Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IP Detecting...
View Dashboard
Information Security Policy | Dead Simple Computing

Information Security Policy

Dead Simple Computing Ltd

Reference: DSC-ISMS-POL-001
Version: 2.0
Effective: December 2025
Review: December 2026

1 Introduction

Purpose

This policy establishes the information security requirements for Dead Simple Computing Ltd, trading as Dead Simple Computing and DSC - Cyber And Managed Services. It defines our commitment to protecting information assets and sets out the security principles, responsibilities, and controls that govern our operations.

This policy is aligned to guidance published by the National Cyber Security Centre (NCSC) and reflects current UK cyber security best practice.

Scope

This policy applies to all DSC employees, contractors, and third parties; all information assets owned by or entrusted to DSC; all systems, networks, and services operated by DSC; all customer environments and data; and all physical locations from which DSC operates.

Sectors Served

Defence and National Security Aerospace and Space Financial Services Education Public Sector Construction and Engineering

2 Data Classification

Level Description Examples
Public Information intended for public disclosure Website content, marketing materials
Internal Information for internal DSC use Internal procedures, staff communications
Confidential Sensitive business information Customer contracts, pricing, HR records
Restricted Highly sensitive, need-to-know only Customer credentials, security reports, defence data

Government Classification Alignment

Government Classification DSC Handling
OFFICIAL Handle as Confidential minimum
OFFICIAL-SENSITIVE Handle as Restricted with additional controls
SECRET / TOP SECRET DSC does not handle

3 Access Control

Principles

  • Least privilege: Users receive minimum access necessary for their role
  • Need-to-know: Access to sensitive information only when required
  • Segregation: Customer environments are logically separated
  • Defence in depth: Multiple layers of access control

Authentication

Password Requirements
  • Standard accounts: minimum 12 characters
  • Privileged/customer accounts: minimum 16 characters
  • Unique passwords per system, stored in approved password manager only
Multi-Factor Authentication

MFA required for: all DSC cloud services, all customer tenant access, remote access to DSC systems, and password manager access.

4 Cryptography

NCSC Approved Standards

Purpose Approved
Symmetric encryptionAES-128, AES-256
Asymmetric encryptionRSA-2048 minimum (RSA-3072/4096 preferred)
HashingSHA-256, SHA-384
Transport securityTLS 1.2, TLS 1.3

Not permitted: MD5, SHA-1, DES, 3DES, RC4, RSA-1024, TLS 1.0/1.1, SSL

5 Sector-Specific Requirements

Defence Sector
  • All data processed and stored in the United Kingdom only
  • Security clearances (SC, DV) obtained where required
  • Need-to-know strictly enforced
  • DEFCON and DCC compliance where applicable
Aerospace and Space
  • Export Control Act 2002 compliance
  • Enhanced controls for dual-use technology
  • Strict IP protection for designs and technical data
Sector Key Requirements
Financial ServicesFCA outsourcing requirements, PCI-DSS support, client confidentiality
EducationKCSIE safeguarding, enhanced DBS, pupil data protection, content filtering
Public SectorPSN requirements, FOI awareness, NHS DSPT support where applicable
Construction and EngineeringIP/CAD/BIM protection, project data security, export controls

6 Vulnerability Management

Severity Remediation
Critical/HighWithin 14 days (Cyber Essentials requirement)
MediumWithin 30 days
LowWithin 90 days

7 NCSC Alignment

10 Steps to Cyber Security

NCSC Step Policy Coverage
Risk managementRisk Management section
Engagement and trainingPersonnel Security section
Asset managementAsset Management section
Architecture and configurationNetwork and Endpoint Security sections
Vulnerability managementVulnerability Management section
Identity and access managementAccess Control section
Data securityClassification, Credentials, Cryptography sections
Logging and monitoringRemote Access, Incident Management sections
Incident managementIncident Management section
Supply chain securitySupplier Security section

Cyber Essentials Controls

Control Implementation
FirewallsBoundary firewalls with restrictive rule sets
Secure configurationStandard secure configurations and hardening
User access controlLeast privilege, unique accounts, access reviews
Malware protectionEDR/antimalware on all endpoints
Patch management14-day critical/high, 30-day medium
Certification

Cyber Essentials Plus
Certificate: 0e54f576-13f7-426b-a4a6-d2994fd8b66a
Valid until: 17 November 2026

8 Security Metrics

Metric Target Frequency
Cyber Essentials Plus certificationMaintainedAnnual
Security incidents affecting customersZeroOngoing
Leaver access revocationWithin 24 hoursPer event
High-privilege credential review100% reviewedQuarterly
Security awareness training100% completionAnnual
Critical vulnerability remediationWithin 14 daysPer event
Access reviews completed100%Quarterly

Approved by

Daniel McClure Fisher

Director, Dead Simple Computing Ltd

December 2025