ISO/IEC 27001

Daurada Prime – Security Appendix

ISO/IEC 27001

Effective date: December 23, 2025

This Security Appendix describes the information security controls implemented by Daurada Prime in alignment with the principles of ISO/IEC 27001 and ISO/IEC 27002.

Daurada Prime is not currently ISO/IEC 27001 certified, but maintains a security program informed by its requirements and is working toward full ISO/IEC 27001 compliance with a target date of March, 2025.

1. Information Security Governance

(ISO 27001: Clauses 4–7)

  • Information security is managed as an organizational responsibility.

  • Security roles and responsibilities are defined and reviewed periodically.

  • Security risks are identified and assessed as part of product and infrastructure design.

2. Risk Management

(ISO 27001 Clause 6)

  • Security risks are assessed using a qualitative risk-based approach.

  • Controls are selected based on likelihood, impact, and proportionality.

  • Risks related to availability, confidentiality, integrity, and compliance are considered.

3. Asset Management

(ISO 27002 A.5 & A.8)

  • Information assets (systems, data, code, credentials) are inventoried.

  • Customer Data is logically segregated within a multi-tenant architecture.

  • Access to production systems is restricted to authorized personnel.

4. Access Control

(ISO 27002 A.5, A.6, A.8)

  • Role-based access control (RBAC) is enforced.

  • Least-privilege principles are applied.

  • Administrative access requires strong authentication.

  • Access is revoked promptly upon role change or termination.

5. Cryptography and Data Protection

(ISO 27002 A.8 & A.10)

  • Data in transit is protected using industry-standard encryption (e.g., TLS).

  • Sensitive credentials and secrets are stored using managed secret stores.

  • Customer Data is not used for training AI models in identifiable form.

6. Secure Development Lifecycle

(ISO 27002 A.8 & A.14)

  • Security considerations are integrated into system design and development.

  • Code changes are reviewed prior to deployment.

  • Dependencies are tracked and updated as part of routine maintenance.

  • Test, staging, and production environments are logically separated.

7. Infrastructure and Operations Security

(ISO 27002 A.8 & A.12)

  • Production systems are hosted in reputable cloud environments.

  • Network access is restricted and monitored.

  • Logging is enabled for security-relevant events.

  • Backups are performed for critical systems.


8. Incident Management

(ISO 27002 A.5 & A.16)

  • Security incidents are logged, investigated, and remediated.

  • Personal Data Breaches are handled in accordance with the DPA.

  • Lessons learned are incorporated into preventive controls.

9. Business Continuity and Availability

(ISO 27002 A.17)

  • Service availability is addressed through redundancy and monitoring.

  • Backup and recovery procedures are in place for critical data.

  • Availability commitments are defined in the SLA.

10. Supplier and Sub-processor Security

(ISO 27002 A.5 & A.15)

  • Key suppliers and sub-processors are reviewed for security posture.

  • Sub-processors are contractually required to implement appropriate safeguards.

  • Changes to sub-processors are communicated as described in the DPA.

11. Data Privacy and GDPR Alignment

(ISO 27001 + GDPR Articles 25 & 32)

  • Data protection by design and by default is applied.

  • Personal Data is processed only on Customer instructions.

  • Data minimization and purpose limitation principles are followed.

12. AI Security and EU AI Act Forward-Compatibility

(ISO 23894 principles; AI Act readiness)

  • AI-assisted features operate in human-in-the-loop mode.

  • Outputs are advisory and non-binding.

  • No biometric identification, profiling, or social scoring is performed.

  • AI systems are monitored for bias, misuse, and unintended behavior.

  • Training data is anonymized and aggregated where used.

13. Compliance and Continuous Improvement

(ISO 27001 Clause 10)

  • Security controls are reviewed periodically.

  • Customer feedback, incidents, and audits inform improvements.

  • This appendix may evolve as standards and regulations change.

14. Customer Responsibilities

Customer is responsible for:

  • secure configuration of its accounts,

  • appropriate access management of its users,

  • lawful collection and use of Personal Data.

15. No Certification Claim

This Security Appendix:

  • does not represent an ISO/IEC 27001 certification,

  • does not create additional warranties,

  • is provided for transparency purposes only.

16. Precedence

In case of conflict:

  • the DPA governs Personal Data protection,

  • the SLA governs availability,

  • the Terms of Service govern all other matters.