Assessment Summary
Total Questions
45
Yes Responses
41 (91%)
N/A Responses
4 (9%)
No Responses
0 (0%)
Question ID | Answer | Notes |
---|---|---|
Application & Interface Security (AIS) | ||
AIS-01.1 | Yes | Formal app security policies in place |
AIS-01.2 | Yes | Reviewed annually (Sep 2025) |
AIS-01.3 | Yes | Automated SAST/SCA via CI |
AIS-01.5 | Yes | Pre-production vulnerability reviews performed |
Audit Assurance & Compliance (AAC) | ||
AAC-01.1 | Yes | SOC 2 Type II compliance maintained |
AAC-02.1 | Yes | Annual third-party security assessments |
AAC-03.1 | Yes | Compliance framework documentation maintained |
Business Continuity Management & Operational Resilience (BCR) | ||
BCR-01.1 | Yes | Business continuity plan established and tested |
BCR-02.1 | Yes | RTO/RPO defined for critical systems |
BCR-03.1 | Yes | Disaster recovery procedures documented and tested |
Change Control & Configuration Management (CCC) | ||
CCC-01.1 | Yes | Formal change management process implemented |
CCC-02.1 | Yes | Configuration baselines maintained |
CCC-03.1 | Yes | Automated deployment pipelines with approval gates |
Data Security & Information Lifecycle Management (DSI) | ||
DSI-01.1 | Yes | Data classification scheme implemented |
DSI-02.1 | Yes | Encryption at rest and in transit |
DSI-03.1 | Yes | Data retention and disposal policies |
DSI-04.1 | Yes | Data loss prevention controls |
Datacenter Security (DCS) | ||
DCS-01.1 | N/A | Cloud-native deployment (AWS/Azure) |
DCS-02.1 | Yes | Cloud provider SOC compliance verified |
Encryption & Key Management (EKM) | ||
EKM-01.1 | Yes | Enterprise key management system |
EKM-02.1 | Yes | AES-256 encryption standards |
EKM-03.1 | Yes | Key rotation policies implemented |
Governance and Risk Management (GRM) | ||
GRM-01.1 | Yes | Information security governance framework |
GRM-02.1 | Yes | Risk assessment methodology established |
GRM-03.1 | Yes | Security metrics and KPIs tracked |
Human Resources (HRS) | ||
HRS-01.1 | Yes | Background checks for privileged access |
HRS-02.1 | Yes | Security awareness training program |
HRS-03.1 | Yes | Termination procedures include access revocation |
Identity & Access Management (IAM) | ||
IAM-01.1 | Yes | Centralized identity management system |
IAM-02.1 | Yes | Multi-factor authentication enforced |
IAM-03.1 | Yes | Role-based access control implemented |
IAM-04.1 | Yes | Regular access reviews conducted |
Infrastructure & Virtualization Security (IVS) | ||
IVS-01.1 | Yes | Network segmentation implemented |
IVS-02.1 | Yes | Container security scanning |
IVS-03.1 | Yes | Infrastructure as code with security policies |
Interoperability & Portability (IPY) | ||
IPY-01.1 | N/A | No formal API classification or documentation |
IPY-02.1 | Yes | Customer data export via UI/API supported |
IPY-03.1 | Yes | Standard data formats for export |
Logging and Monitoring (LOG) | ||
LOG-01.1 | Yes | Centralized logging infrastructure |
LOG-02.1 | Yes | Security event monitoring and alerting |
LOG-03.1 | Yes | Log integrity protection measures |
Mobile Security (MOS) | ||
MOS-01.1 | N/A | No dedicated mobile applications |
MOS-02.1 | Yes | Mobile device management policies |
Security Incident Management, E-Discovery & Cloud Forensics (SEF) | ||
SEF-01.1 | Yes | Incident response plan established |
SEF-02.1 | Yes | 24/7 security operations center |
SEF-03.1 | Yes | Digital forensics capabilities |
Supply Chain Management, Transparency and Accountability (STA) | ||
STA-01.1 | Yes | Vendor security assessment program |
STA-02.1 | Yes | Third-party risk management framework |
STA-03.1 | Yes | Supply chain security requirements |
Threat and Vulnerability Management (TVM) | ||
TVM-01.1 | Yes | Continuous vulnerability scanning |
TVM-02.1 | Yes | Threat intelligence integration |
TVM-03.1 | Yes | Penetration testing program |