Our approach to information security management aligned with ISO 27001 standards.
Tax Sahayogi is committed to establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS) aligned with the ISO/IEC 27001:2022 standard. As an AI-powered tax copilot handling sensitive financial data for Chartered Accountants, we recognise that robust information security is essential to earning and maintaining the trust of our users.
We are actively pursuing ISO 27001 certification and have implemented controls and processes consistent with the standard's requirements. Our ISMS framework provides a systematic approach to managing sensitive information, ensuring its confidentiality, integrity, and availability.
Our ISMS is built on a risk-based approach that identifies, assesses, and mitigates information security risks across all aspects of our operations.
We have implemented controls aligned with the ISO 27001 Annex A domains. The following outlines the key areas addressed:
We maintain a comprehensive set of information security policies that are approved by management, communicated to all relevant personnel, and reviewed at planned intervals. These policies establish the direction and principles for information security across the organisation.
Roles and responsibilities for information security are clearly defined and assigned. We have established an internal security governance structure with designated security personnel responsible for overseeing ISMS implementation and compliance.
All information assets are identified, classified, and protected according to their sensitivity and criticality. We maintain an up-to-date asset inventory and apply appropriate handling procedures for each classification level.
Access to information systems and data is restricted on a need-to-know basis using role-based access controls (RBAC). We enforce strong authentication mechanisms, conduct regular access reviews, and promptly revoke access when it is no longer required.
We employ strong cryptographic controls to protect the confidentiality and integrity of sensitive data. This includes AES-256 encryption at rest, TLS 1.2+ for data in transit, and secure key management through Azure Key Vault.
Operational procedures are documented and made available to all personnel who need them. Key controls include:
Network security is managed through Azure Virtual Network isolation, network segmentation, and web application firewalls. All external communications are encrypted, and we enforce strict controls on information transfer.
Security requirements are integrated into every phase of our software development lifecycle. We conduct code reviews, automated security testing, and vulnerability assessments as part of our development and deployment processes.
We identify and comply with all applicable legal, regulatory, and contractual requirements, including the Digital Personal Data Protection Act, 2023, and GDPR where applicable. Regular compliance reviews ensure ongoing adherence.
We conduct regular risk assessments to identify and evaluate threats to our information assets and the personal data we process.
Our people are a critical part of our security posture. We invest in ensuring that all team members understand and fulfil their security responsibilities.
We carefully evaluate and manage the security practices of our suppliers and service providers.
We are committed to the ongoing improvement of our information security practices.
If you have questions about our ISO 27001 commitment or information security practices, please contact us: