Statement of Applicability (SoA)

Document ID: ISMS-POL-005
Version: 1.0
Effective Date: December 29, 2025
Review Date: December 29, 2026
Classification: Internal

1. Purpose#

This Statement of Applicability (SoA) documents the ISO/IEC 27001:2022 Annex A controls applicable to anonym.legal, their implementation status, and justification for inclusion or exclusion.

2. Scope#

This SoA covers all information security controls relevant to the anonym.legal PII anonymization platform, including:

  • Cloud-hosted infrastructure (Hetzner)
  • Web application (web framework frontend)
  • Backend services (Presidio Analyzer/Anonymizer)
  • Database (relational database)
  • Customer data processing

3. Control Selection Methodology#

Controls were selected based on:

  • Risk assessment results
  • Legal and regulatory requirements (GDPR)
  • Business requirements
  • Customer expectations
  • Industry best practices

4. Control Categories Overview#

CategoryTotal ControlsApplicableImplementedPartialNot Applicable
A.5 Organizational372520512
A.6 People86422
A.7 Physical145509
A.8 Technological34302824
Total936657927

5. Detailed Control Status#

A.5 Organizational Controls#

ControlTitleApplicableStatusJustification
A.5.1Policies for information securityImplementedInformation Security Policy documented
A.5.2Information security rolesImplementedRoles defined in RBAC system
A.5.3Segregation of dutiesImplementedAdmin/Editor/User role separation
A.5.4Management responsibilitiesImplementedDocumented in policies
A.5.5Contact with authoritiesPartialGDPR contacts identified
A.5.6Contact with special interest groupsN/ASmall organization
A.5.7Threat intelligencePartialnpm audit, security advisories
A.5.8Information security in project managementImplementedSecurity in development process
A.5.9Inventory of informationImplementedAsset inventory documented
A.5.10Acceptable use of informationImplementedTerms of Service, policies
A.5.11Return of assetsN/ASaaS model, no physical assets
A.5.12Classification of informationImplementedData classification defined
A.5.13Labelling of informationN/AAutomated system handling
A.5.14Information transferImplementedTLS encryption, secure APIs
A.5.15Access controlImplementedRBAC, plan-based gating
A.5.16Identity managementImplementedNextAuth.js, JWT sessions
A.5.17Authentication informationImplementedPassword policy, 2FA
A.5.18Access rightsImplementedRole-based permissions
A.5.19Information security in supplier relationshipsPartialHetzner, Stripe reviewed
A.5.20Addressing security in supplier agreementsPartialStandard agreements
A.5.21Managing information security in ICT supply chainImplementedDependency management
A.5.22Monitoring, review of supplier servicesPartialUptime monitoring
A.5.23Information security for cloud servicesImplementedHetzner security config
A.5.24Information security incident managementImplementedIncident Response Plan
A.5.25Assessment and decision on eventsImplementedSeverity classification
A.5.26Response to information security incidentsImplementedResponse procedures
A.5.27Learning from incidentsImplementedPost-incident review
A.5.28Collection of evidenceImplementedLog retention, audit trails
A.5.29Information security during disruptionImplementedBackup/recovery procedures
A.5.30ICT readiness for business continuityImplementedHetzner snapshots
A.5.31Legal, statutory, regulatory requirementsImplementedGDPR compliance
A.5.32Intellectual property rightsImplementedLicense compliance
A.5.33Protection of recordsImplementedData retention policy
A.5.34Privacy and protection of PIIImplementedCore business function
A.5.35Independent review of information securityN/ASmall organization
A.5.36Compliance with security policiesImplementedAutomated enforcement
A.5.37Documented operating proceduresImplementedDocumentation in docs/

A.6 People Controls#

ControlTitleApplicableStatusJustification
A.6.1ScreeningN/ASolo/small team
A.6.2Terms and conditions of employmentN/ASolo/small team
A.6.3Information security awarenessPartialSelf-awareness
A.6.4Disciplinary processN/ASolo/small team
A.6.5Responsibilities after terminationImplementedCredential revocation
A.6.6Confidentiality agreementsImplementedCustomer agreements
A.6.7Remote workingImplementedSecure remote access
A.6.8Information security event reportingImplementedIncident reporting

