Skip to main content
The Statement of Applicability (SoA) is a required ISO 27001 document that lists every Annex A control, states whether it applies to our ISMS, records the implementation status, and points to the evidence. This page is the public summary; the full SoA (with sensitive evidence paths) is available under NDA.
Last reviewed: April 2026 · Version: 0.9 (draft, targeted GA Q2 2026) · Owner: Security Officer

Scope of the ISMS

The Denialbase Information Security Management System (ISMS) covers:
  • The Denialbase SaaS platform — production, staging, and development environments.
  • All customer PHI and operational data processed by Denialbase.
  • All Denialbase workforce members (employees, contractors, consultants).
  • All subprocessors that may touch Denialbase customer data (see Subprocessors).
  • Denialbase corporate systems that support the above (GitHub, GCP, Google Workspace, 1Password).

Applicability summary

Annex A clauseTitleApplicableImplementedEvidence
5 — Organizational controls (37 controls)
A.5.1Policies for information securityPartialISP — draft Q2 2026
A.5.2Information security roles & responsibilitiesPartialISP — roles
A.5.3Segregation of dutiesYesChange management
A.5.4Management responsibilitiesPartialManagement review — program starting Q2 2026
A.5.5Contact with authoritiesPartialIncident response
A.5.6Contact with special interest groupsPartialNot formalized
A.5.7Threat intelligencePartialSentry, GCP Security Command Center, CVE monitoring
A.5.8Information security in project managementYesChange management, secure SDLC in CI
A.5.9Inventory of information and other associated assetsPartialAsset inventory — target Q2 2026
A.5.10Acceptable use of information and other associated assetsPartialAUP — draft Q2 2026
A.5.11Return of assetsPartialHR security — offboarding
A.5.12Classification of informationPartialData classification policy
A.5.13Labelling of informationPartialData classification policy — labeling
A.5.14Information transferYesTLS in transit, PHI-scrubbed egress — see Network security
A.5.15Access controlYesAccess control policy
A.5.16Identity managementYesAuthentication
A.5.17Authentication informationYesGCP Secret Manager, no plaintext secrets — Cryptography
A.5.18Access rightsYesPundit RBAC + IAM + Access control
A.5.19Information security in supplier relationshipsPartialVendor management; BAAs in progress
A.5.20Addressing information security within supplier agreementsPartialStandard DPA/BAA templates — see BAA
A.5.21Managing information security in the ICT supply chainPartialDependency scanning (Dependabot, bundler-audit, npm audit)
A.5.22Monitoring, review and change management of supplier servicesPartialVendor management — annual review
A.5.23Information security for use of cloud servicesYesGCP hardened per CIS benchmarks; private VPC; CMEK
A.5.24Information security incident management planningPartialIncident response — formal IRP Q2 2026
A.5.25Assessment and decision on information security eventsYesAlert triage + severity matrix
A.5.26Response to information security incidentsPartialIR — response phases
A.5.27Learning from information security incidentsPartialBlameless post-mortem process
A.5.28Collection of evidenceYesAudit logs with 7-year retention, immutable Cloud Logging sink
A.5.29Information security during disruptionPartialDR, BC
A.5.30ICT readiness for business continuityPartialMulti-region backups; first drill Q2 2026
A.5.31Legal, statutory, regulatory and contractual requirementsYesHIPAA, state breach laws, ERISA, ACA — tracked
A.5.32Intellectual property rightsYeslicense_finder in CI; OSS license policy
A.5.33Protection of recordsYesAudit log integrity + retention
A.5.34Privacy and protection of PIIYesHIPAA, PHI minimization, encryption
A.5.35Independent review of information securityPartialInternal audit program launching Q2 2026
A.5.36Compliance with policies, rules and standardsPartialBeing formalized as part of internal audit program
A.5.37Documented operating proceduresPartialRunbooks in /docs; being migrated to Trust Center
6 — People controls (8 controls)
A.6.1ScreeningYesBackground checks for all production-access personnel
A.6.2Terms and conditions of employmentYesEmployment agreements with confidentiality clauses
A.6.3Information security awareness, education and trainingPartialSecurity awareness — annual training
A.6.4Disciplinary processYesAUP — enforcement
A.6.5Responsibilities after termination or change of employmentYesHR security — offboarding
A.6.6Confidentiality or non-disclosure agreementsYesNDAs required; mutual NDAs for customer conversations
A.6.7Remote workingYesAUP — remote work
A.6.8Information security event reportingYessecurity@denialbase.com; anonymized reporting channel
7 — Physical controls (14 controls)
A.7.1Physical security perimetersInheritedGCP data centers — GCP physical security
