Cybersecurity Policy

Good Stewards Holdings Inc. is committed to protecting your data and maintaining the highest standards of cybersecurity. This policy outlines our comprehensive approach to securing systems, networks, and user information.

Effective Date: April 15, 2026
Version: 1.1
Last Updated: April 15, 2026
🔐

Data Protection

AES-256 encryption for all sensitive data at rest and in transit. Multi-factor authentication on all accounts.

🛡️

Threat Detection

Real-time antivirus, intrusion detection, and endpoint protection across all systems and workstations.

Rapid Response

4-hour recovery time, 24/7 incident response, and continuous security auditing and compliance.

1. Purpose & Scope

This Cybersecurity Policy establishes minimum standards for protecting information assets, systems, and data of Good Stewards Holdings Inc. and our users. It applies to all employees, contractors, third-party service providers, systems, networks, and applications.

2. Data Classification and Handling

We classify data into PUBLIC, INTERNAL, CONFIDENTIAL, and RESTRICTED categories, with corresponding protection requirements. RESTRICTED and CONFIDENTIAL data is encrypted in transit and at rest, with access restricted to authorized personnel only. Data is retained only as long as required by law or business need and disposed of securely.

3. Access Control and Privileged Access Management

We implement the Principle of Least Privilege, granting users only the minimum access necessary for their role. All user accounts require multi-factor authentication (MFA). Privileged accounts are monitored, recorded, and audited. Access is reviewed quarterly and revoked immediately upon termination.

4. Encryption of Data at Rest and in Transit

All RESTRICTED and CONFIDENTIAL data is encrypted with AES-256 encryption. Data in transit uses TLS 1.2 or higher. Encryption keys are managed in a centralized Key Management Service with restricted access and annual rotation. Full-disk encryption is enabled on all corporate devices.

5. Vulnerability Management and Patch Management

We identify vulnerabilities through automated scanning, penetration testing, and code review. Vulnerabilities are assessed using CVSS scoring and remediated based on severity: Critical (24 hours), High (7 days), Medium (30 days), Low (90 days). All systems receive security patches within 14 days of release.

6. Incident Response and Disaster Recovery

Our incident response team follows established procedures for detection, containment, investigation, and recovery. We maintain Recovery Time Objective (RTO) of 4 hours and Recovery Point Objective (RPO) of 15 minutes. Daily backups are encrypted and stored in geographically separated locations. Disaster recovery is tested quarterly.

7. Physical Security

Data centers in secure facilities (AWS, Google Cloud) have restricted access with authentication, visitor logs, environmental controls, fire suppression, and CCTV monitoring. Office physical security includes access cards, visitor badges, clean desk policy, and emergency procedures.

8. Endpoint Protection

Production servers run ClamAV antivirus with real-time scanning, OSSEC intrusion detection, and file integrity monitoring. Corporate workstations use Endpoint Detection & Response (EDR) solutions with continuous monitoring. All devices have application whitelisting, USB restrictions, and mobile device management enrollment.

9. Vendor Risk Management

Vendors are assessed for security maturity before engagement and required to sign our Data Processing Agreement. We verify security certifications (ISO 27001, SOC 2), conduct audits every 2 years for high-risk vendors, and require immediate notification of security incidents.

10. Security Awareness & Training

All employees complete mandatory security training annually, covering password management, phishing, data handling, incident reporting, and privacy requirements. New hires train during onboarding. Monthly security tips and quarterly phishing simulations reinforce awareness.

11. Compliance & Auditing

We comply with GDPR, CCPA, state privacy laws, and financial regulations. We conduct annual security assessments, quarterly vulnerability scans, annual penetration testing, and annual SOC 2 audits. External audits verify compliance with security standards.

Our Security Commitments

24 hrs

Critical vulnerabilities patched

4 hrs

Recovery time objective (RTO)

AES-256

Military-grade data encryption

Annual

Penetration testing & audits

For the complete policy document with detailed procedures and technical specifications:

Download Full Policy (PDF)

Questions About Security?

General Questions

For questions about our security practices and this policy:

security@goodstewards.app

Report a Security Issue

For security vulnerabilities or incidents (24/7):

security-incident@goodstewards.app

© 2026 Good Stewards Holdings Inc. All rights reserved.

Trust & Security · Terms of Service · Privacy Policy