Information Security Program
Policy Deep-Dive

Acceptable Use Policy

Purpose:
Specifies acceptable use of end-user computing devices and technology. 

Common Risks Mitigated:
Hacks due to improper use of technology 

Access Control Policy

Purpose: 
Provides guidelines for creating, modifying, or removing access to the company’s network and data.

Common Risks Mitigated:
Risks associated with hiring / firing, business re-organizations, infrastructure changes 

Asset Management Policy

Purpose:
Defines requirements for mapping and properly tracking assets owned, managed, and under the control of Company

Common Risks Mitigated:
Risks associated with unknown or improperly-managed assets 

bottom of page