Org Logo

Controls

Here are the controls implemented at undefined to ensure compliance, as a part of our security program.

Product security (5)

Production System User Review

Situational Awareness For Incidents

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Change Management Process

Data security (9)

Identify Validation

Termination of Employment

Production Databases Access Restriction

Multi-factor Authentication

User Privileges Reviews

Encrypting Data At Rest

Data Classification and Handling

Data Retention and Purging

Backup Testing and Verification

Network security (9)

Impact Analysis

Limit Network Connections

External System Connections

Transmission Confidentiality

Anomalous Behavior

Data Used in Testing

Centralized Collection of Security Event Logs

VPN and Remote Access

Network Access Controls

App security (4)

Secure System Modification

Conspicuous Link To Privacy Notice

Unauthorized Activities Detection

Secure Development Practices

Endpoint security (6)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Session Lock

Password/Authentication Requirements

Operating System Updates

Corporate security (10)

Code of Business Conduct

Roles & Responsibilities

New Hire Policy Acknowledgement

Security & Privacy Awareness

Assigned Cybersecurity & Privacy Responsibilities

Risk Assessment

Incident Reporting Assistance

Third-Party Criticality Assessments

Segregates Roles and Responsibilities

Management Review of Risks