Statement of Applicability (SoA)

Last updated May 30, 2025

ZanReal Labs ("ZanReal Labs", "we", "us", or "our") has established this Statement of Applicability (SoA) as part of our Information Security Management System (ISMS) to define the scope of our information security controls and their applicability to our business operations.

This Statement of Applicability is aligned with ISO/IEC 27001:2022 and references the security controls from ISO/IEC 27002:2022.

ISMS Scope

Organizational Scope

  • Company: ZanReal Labs - ZANREAL Mateusz Janota
  • Business Activities: Comprehensive technology services including software development, marketing services, remote IT support, SEO optimization, UI/UX design services, cloud platforms, and AI-powered solutions
  • Geographic Coverage: Global operations with distributed workforce
  • Regulatory Environment: GDPR, CCPA, PIPEDA, SOX, HIPAA (where applicable)

Technical Scope

  • All cloud infrastructure (AWS, Microsoft Azure, Google Cloud Platform)
  • All customer-facing applications and platforms
  • All internal systems and networks
  • All data processing and storage systems
  • All third-party integrations and services
  • All physical and virtual assets

Excluded from Scope

  • Physical security of third-party data centers (managed by cloud providers)
  • Customer-managed infrastructure and applications
  • Third-party vendor internal security (covered by vendor assessments)

ISO 27002:2022 Controls Applicability

5. Organizational Controls

ControlTitleStatusJustification
5.1Policies for information security✅ ApplicableComprehensive Information Security Policy implemented
5.2Information security roles and responsibilities✅ ApplicableDefined in Information Security Policy section 3
5.3Segregation of duties✅ ApplicableImplemented through role-based access controls
5.4Management responsibilities✅ ApplicableExecutive oversight and accountability established
5.5Contact with authorities✅ ApplicableIncident response procedures include authority notification
5.6Contact with special interest groups✅ ApplicableSecurity community engagement and threat intelligence
5.7Threat intelligence✅ ApplicableWazuh SIEM and external threat feeds implemented
5.8Information security in project management✅ ApplicableSecurity by design in development lifecycle
5.9Inventory of information and other associated assets✅ ApplicableAsset management procedures implemented
5.10Acceptable use of information and other associated assets✅ ApplicableDefined in Information Security Policy
5.11Return of assets✅ ApplicableAsset return procedures for departing personnel
5.12Classification of information✅ ApplicableData classification framework implemented
5.13Labelling of information✅ ApplicableData labeling standards implemented
5.14Information transfer✅ ApplicableSecure data transfer protocols implemented
5.15Access control✅ ApplicableComprehensive access control framework
5.16Identity management✅ ApplicableCentralized identity management with SSO
5.17Authentication information✅ ApplicableStrong authentication with MFA/Passkeys
5.18Access rights✅ ApplicableRole-based access control (RBAC) implemented
5.19Information security in supplier relationships✅ ApplicableSupplier security assessment procedures
5.20Addressing information security within supplier agreements✅ ApplicableSecurity clauses in vendor contracts
5.21Managing information security in the ICT supply chain✅ ApplicableSupply chain security assessments
5.22Monitoring, review and change management of supplier services✅ ApplicableOngoing supplier monitoring procedures
5.23Information security for use of cloud services✅ ApplicableCloud security framework for AWS/Azure/GCP
5.24Information security incident management planning and preparation✅ ApplicableComprehensive incident response plan
5.25Assessment and decision on information security events✅ ApplicableEvent triage and escalation procedures
5.26Response to information security incidents✅ ApplicableIncident response procedures with Wazuh SIEM
5.27Learning from information security incidents✅ ApplicablePost-incident review and improvement process
5.28Collection of evidence✅ ApplicableDigital forensics and evidence handling
5.29Information security during disruption✅ ApplicableBusiness continuity and disaster recovery
5.30ICT readiness for business continuity✅ ApplicableTechnology recovery procedures

6. People Controls

ControlTitleStatusJustification
6.1Screening✅ ApplicableBackground check procedures for personnel
6.2Terms and conditions of employment✅ ApplicableSecurity clauses in employment agreements
6.3Information security awareness, education and training✅ ApplicableMandatory security training program
6.4Disciplinary process✅ ApplicableSecurity violation consequences defined
6.5Information security responsibilities after termination or change of employment✅ ApplicableTermination security procedures
6.6Confidentiality or non-disclosure agreements✅ ApplicableNDAs for all personnel and contractors
6.7Remote working✅ ApplicableRemote work security guidelines
6.8Information security event reporting✅ ApplicableSecurity incident reporting procedures

