Penligent Logo

Security Policy

Penligent Security Policy – NIST CSF Alignment

Version 1.0 — 15.9.2025

1. Purpose

This Security Policy outlines how Future Share LLC, the company behind Penligent, aligns its security practices with the NIST Cybersecurity Framework (CSF). By integrating the five core CSF functions—Identify, Protect, Detect, Respond, and Recover — into our product design and operations, we aim to help customers proactively strengthen cybersecurity defenses while maintaining transparency and accountability.

2. Scope

This policy applies to all Penligent systems, services, and processes, including product development, deployment options (SaaS, self-hosted, cloud-isolated), and customer support.

3. Alignment Principles

  • Proactive Security: We prioritize prevention over detection by integrating security controls into our product design and development.
  • Comprehensive Coverage: Address all five CSF functions in product and operational security.
  • Continuous Improvement: Adopt a Plan-Do-Check-Act (PDCA) cycle for ongoing security enhancements.
  • Risk-Driven: Prioritize security measures based on risk assessment and customer needs.
  • Transparent & Auditable: Provide customers and partners with confidence through evidence-based practices.

4. Alignment Overview

CSF FunctionCategoryCurrent StatusContinuous Improvement Plan
IdentifyAsset Management (ID.AM)ImplementedEnhance automated asset discovery
Risk Assessment (ID.RA)Partially ImplementedIntegrate quantitative risk assessment tools
ProtectAccess Control (PR.AC)ImplementedConduct monthly role-based access review
Data Security (PR.DS)Partially ImplementedUpgrade encryption libraries
DetectAnomalies & Events (DE.AE)ImplementedLaunch log correlation analytics platform
Continuous Monitoring (DE.CM)Partially ImplementedExpand monitoring to development environments
RespondResponse Planning (RS.RP)ImplementedIncrease tabletop exercises from biannual to quarterly
Communications (RS.CO)Partially ImplementedFormalize stakeholder notification procedures
RecoverRecovery Planning (RC.RP)ImplementedAdd off-site backup and restoration drills
Improvements (RC.IM)Partially ImplementedEstablish post-incident review closure process

5. Maturity Assessment

  • Current Tier: Tier 2 – Risk Informed. Processes are established but not fully institutionalized.
  • Target Tier: Tier 3 – Repeatable within 12 months, with policies standardized and externally auditable.

6. Roadmap

  • Technology Enhancements:Adopt advanced security monitoring and analytics solutions.
  • Process Institutionalization:Formalize internal/external security policies, increase training, and adopt quarterly review cycles.
  • Third-Party Validation: Engage independent security firms for external assessments and certifications (ISO 27001, SOC 2).

7. Conclusion

Penligent is designed to simulate advanced attacker techniques for authorized penetration testing while aligning with the NIST CSF. We remain committed to using NIST CSF as the foundation of our cybersecurityprogram, continually refining our controls and processes to deliver robust,transparent, and auditable security services.

For additional details or audit-related inquiries, please contact: [email protected].