Estándar Internacional de Seguridad | 02/2026

Centro de Confianza y Seguridad
LegallyMail

Nuestra infraestructura está blindada siguiendo rigurosamente el NIST Cybersecurity Framework.
Transparencia radical sobre cómo protegemos tus datos más críticos.

Estado
100% Seguro
LegallyMail
Cifrado E2E
Activo
99%
Cumplimiento

Comprometidos con tu Seguridad

En LegallyMail, alineamos nuestros controles de seguridad con el NIST Cybersecurity Framework (CSF), el estándar de oro internacional para la gestión de riesgos cibernéticos. Nuestro compromiso es proteger la confidencialidad, integridad y disponibilidad de tus comunicaciones certificadas.

Controles Implementados: 102
Total Controles: 103

Nuestra Postura de Seguridad

Desglose por funciones del Marco de Ciberseguridad NIST

🎯
Identificar
100% Implementado

Desarrollar la comprensión organizacional para gestionar el riesgo de ciberseguridad.

  • Gestión de Activos
  • Business Environment
  • Gobernanza
  • Evaluación de Riesgos
  • Gestión de Riesgos
🛡️
Proteger
100% Implementado

Implementar salvaguardias para garantizar la entrega de servicios críticos.

  • Control de Acceso
  • Concientización y Capacitación
  • Seguridad de Datos
  • Protección de Información
  • Mantenimiento
  • Tecnología de Protección
🔍
Detectar
100% Implementado

Desarrollar actividades para identificar la ocurrencia de un evento de ciberseguridad.

  • Anomalías y Eventos
  • Monitoreo Continuo
  • Procesos de Detección
Responder
94% Implementado

Tomar acción ante incidentes detectados de ciberseguridad.

  • Planificación de Respuesta
  • Comunicaciones
  • Análisis
  • Mitigación
  • Mejoras
♻️
Recuperar
100% Implementado

Mantener planes de resiliencia y restaurar capacidades afectadas.

  • Planificación de Recuperación
  • Mejoras
  • Comunicaciones

Controles Implementados

Transparencia detallada sobre nuestros controles de seguridad activos

Gestión de Activos
ID.AM-1

Physical devices and systems within the organization are inventoried

Verificado
ID.AM-2

Software platforms and applications are inventoried

Verificado
ID.AM-3

Organizational communication and data flows are mapped

Verificado
ID.AM-4

External information systems are catalogued

Verificado
ID.AM-5

Resources are prioritized based on their classification, criticality, and business value

Verificado
ID.AM-6

Cybersecurity roles and responsibilities are established

Business Environment
ID.BE-1

The organization's role in the supply chain is identified and communicated

Verificado
ID.BE-2

The organization's place in critical infrastructure is identified

Verificado
ID.BE-3

Priorities for organizational mission, objectives, and activities are established

Verificado
ID.BE-4

Dependencies and critical functions are established

Verificado
ID.BE-5

Resilience requirements to support delivery of critical services are established

Verificado
Gobernanza
ID.GV-1

Organizational cybersecurity policy is established and communicated

Verificado
ID.GV-2

Cybersecurity roles and responsibilities are coordinated and aligned

Verificado
ID.GV-3

Legal and regulatory requirements are understood and managed

ID.GV-4

Governance and risk management processes address cybersecurity risks

Verificado
Evaluación de Riesgos
ID.RA-1

Asset vulnerabilities are identified and documented

Verificado
ID.RA-2

Cyber threat intelligence is received from information sharing forums

Verificado
ID.RA-3

Threats, both internal and external, are identified and documented

Verificado
ID.RA-4

Potential business impacts and likelihoods are identified

Verificado
ID.RA-5

Threats, vulnerabilities, likelihoods, and impacts are used to determine risk

Verificado
ID.RA-6

Risk responses are identified and prioritized

Verificado
Gestión de Riesgos
ID.RM-1

Risk management processes are established, managed, and agreed to

Verificado
ID.RM-2

Organizational risk tolerance is determined and clearly expressed

Verificado
ID.RM-3

The organization's determination of risk tolerance is informed by its role

Verificado

Control de Acceso
PR.AC-1

Identities and credentials are issued, managed, verified, revoked, and audited

Verificado
PR.AC-2

Physical access to assets is managed and protected

Verificado
PR.AC-3

Remote access is managed

Verificado
PR.AC-4

Access permissions and authorizations are managed

Verificado
PR.AC-5

Network integrity is protected (e.g., network segregation)

