Security Awareness Training Policy
Security Awareness Training Policy
| Field | Value |
|---|---|
| Document ID | POL-025 |
| Classification | Internal |
| Owner | CTO (interim CISO) |
| Effective Date | April 2026 |
| Review Cycle | Annual |
1. Purpose
People are the first and most frequently exploited layer of any security programme. This Policy commits Wealthy to an ongoing, mandatory security awareness training programme so every employee, contractor, and long-term vendor can recognise, resist, and report common threats β phishing, social engineering, credential misuse, data mishandling, and insider risk.
2. Scope
Applies to:
- Every full-time and part-time employee
- Contractors and interns with access to Wealthy systems, data, or infrastructure
- Long-term vendor staff with operational access (assessed per the Vendor Security Assessment Standard (STD-015))
3. Principles
- Mandatory on day one. Security awareness training is part of onboarding and must be completed before production access is granted.
- Annual refresher. Every person in scope completes a full refresher within 12 months of the last completion.
- Role-specific modules. Engineers get secure-SDLC training; finance and support get fraud-scenario training; privileged-access holders get an additional privileged-access module.
- Continuous reinforcement. Half-yearly phishing simulations plus ad-hoc campaigns (e.g. after a real phishing incident or when a new attack theme is trending), periodic tabletop exercises, and security-bulletin-style comms from security@wealthy.in.
- Measurable. Completion and phishing performance are tracked; gaps are followed up until closed.
- Regulation-aligned. The programme is designed to satisfy IRDAI Cyber Security Guidelines 2024, SEBI CSCRF, DPDP Act, and CERT-In expectations on human-layer controls.
4. Mandatory Programme
Structured as one annual Security Training Programme (calendar event T1) with a common track for everyone plus role-specific tracks for those who need them, delivered in a single session. Supplemented by half-yearly phishing simulations (T2). Ad-hoc sessions can be raised by CTO / Compliance at any time (post-incident retraining, new regulation rollout, major control change).
| Element | Audience | Cadence |
|---|---|---|
| Security Induction | All new joiners | Before production access |
| T1 β Security Training Programme (common track) β phishing, passwords, DPDP, incident reporting, device hardening | All in scope | Annual + ad-hoc |
| T1 β Role track: Engineering / DevOps β secure coding, secrets hygiene, supply-chain scanning | Engineering | Annual + ad-hoc |
| T1 β Role track: Finance / Support / Operations β fraud scenarios, partner impersonation | Finance, Support, Operations | Annual + ad-hoc |
| T1 β Role track: SRE / Security β IR runbook, threat hunting, DR drill walkthrough | SRE, Security | Annual + ad-hoc |
| T1 β Role track: Privileged-access holders β PAM hygiene, just-in-time elevation (per PAM Policy (POL-018)) | PAM holders | On elevation + annual + ad-hoc |
| T2 β Phishing Simulation | All in scope | Half-yearly + ad-hoc |
5. Reading Security Communications
Reading email from security@wealthy.in is mandatory for everyone in scope. Security bulletins, incident summaries, phishing-campaign reports, policy changes, and advisories are considered part of the awareness programme and failure to act on a clearly-worded operational instruction from security@wealthy.in is treated as a policy breach.
6. Metrics & Targets
Reported quarterly to ISRMC and annually to the Board:
| Metric | Target |
|---|---|
| Onboarding training completion within 7 days of joining | 100% |
| Annual refresher completion within grace window | β₯ 95% |
| Phishing-simulation click rate | < 5% (12-month rolling) |
| Repeat-offender rate (clicked β₯ 2 in 12 months) | < 1% |
| Privileged-access module completion | 100% |
Persistent non-completion triggers account-access suspension until remediated. If click rate or repeat-offender rate breaches target, the phishing-simulation cadence is raised from half-yearly until the target is restored.
Scheduled events (T1 annual programme, T2 half-yearly phishing) and their evidence flow are tracked in the Security Governance Calendar; ad-hoc training or drills can be raised by the CTO / Compliance at any time and are logged with the same training / phishing-sim GitHub Issue labels as the recurring ones. The concrete delivery stack (Google Classroom + Meet + Forms + Sheets + Gophish on a DevOps-run Mac) is described in the Security Training Operations SOP (SOP-011).
7. Regulatory Alignment
- IRDAI Cyber Security Guidelines 2024 β Intermediary cyber-awareness and training obligations.
- SEBI CSCRF β Awareness programme under “Governance” and “Identify/Protect” functions.
- DPDP Act 2023 β Data Processor staff privacy training.
- CERT-In Directions 2022 β Incident-reporting awareness at the human layer.
8. Roles & Responsibilities
| Role | Responsibility |
|---|---|
| CTO (interim CISO) | Programme ownership, annual sign-off, Board reporting |
| HR | Enforce onboarding completion as a gating step, track exits |
| People Team / L&D | Module delivery, LMS ownership, evidence retention |
| Compliance | Regulatory alignment, audit-evidence preparation |
| Engineering Managers | Team-level completion, role-specific module enforcement |
| Every employee / contractor | Complete training on time, read security comms, report incidents |
9. Governance
- Completion dashboard maintained by the People Team; shared monthly with CTO.
- Phishing-simulation results and repeat-offender list reviewed at quarterly ISRMC.
- Training content is refreshed at least annually β new modules added when threat landscape or regulation changes (e.g. new DPDP Rule, new CERT-In direction).
- Evidence (completion records, phishing-campaign logs, drill reports) retained for the regulatory retention period.
10. Exceptions
Exceptions (e.g. long-term leave, role change requiring alternate training) follow the Exception Management Policy (POL-013). No exception is valid without documented compensating controls (usually temporary access restriction).
11. Related Documents
- Cyber Security and Cyber Resilience Policy (POL-007) β umbrella
- Acceptable Use Policy (POL-001)
- Privileged Access Management Policy (POL-018)
- Vendor Security Assessment Standard (STD-015) β long-term vendor staff
- Incident Response SOP (SOP-004)
Reviewed annually. Last revision: April 2026. Contact: security@wealthy.in.