A.7 Physical Controls#

ControlTitleApplicableStatusJustification
A.7.1Physical security perimetersImplementedHetzner data centers
A.7.2Physical entryImplementedHetzner controlled
A.7.3Securing offices, rooms, facilitiesN/ACloud-only
A.7.4Physical security monitoringImplementedHetzner monitoring
A.7.5Protecting against physical threatsImplementedHetzner facilities
A.7.6Working in secure areasN/ACloud-only
A.7.7Clear desk and clear screenN/ARemote work
A.7.8Equipment siting and protectionImplementedHetzner data centers
A.7.9Security of assets off-premisesN/ACloud-only
A.7.10Storage mediaN/ANo physical media
A.7.11Supporting utilitiesN/AHetzner managed
A.7.12Cabling securityN/AHetzner managed
A.7.13Equipment maintenanceN/AHetzner managed
A.7.14Secure disposal or re-useN/AHetzner managed

A.8 Technological Controls#

ControlTitleApplicableStatusJustification
A.8.1User endpoint devicesN/ASaaS, no managed endpoints
A.8.2Privileged access rightsImplementedAdmin role, SSH keys
A.8.3Information access restrictionImplementedRBAC, feature gating
A.8.4Access to source codeImplementedPrivate repository
A.8.5Secure authenticationImplementedPassword policy, 2FA
A.8.6Capacity managementImplementedHetzner scalable
A.8.7Protection against malwareImplementedServer hardening
A.8.8Management of technical vulnerabilitiesImplementednpm audit, updates
A.8.9Configuration managementImplementedInfrastructure as code
A.8.10Information deletionImplementedData deletion procedures
A.8.11Data maskingImplementedCore business function
A.8.12Data leakage preventionImplementedEncryption, access control
A.8.13Information backupImplementedHetzner snapshots
A.8.14Redundancy of information processingPartialSingle server (cost)
A.8.15LoggingImplementedApplication/system logs
A.8.16Monitoring activitiesImplementedUptime, error tracking
A.8.17Clock synchronizationImplementedNTP configured
A.8.18Use of privileged utility programsImplementedRestricted to admin
A.8.19Installation of softwareImplementedControlled deployment
A.8.20Networks securityImplementedFirewall, brute force protection
A.8.21Security of network servicesImplementedTLS, secure protocols
A.8.22Segregation of networksPartialApplication isolation
A.8.23Web filteringN/AServer-side only
A.8.24Use of cryptographyImplementedAES-256-GCM, TLS
A.8.25Secure development life cycleImplementedCode review, testing
A.8.26Application security requirementsImplementedSecurity in design
A.8.27Secure system architectureImplementedDefense in depth
A.8.28Secure codingImplementedBest practices, linting
A.8.29Security testing in developmentImplementedUnit testing, end-to-end testing, audit
A.8.30Outsourced developmentN/AIn-house development
A.8.31Separation of development, test, productionPartialStaging environment
A.8.32Change managementImplementedVersion control, changelog
A.8.33Test informationImplementedMock data for tests
A.8.34Protection during audit testingImplementedIsolated test environment

6. Exclusion Justifications#

Physical Controls (A.7.3, A.7.6, A.7.7, A.7.9-A.7.14)#

Justification: anonym.legal is a cloud-only SaaS platform hosted on Hetzner Cloud. Physical security is managed by Hetzner (ISO 27001 certified data centers). No physical premises or equipment are maintained.

People Controls (A.6.1, A.6.2, A.6.4)#

Justification: Small team/solo operation. Formal HR processes not applicable at current scale.

Endpoint Controls (A.8.1, A.8.23)#

Justification: SaaS model where customers use their own devices. No managed endpoints.

Outsourced Development (A.8.30)#

Justification: All development is performed in-house.

7. Implementation Evidence#

Control CategoryEvidence Location
Policiesdocs/iso27001/
Access Controllib/roles.ts, lib/plan-features.ts
Authenticationlib/auth.ts, lib/auth/two-factor.ts
Encryptionlib/encryption.ts
LoggingApplication logs, journalctl
Testingtests/ directory
Change Managementdocs/CHANGELOG.md
Configurationapp.config.js, web server configs

8. Continuous Improvement#

Planned Improvements#

ControlCurrent StatusTarget StatusTimeline
A.5.35N/AConsider external auditQ2 2026
A.8.14PartialFull redundancyQ3 2026
A.8.22PartialFull network segmentationQ2 2026

9. Document Control#

VersionDateAuthorChanges
1.02025-12-29Security TeamInitial release