Version: 1.1

Approved By: Richard D’Lonesteen

Created at: 12/10/2023

Purpose

The purpose of the Security Vulnerability Management Policy is to define the responsibilities and outline the procedures to identify, assess, mitigate, and monitor security vulnerabilities in our systems, applications, and services to protect the integrity, confidentiality, and availability of data managed by ChattyAI.

Scope

This policy applies to all employees, contractors, consultants, temporaries, and other workers at ChattyAI, including all personnel affiliated with third parties. This policy covers all software, hardware, and networks owned or employed by ChattyAI.

Definitions

Policy

Identification & Detection

  1. Automated Scanning: Regular automated vulnerability scans will be performed on all network devices, servers, endpoint devices, and applications.
  2. Manual Testing: Supplement automated scans with manual penetration testing conducted by qualified personnel or third-party services.
  3. Third-Party Reports: Regularly review security advisories and vulnerability alerts from vendors, industry groups, and governmental organizations.

Assessment & Prioritization

  1. Risk Assessment: Every identified vulnerability will be assessed to determine its impact and risk level based on:
  2. Vulnerability Classification: Vulnerabilities will be classified into categories such as critical, high, medium, and low, guiding the timeline and priority for response actions.

Remediation & Mitigation