| Control | Status |
|---|---|
Encryption key access restricted The company restricts privileged access to encryption keys to authorized users with a business need. | |
Unique account authentication enforced The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys. | |
Production application access restricted System access restricted to authorized access only. | |
Access control procedures established The company’s access control policy documents the requirements for the following access control functions:
| |
Firewall access restricted The company restricts privileged access to the firewall to authorized users with a business need. | |
Access revoked upon termination The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs. | |
Unique network system authentication enforced The company requires authentication to the “production network” to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys. | |
Remote access MFA enforced The company’s production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method. | |
Remote access encrypted enforced The company’s production systems can only be remotely accessed by authorized employees via an approved encrypted connection. | |
Intrusion detection system utilized The company uses an intrusion detection system to provide continuous monitoring of the company’s network and early detection of potential security breaches. | |
Firewall rules configured The company uses firewalls and configures them to prevent unauthorized access. | |
Network segmentation implemented The company separates production and non-production environments through network segmentation controls. | |
Infrastructure access logged The company logs and monitors all access to cloud infrastructure and production systems. | |
Critical patches applied timely The company applies critical security patches and updates to production systems in a timely manner in accordance with established SLAs. |
| Control | Status |
|---|---|
Asset disposal procedures utilized The company has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed. | |
Production inventory maintained The company maintains a formal inventory of production system assets. | |
Portable media encrypted The company encrypts portable and removable media devices when used. | |
Anti-malware technology utilized The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems. | |
Employee background checks performed The company performs background checks on new employees. | |
Code of Conduct acknowledged by contractors The company requires contractor agreements to include a code of conduct or reference to the company code of conduct. | |
Code of Conduct acknowledged by employees and enforced The company requires employees to acknowledge a code of conduct at the time of hire. Employees who violate the code of conduct are subject to disciplinary actions in accordance with a disciplinary policy. | |
Confidentiality Agreement acknowledged by contractors The company requires contractors to sign a confidentiality agreement at the time of engagement. | |
Confidentiality Agreement acknowledged by employees The company requires employees to sign a confidentiality agreement during onboarding. | |
Performance evaluations conducted The company managers are required to complete performance evaluations for direct reports at least annually. | |
Password policy enforced The company requires passwords for in-scope system components to be configured according to the company’s policy. | |
Security awareness training conducted The company requires employees to complete security awareness training within thirty days of hire and at least annually thereafter. | |
Roles and responsibilities documented The company has formally defined roles and responsibilities for security, and documents these in its information security policy. | |
Security policies reviewed annually The company reviews and updates its security policies at least annually or when significant changes occur. |
| Control | Status |
|---|---|
Data encryption utilized The company’s datastores housing sensitive customer data are encrypted at rest. | |
Control self-assessments conducted The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA. | |
Penetration testing performed The company’s penetration testing is performed at least annually. A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs. | |
Data transmission encrypted The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks. | |
Vulnerability and system monitoring procedures established The company’s formal policies outline the requirements for the following functions related to IT / Engineering:
|
| Control | Status |
|---|---|
Continuity and Disaster Recovery plans established The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel. | |
Continuity and disaster recovery plans tested The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it at least annually. | |
Cybersecurity insurance maintained The company maintains cybersecurity insurance to mitigate the financial impact of business disruptions. | |
Configuration management system established The company has a configuration management procedure in place to ensure that system configurations are deployed consistently throughout the environment. | |
Incident response plan documented The company maintains an incident response plan that is reviewed and tested at least annually. The plan includes roles, responsibilities, and communication procedures. | |
Risk assessment conducted annually The company conducts risk assessments at least annually to identify threats and vulnerabilities, and develops mitigation strategies accordingly. | |
Risk register maintained The company maintains a risk register that is reviewed and updated regularly to track identified risks and their mitigation status. | |
Change management procedures established The company has change management procedures in place to ensure that changes to production systems are authorized, tested, and documented before deployment. | |
Vendor risk management program established The company maintains a vendor risk management program that includes due diligence reviews of third-party service providers and ongoing monitoring of their security posture. | |
Board oversight of security program The company’s board of directors or executive leadership provides oversight of the information security program and reviews security metrics regularly. |
| Control | Status |
|---|---|
Data retention procedures established The company has formal data retention and disposal procedures that define retention periods and secure deletion methods for customer and company data. | |
Customer data deleted upon leaving The company deletes customer data upon termination of the service agreement in accordance with documented retention and disposal procedures. | |
Data classification policy established The company maintains a data classification policy that defines categories for data sensitivity and handling requirements for each classification level. | |
Privacy policy publicly available The company maintains a publicly available privacy policy that describes the types of data collected, how it is used, and the rights of data subjects. | |
Data processing agreements maintained The company maintains data processing agreements with all subprocessors that handle personal data on behalf of the company and its customers. | |
Data subject access request process established The company has a documented process for handling data subject access requests (DSARs) in compliance with applicable privacy regulations. | |
PII redaction procedures implemented The company automatically detects and removes personally identifiable information from call recordings and transcripts using built-in PII redaction controls. |