Information Security Program Overview and Governance
ISO 27001:2022, ISO 27701:2019 and ISO 22301:2019 Certified
Cyber Essentials and IASME Cyber Assurance Certified
Systems and data are protected by a comprehensive ISO 27001:2022, ISO 27701:2019, and ISO 22301:2019 certified security program and framework that supports:
- Cybersecurity Maturity Model Certification (CMMC)
- EU General Data Protection Regulation (GDPR)
- United States privacy regulations such as California Privacy Rights Act (CPRA) and Virginia Consumer Data Protection Act (VCDPA)
- American Bar Association’s Formal Opinion 477R for Securing Communication of Protected Client Information
- United Kingdom privacy regulations
- China privacy regulations
Dedicated security, privacy, information governance, and compliance professionals maintain the program with oversight provided by senior management through Cooley’s internal Information Security and Privacy Forum. The Information Security Forum conducts an annual risk assessment, reviews risks regularly and tracks risks using a process compliant with ISO 31000. The following policies govern the program:
Acceptable Use Policies | Security Policies |
Access | Asset & Risk Management |
Passwords | Human Resource Security |
Mobile Device/BYOD | Awareness & Education |
Remote Access | Physical and Environmental Security |
Electronic Communications | Operational Security |
Internet Usage | Privileged Account Management |
Data and Information | Vendor/Supplier Management/Onboarding & Monitoring |
Media Handling | Security and Privacy Incident Management |
Software and Application use | Encryption |
Change Management | |
Business Continuity / Disaster Recovery |
Audit
The firm is audited annually, both through an independent internal audit function and through a certifying body, under the ISO 27001:2022, ISO 27701:2019 and ISO 22301:2019 frameworks. Additionally, the firm regularly monitors and audits its security and information governance people, processes, and controls to ensure compliance with policies and applicable security and privacy standards. The firm conducts an independent external penetration test annually and regularly scans its external and internal network for vulnerabilities. The firm’s security program is regularly audited by its clients.
Architecture
The firm maintains its systems and data in hardened SOC 2 Type 2 certified datacenters. Data and systems are replicated and backed up to secondary datacenters. Systems are securely designed, and all systems are reviewed by the security team before being put into production.
Perimeter Security
The firm protects data, servers, and endpoints on the network using a variety of best-of-breed security controls, including next generation firewalls, web filtering gateways, email gateways, honeypots, IDS/IPS, and targeted attack protection. This allows the firm to block access to suspicious and malicious sites, IP’s, emails, and attachments. Targeted attack protection is used to find and mitigate zero-day attacks through email by using URL rewrites, attachment sandboxing, and email recalling.
Data Controls
Client data is classified, protected according to its classification, encrypted at rest and in transit, logically separated and access granted to authorized users only. File integrity monitoring systems log and monitor access to data while data loss prevention systems control the movement of data inside and outside of the firm.
Access Controls
Access and processing capabilities are limited to authorized users from authorized devices. A unique user ID with a complex password that rotates every 120 days is assigned to every authorized user and is required to login. Remote access requires 2-factor authentication using tokens that randomly re-generate every 60 seconds. Privileged system credentials are stored, managed, and tracked in a privileged account management system.
Endpoint Security
All workstations and mobile devices are encrypted with whole disk encryption and require a password, pin, or biometrics to access. Workstation inventories, software deployment, and security policies are controlled through Microsoft’s SCCM. Only authorized software can be installed through the firm’s software library. All mobile devices require registration with the firm’s mobile device management system. Workstations and servers are protected with advanced endpoint protection, which uses AI to assist in combating threats. Portable workstations left unattended in Cooley offices are physically secured.
Incident Response
The firm’s Security Incident Response Plan dictates all security events be evaluated and escalated when appropriate. A security information and event management (SIEM) system maintains and analyzes all security logs. Logs are regularly reviewed for suspicious activity and unusual behavior by dedicated security personnel. Memberships with the International Legal Technology Association (ILTA), Legal Services Information Sharing and Analysis Organization (LS-ISAO) and FBI InfraGard, along with close working relationships with law enforcement, provide additional threat intelligence and analysis. The firm has cyber insurance.
Business Continuity & Disaster Recovery
The firm has a business continuity & disaster recovery plan that is regularly tested. Firm and client information is protected by high availability systems, backup services, data replication, and redundant co-located, geographically dispersed datacenters.
Awareness and Education
Employees are required to attend annual security awareness training. Monthly newsletters and, when warranted, security alerts reinforce awareness and education through the year.
Vendor Management
The security team assesses all vendors against a series of criteria based on the ISO 27001:2022 standard and CIS Critical Security Controls before granting a vendor system access or placing systems into operation. Each vendor undergoes a privacy impact assessment, and all contracts and data processing agreements are reviewed by attorneys before execution. Vendors are only granted access to the information required to perform their duties under the agreed upon statement of work. A vendor access management system controls and logs all vendor access to firm systems and data.