A.7.2Physical entryInheritedGCP data centers
A.7.3Securing offices, rooms and facilitiesN/AFully remote — no Denialbase offices
A.7.4Physical security monitoringInheritedGCP data centers
A.7.5Protecting against physical and environmental threatsInheritedGCP multi-region; disaster resilience
A.7.6Working in secure areasN/ANo physical secure areas
A.7.7Clear desk and clear screenYesAUP — devices
A.7.8Equipment siting and protectionInheritedGCP
A.7.9Security of assets off-premisesYesMDM + full-disk encryption + auto-lock
A.7.10Storage mediaYesAUP — devices — no removable media for customer data
A.7.11Supporting utilitiesInheritedGCP
A.7.12Cabling securityInheritedGCP
A.7.13Equipment maintenanceYesManaged workstation patching
A.7.14Secure disposal or re-use of equipmentYesCloud asset destruction per GCP; workstation wipe on offboarding
8 — Technological controls (34 controls)
A.8.1User endpoint devicesYesMDM, FDE, EDR, patching
A.8.2Privileged access rightsYesAccess control, just-in-time production access
A.8.3Information access restrictionYesPundit + IAM
A.8.4Access to source codeYesGitHub with enforced MFA + SSO
A.8.5Secure authenticationYesAuthentication
A.8.6Capacity managementYesCloud Run autoscaling + alerting
A.8.7Protection against malwareYesClamAV on uploads; EDR on workstations
A.8.8Management of technical vulnerabilitiesYesVulnerability management
A.8.9Configuration managementYesTerraform IaC, signed commits
A.8.10Information deletionYesUser#permanently_delete!, account/practice deletion flows
A.8.11Data maskingYesPHI masking in list views; logs PHI-scrubbed
A.8.12Data leakage preventionPartialNo endpoint DLP; egress limited, scrubbing in place
A.8.13Information backupYesDR — backups
A.8.14Redundancy of information processing facilitiesYesCloud Run multi-zone; Cloud SQL HA
A.8.15LoggingYesAudit logging
A.8.16Monitoring activitiesYesCloud Monitoring + Sentry + alerting
A.8.17Clock synchronizationYesGCP NTP, workstation NTP
A.8.18Use of privileged utility programsPartialBreak-glass logged; no broad sudo in prod
A.8.19Installation of software on operational systemsYesContainer images only; no ad-hoc installs
A.8.20Networks securityYesNetwork security
A.8.21Security of network servicesYesCloud Armor WAF; private VPC
A.8.22Segregation of networksYesVPC isolation between staging and prod
A.8.23Web filteringN/ANo employee web proxy (remote-first)
A.8.24Use of cryptographyYesCryptography policy
A.8.25Secure development life cycleYesChange management; SAST + tests + review
A.8.26Application security requirementsYesSecure SDLC, threat modeling for new features
A.8.27Secure system architecture and engineering principlesYesSecurity architecture
A.8.28Secure codingYesBrakeman, ESLint security, Trivy, gitleaks on every commit
A.8.29Security testing in development and acceptanceYes90% backend / 80% frontend test coverage; E2E
A.8.30Outsourced developmentN/ANo outsourced development
A.8.31Separation of development, test and production environmentsYesSeparate GCP projects; isolated data
A.8.32Change managementYesChange management policy
A.8.33Test informationYesSeed data only; no prod PHI in non-prod
A.8.34Protection of information systems during audit testingYesAudit access controls; read-only audit role
Totals: 93 applicable, 4 not applicable (N/A), out of 97 Annex A controls in ISO 27001:2022.

Implementation status summary

StatusCountMeaning
Yes53Control is fully implemented with evidence
Partial32Control is partially implemented; gaps tracked in Risk register
Inherited8Control is inherited from GCP; evidence via GCP SOC 2/ISO 27001 reports
N/A4Control doesn’t apply (remote-only, no physical sites, no outsourced dev)

Exclusions and rationale

Denialbase is a fully remote organization with no physical offices. Workforce security relies on managed workstations, secure home networks, and AUP — devices.
No physical secure areas to protect — see A.7.3 above.
No corporate network with employee web traffic to filter. DNS-level filtering is considered if workforce expands.
All product development is performed by Denialbase employees. No outsourced/offshore development. If this changes, the control will be applicable and tracked.

Review cadence

  • Monthly — control implementation status updated by Security Officer.
  • Quarterly — applicability reviewed with CTO for any scope changes.
  • Annually — full SoA refresh ahead of external audit; mapped to current version of ISO 27001.
  • Ad-hoc — any material architecture or vendor change triggers re-evaluation of affected controls.

How to request the full SoA

The internal SoA includes owner names, ticket links, specific evidence file paths, and private supplier evaluation records. Enterprise customers may request the full document under mutual NDA: security@denialbase.com.