Application & Data Governance Policy


Document Number: ISMS-POL-ADG-01

Classification: L1 — Policy (Domain)

Version: 0.1.3

Effective Date: March 1, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the security governance framework for approved applications and data handling within the Cybercraft operational environment.

While Supplier & Third-Party Security Policy (ISMS-POL-STP-01) governs whether a tool may be adopted (supplier evaluation), this policy governs how approved tools are securely operated — including account management, data context isolation, identity governance, and AI data sovereignty.

🎯
Scope Distinction:
  • P5 (Supplier): "Can this tool be adopted?" — Supplier evaluation, contract review, risk classification
  • P3 (This Policy): "How do we securely operate approved tools?" — Account management, data isolation, AI sovereignty
  • P2 §7 (BYOD): "How is access granted from BYOD devices?" — Access path and method controls (e.g., via Managed Edge)
P-Numbering Reference: The P1–P9 abbreviations used in this document are defined in the Domain Policy Index at Information Security Policy (ISMS-POL-ISP-01) §5.1.

2. Scope

2.1 Applicable Systems

2.2 Applicable Users

2.3 Out of Scope


3. Data Context Isolation

3.1 Core Principle

🔐
"The nature (Context) of the data determines the account."

Users must select a physically and logically separated account environment based on the ownership and sensitivity of the data they intend to process.

3.2 Context Definitions

ContextDefinitionAccount UsedData Scope
CorporateActivities that create, access, or process official corporate information assetsCorporate AccountPolicy documents, customer data, source code, internal strategy, contracts, etc.
PersonalPersonal research, learning, and activities based on publicly available materialsPersonal AccountPersonal research notes, analysis of public materials, learning resources, etc.

3.3 Core Directive

"Personal accounts are to be used exclusively for personal research and work based on publicly available materials. Official corporate information assets must be handled using corporate accounts on authorised dedicated systems, maintaining complete separation of data contexts between the two."

3.4 Isolation Rules

  1. Corporate information assets must only be created, stored, and processed within the Corporate Context
  2. Entering or storing internal source code, customer personally identifiable information (PII), or undisclosed strategic assets within the Personal Context is prohibited
  3. When both Corporate and Personal accounts are used within the same app, data transfer between accounts (copy/paste, export/import) is prohibited
  4. Data ownership is determined by the account context — refer to BYOD Security Policy (ISMS-POL-BYOD-01) §6.3

3.5 Alignment with M365 Teams Channel Structure

The Data Context Isolation principle is implemented in the M365 environment through Teams team types and channel structures:

Core Principle: The Context separation (Corporate vs Personal) defined in this policy forms the primary boundary, while the channel classification (General vs Confidential) in the M365 policy forms the secondary boundary. The two boundaries are independent and apply simultaneously.

4. Application Governance Matrix

4.1 Governance Matrix

All approved applications require users to select accounts according to their business context, with assets protected through technical controls.

Service CategoryTarget ServicesAccount PolicyTechnical Controls
Core InfrastructureMicrosoft 365Corporate OnlyIDP-based authentication, ADUE (Azure AD User Enrolment), CA (Conditional Access)/MAM — Governed by P1
Generative AIClaude, Gemini, etc.Corporate / Personal SeparationData training opt-out guaranteed, access via Managed Browser session
Knowledge ManagementNotion, etc.Corporate / Personal SeparationData isolation, restriction on moving internal assets externally
Development AssetsGitHub, etc.Corporate / Personal SeparationMandatory 2FA (two-factor authentication), device compliance verification
Design AssetsFigma, Adobe, etc.Corporate / Personal SeparationFederated authentication and invite management
Collaboration / FinanceSlack, Xero, etc.Corporate OnlySession expiry policy, IP access restriction (where available)

4.2 Matrix Management


5. Identity Governance

5.1 Single Source of Trust

5.2 Federation Principles

5.3 Identity Sprawl Prevention

5.4 Collaboration Partner Access


6. AI Data Sovereignty

6.1 Core Principle

🤖
Preventing the leakage and retraining of corporate data when using AI services is the top priority. AI processing of corporate assets must only be conducted in environments where training exclusion is contractually guaranteed.

6.2 AI Use in Corporate Context

When entering corporate information assets into AI services:

  1. Must be performed under a subscription of Enterprise/Team Plan or higher
  2. Only use services where training opt-out is contractually guaranteed — refer to P5 §3.3
  3. Access must be via an ADUE (Azure AD User Enrolment) Managed Browser (Edge) session
  4. Input data must be reviewed in advance to ensure it does not contain customer PII (personally identifiable information), undisclosed strategic assets, or credentials

6.3 AI Use in Personal Context

When using AI for personal research activities:

  1. Use a Personal Account, fully separated from the Corporate Context to prevent contamination of corporate logs
  2. The following inputs are prohibited under any circumstances:
      • Internal corporate source code
      • Customer PII (personally identifiable information)
      • Undisclosed strategic assets, contract content, or financial data
  3. When bringing outputs from personal AI activities into the Corporate Context, they must be reproduced as corporate assets (rewritten under the corporate account); direct copying of AI output from a personal account is not permitted

6.4 Handling AI Output


7. Technical Baseline

Current control level under Cybercraft's COM Profile:

Refer to Information Security Policy (ISMS-POL-ISP-01) §2.4 for the Profile framework and transition criteria.

8. Roles and Responsibilities

RolePersonResponsibilities
CISORichardPolicy approval, approval of high-risk app operational policies, approval of exceptions related to AI data sovereignty
Security DirectorLucasGovernance Matrix management, account separation auditing, identity sprawl review, AI usage monitoring, Profile roadmap execution
End UserAll usersAdherence to account separation principles, maintaining Context separation when using AI, refraining from use of unapproved apps, reporting anomalies

9. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.10Acceptable use of information and assetsSection 3 (Data Context Isolation) + Section 4 (Governance Matrix)
A.5.12Classification of informationSection 3.2 (Context Definitions — Corporate vs Personal)
A.5.15Access controlSection 5 (Identity Governance — SSO, Federation, Sprawl Prevention)
A.5.16Identity managementSection 5.1 (Single Source of Trust) + Section 5.3 (Identity Sprawl Prevention)
A.5.23Information security for use of cloud servicesSection 4 (Governance Matrix) + Section 6 (AI Data Sovereignty)
A.8.11Data maskingSection 6.2 (PII pre-screening prior to Corporate AI use)
A.8.12Data leakage preventionSection 3.4 (Isolation Rules) + Section 6 (AI Data Sovereignty)

10. Document Control

VersionDateAuthorChanges
0.1.02026-02-20Lucas ShinInitial release — Data Context Isolation principle, Application Governance Matrix, ID Governance (SSO/Federation/Sprawl), AI Data Sovereignty, Technical Roadmap (Tier 1/2). Derived from Security Standards Framework EXT-03 cross-mapping analysis.
0.1.12026-02-20Lucas ShinL2 policy reordering (renumbered). Updated all cross-reference document numbers and P-numbering to reflect new scheme.
0.1.22026-02-20Lucas ShinReplaced legacy "Tier 1/Tier 2" terminology with "COM/DEF Profile" to align with updated Security Standards Framework.
0.1.32026-03-01Lucas ShinAdded §3.5 Alignment with M365 Teams Channel Structure — cross-reference between Data Context Isolation and Teams team types/channel structure. Phase 2–5 ISMS document mapping.