Verificado
PR.AC-6

Identities are proofed and bound to credentials

Verificado
PR.AC-7

Users, devices, and assets are authenticated

Concientización y Capacitación
PR.AT-1

All users are informed and trained on cybersecurity awareness

Verificado
PR.AT-2

Privileged users understand their roles and responsibilities

Verificado
PR.AT-3

Third-party stakeholders understand their roles and responsibilities

Verificado
PR.AT-4

Senior executives understand their roles and responsibilities

PR.AT-5

Physical and cybersecurity personnel understand their roles

Verificado
Seguridad de Datos
PR.DS-1

Data-at-rest is protected

Verificado
PR.DS-2

Data-in-transit is protected

PR.DS-3

Assets are formally managed throughout removal, transfers, and disposition

Verificado
PR.DS-4

Adequate capacity to ensure availability is maintained

Verificado
PR.DS-5

Protections against data leaks are implemented

Verificado
PR.DS-6

Integrity checking mechanisms verify software and information integrity

PR.DS-7

Development and testing environment(s) are separate from production

Verificado
PR.DS-8

Integrity checking mechanisms verify hardware integrity

Verificado
Protección de Información
PR.IP-1

A baseline configuration of systems is created and maintained

Verificado
PR.IP-2

A System Development Life Cycle to manage systems is implemented

Verificado
PR.IP-3

Configuration change control processes are in place

Verificado
PR.IP-4

Backups of information are conducted, maintained, and tested

Verificado
PR.IP-5

Policy and regulations regarding the physical operating environment

Verificado
PR.IP-6

Data is destroyed according to policy

Verificado
PR.IP-7

Protection processes are improved

Verificado
PR.IP-8

Effectiveness of protection technologies is shared

Verificado
PR.IP-9

Response and recovery plans are in place and managed

PR.IP-10

Response and recovery plans are tested

Verificado
PR.IP-11

Cybersecurity is included in human resources practices

PR.IP-12

A vulnerability management plan is developed and implemented

Verificado
Mantenimiento
PR.MA-1

Maintenance and repair of assets are performed and logged

Verificado
PR.MA-2

Remote maintenance of assets is approved, logged, and performed

Verificado
Tecnología de Protección
PR.PT-1

Audit/log records are determined, documented, implemented, and reviewed

Verificado
PR.PT-2

Removable media is protected and its use restricted

Verificado
PR.PT-3

The principle of least functionality is incorporated

Verificado
PR.PT-4

Communications and control networks are protected

Verificado
PR.PT-5

Mechanisms are implemented to achieve resilience requirements

Verificado

Anomalías y Eventos
DE.AE-1

A baseline of network operations and expected data flows is established

Verificado
DE.AE-2

Detected events are analyzed to understand attack targets and methods

Verificado
DE.AE-3

Event data are collected and correlated from multiple sources

Verificado
DE.AE-4

Impact of events is determined

Verificado
DE.AE-5

Incident alert thresholds are established

Verificado
Monitoreo Continuo
DE.CM-1

The network is monitored to detect potential cybersecurity events

Verificado
DE.CM-2

The physical environment is monitored to detect cybersecurity events

Verificado
DE.CM-3

Personnel activity is monitored to detect cybersecurity events

Verificado
DE.CM-4

Malicious code is detected

Verificado
DE.CM-5

Unauthorized mobile code is detected

Verificado
DE.CM-6

External service provider activity is monitored

Verificado
DE.CM-7

Monitoring for unauthorized personnel, connections, devices, and software

Verificado
DE.CM-8

Vulnerability scans are performed

Verificado
Procesos de Detección
DE.DP-1

Roles and responsibilities for detection are well defined

Verificado
DE.DP-2

Detection activities comply with all applicable requirements

Verificado
DE.DP-3

Detection processes are tested

Verificado
DE.DP-4

Event detection information is communicated

Verificado
DE.DP-5

Detection processes are continuously improved

Verificado

Planificación de Respuesta
RS.RP-1

Response plan is executed during or after an incident

Verificado
Comunicaciones
RS.CO-1

Personnel know their roles and order of operations

Verificado
RS.CO-2

Incidents are reported consistent with established criteria

Verificado
RS.CO-3

Information is shared consistent with response plans

Verificado
RS.CO-4

Coordination with stakeholders occurs

Verificado
Análisis
RS.AN-1

Notifications from detection systems are investigated

Verificado
RS.AN-2

The impact of the incident is understood

Verificado
RS.AN-3

Forensics are performed

Verificado
RS.AN-4

Incidents are categorized consistent with response plans

Verificado
RS.AN-5

Processes are established to receive, analyze and respond to vulnerabilities

Verificado
Mitigación
RS.MI-1

Incidents are contained

Verificado
RS.MI-2

Incidents are mitigated

Verificado
RS.MI-3

Newly identified vulnerabilities are mitigated or documented as accepted risks

Verificado
Mejoras
RS.IM-1

Response plans incorporate lessons learned

Verificado
RS.IM-2

Response strategies are updated

Verificado

Planificación de Recuperación
RC.RP-1

Recovery plan is executed during or after a cybersecurity incident

Verificado
Mejoras
RC.IM-1

Recovery plans incorporate lessons learned

Verificado
RC.IM-2

Recovery strategies are updated

Verificado
Comunicaciones
RC.CO-1

Public relations are managed

Verificado
RC.CO-2

Reputation is repaired after an incident

Verificado
RC.CO-3

Recovery activities are communicated to stakeholders

Verificado

¿Tienes preguntas sobre nuestra seguridad?

Nuestro equipo de seguridad y cumplimiento está disponible para resolver tus dudas.

Contactar con Seguridad
Tiempo Real