Unique production database authentication enforced •Infrastructure security
Encryption key access restricted •Infrastructure security
Unique account authentication enforced •Infrastructure security
Production application access restricted •Infrastructure security
Access control procedures established •Infrastructure security
Production database access restricted •Infrastructure security
Firewall access restricted •Infrastructure security
Production OS access restricted •Infrastructure security
Production network access restricted •Infrastructure security
Unique network system authentication enforced •Infrastructure security
Remote access MFA enforced •Infrastructure security
Remote access encrypted enforced •Infrastructure security
Log management utilized •Infrastructure security
Infrastructure performance monitored •Infrastructure security
Network segmentation implemented •Infrastructure security
Network firewalls reviewed •Infrastructure security
Network firewalls utilized •Infrastructure security
Network and system hardening standards maintained •Infrastructure security
Asset disposal procedures utilized •Organizational security
Portable media encrypted •Organizational security
Employee background checks performed •Organizational security
Code of Conduct acknowledged by contractors •Organizational security
Code of Conduct acknowledged by employees and enforced •Organizational security
Confidentiality Agreement acknowledged by contractors •Organizational security
Confidentiality Agreement acknowledged by employees •Organizational security
Performance evaluations conducted •Organizational security
Password policy enforced •Organizational security
Visitor procedures enforced •Organizational security
Data encryption utilized •Product security
Control self-assessments conducted •Product security
Penetration testing performed •Product security
Data transmission encrypted •Product security
Vulnerability and system monitoring procedures established •Product security
Continuity and Disaster Recovery plans established •Internal security procedures
Cybersecurity insurance maintained •Internal security procedures
Configuration management system established •Internal security procedures
Development lifecycle established •Internal security procedures
SOC 2 - System Description •Internal security procedures
Whistleblower policy established •Internal security procedures
Board charter documented •Internal security procedures
Board expertise developed •Internal security procedures
Management roles and responsibilities defined •Internal security procedures
Organization structure documented •Internal security procedures
Roles and responsibilities specified •Internal security procedures
Security policies established and reviewed •Internal security procedures
Access requests required •Internal security procedures
Incident response policies established •Internal security procedures
Incident management procedures followed •Internal security procedures
Physical access processes established •Internal security procedures
Data center access reviewed •Internal security procedures
Company commitments externally communicated •Internal security procedures
Service description communicated •Internal security procedures
Risk assessment objectives specified •Internal security procedures
Risks assessments performed •Internal security procedures
Risk management program established •Internal security procedures
Data retention procedures established •Data and privacy
Customer data deleted upon leaving •Data and privacy
Data classification policy established •Data and privacy
Data retention procedures established •AI Security
Encryption key access restricted •AI Security
Unique account authentication enforced •AI Security
Customer data deleted upon leaving •AI Security
Data classification policy established •AI Security
Penetration testing performed •AI Security
Data transmission encrypted •AI Security