7. Physical Controls

ControlTitleStatusJustification
7.1Physical security perimeters⚠️ Limited ApplicabilityOffice security measures; cloud DCs managed by providers
7.2Physical entry⚠️ Limited ApplicabilityOffice access controls; cloud DCs managed by providers
7.3Protection against environmental threats⚠️ Limited ApplicabilityOffice environmental controls; cloud resilience
7.4Working in secure areas✅ ApplicableSecure workspace guidelines
7.5Desk and screen✅ ApplicableClean desk and screen lock policies
7.6Removal of assets✅ ApplicableAsset removal authorization procedures
7.7Secure disposal or reuse of equipment✅ ApplicableSecure data destruction procedures
7.8Equipment siting and protection✅ ApplicableEquipment security and protection
7.9Security of assets off-premises✅ ApplicableMobile device and remote asset security
7.10Storage media✅ ApplicableSecure handling of storage media
7.11Supporting utilities⚠️ Limited ApplicabilityOffice utilities; cloud infrastructure resilience
7.12Cabling security⚠️ Limited ApplicabilityOffice network security; cloud managed infrastructure
7.13Equipment maintenance✅ ApplicableIT equipment maintenance procedures
7.14Secure disposal or reuse of equipment✅ ApplicableEquipment disposal and sanitization

8. Technological Controls

ControlTitleStatusJustification
8.1User endpoint devices✅ ApplicableEndpoint protection with Bitdefender GravityZone
8.2Privileged access rights✅ ApplicablePrivileged access management implemented
8.3Information access restriction✅ ApplicableAccess controls and data restrictions
8.4Access to source code✅ ApplicableSource code access controls and version control
8.5Secure authentication✅ ApplicableMFA with YubiKeys and Passkeys
8.6Capacity management✅ ApplicableCloud resource monitoring and scaling
8.7Protection against malware✅ ApplicableBitdefender endpoint protection and Wazuh monitoring
8.8Management of technical vulnerabilities✅ ApplicableNessus vulnerability management
8.9Configuration management✅ ApplicableInfrastructure as Code and configuration management
8.10Information deletion✅ ApplicableSecure deletion procedures
8.11Data masking✅ ApplicableData anonymization and pseudonymization
8.12Data leakage prevention✅ ApplicableDLP controls and monitoring
8.13Information backup✅ ApplicableComprehensive backup and recovery procedures
8.14Redundancy of information processing facilities✅ ApplicableMulti-region cloud redundancy
8.15Logging✅ ApplicableComprehensive logging with Wazuh SIEM
8.16Monitoring activities✅ ApplicableContinuous monitoring with Wazuh and Cloudflare
8.17Clock synchronisation✅ ApplicableNTP synchronization across all systems
8.18Use of privileged utility programs✅ ApplicableControlled use of administrative tools
8.19Installation of software on operational systems✅ ApplicableChange management for software installations
8.20Networks security management✅ ApplicableNetwork security with Cloudflare Zero Trust
8.21Security of network services✅ ApplicableNetwork service security controls
8.22Segregation of networks✅ ApplicableNetwork segmentation and isolation
8.23Web filtering✅ ApplicableWeb filtering and content security
8.24Use of cryptography✅ ApplicableEncryption at rest and in transit
8.25Secure system development life cycle✅ ApplicableSecure SDLC practices
8.26Application security requirements✅ ApplicableSecurity requirements in development
8.27Secure system architecture and engineering principles✅ ApplicableSecurity by design principles
8.28Secure coding✅ ApplicableSecure coding standards and practices
8.29Security testing in development and acceptance✅ ApplicableSecurity testing and code review
8.30Outsourced development✅ ApplicableThird-party development security requirements
8.31Separation of development, testing and operational environments✅ ApplicableEnvironment segregation
8.32Change management✅ ApplicableChange management procedures
8.33Test information✅ ApplicableTest data management and protection
8.34Protection of information systems during audit testing✅ ApplicableAudit testing security procedures

Risk Treatment Decisions

Controls Selected for Implementation

All applicable controls listed above have been selected for implementation based on:

  • Risk assessment results
  • Legal and regulatory requirements
  • Business requirements and objectives
  • Cost-benefit analysis

Controls Excluded from Implementation

Limited physical controls (7.1, 7.2, 7.3, 7.11, 7.12) are partially excluded as they relate to third-party data center facilities managed by cloud service providers (AWS, Azure, GCP). These are addressed through:

  • Cloud provider compliance certifications (SOC 2, ISO 27001)
  • Contractual security requirements
  • Regular vendor assessments

Additional Controls

Beyond ISO 27002:2022, ZanReal Labs has implemented additional controls:

  • AI-specific security controls for machine learning systems
  • Enhanced privacy controls for GDPR compliance
  • Advanced threat detection with behavioral analytics
  • Zero trust network architecture

Conclusion

This Statement of Applicability demonstrates ZanReal Labs' comprehensive approach to information security control implementation. All applicable ISO 27002:2022 controls have been implemented or are in the process of implementation, with appropriate justifications for any exclusions.

Regular reviews of this SoA will be conducted as part of the ISMS management review process to ensure continued relevance and effectiveness.


Previous Versions

The previous versions of our Policies and other documents can be seen at GitHub