-
Notifications
You must be signed in to change notification settings - Fork 3
/
soc2.json
1467 lines (1467 loc) · 75.3 KB
/
soc2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"NOTICE": "Copyright 2021 Vanta, Inc. (www.vanta.com)\n \nLicensed under the Apache License, Version 2.0 (the 'License');\nyou may not use, distribute or modify this software or file except in compliance with the License.\nYou may obtain a copy of the License at\n \n\t https://www.apache.org/licenses/LICENSE-2.0.txt\n \nUnless required by applicable law or agreed to in writing, software and files\ndistributed under the License are distributed on an 'AS IS' BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n \nSee the License for the specific language governing permissions and\nlimitations under the License, including attribution obligations.",
"standard": {
"name": "soc2",
"principles": [
{
"name": "Control Environment",
"section": "CC 1.0",
"requirements": [
{
"name": "COSO Principle 1: The entity demonstrates a commitment to integrity and ethical values.",
"section": "CC 1.1",
"controlIds": [
"background-checks-performed",
"code-of-conduct-acknowledged-contractors",
"code-of-conduct-acknowledged-employees",
"confidentiality-agreement-acknowledged-contractors",
"confidentiality-agreement-acknowledged-employees",
"performance-evaluations-conducted"
]
},
{
"name": "COSO Principle 2: The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control.",
"section": "CC 1.2",
"controlIds": [
"board-of-directors-briefing",
"board-of-directors-charter",
"board-of-directors-expertise",
"board-of-directors-meeting"
]
},
{
"name": "COSO Principle 3: Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.",
"section": "CC 1.3",
"controlIds": [
"board-of-directors-charter",
"management-roles-responsibilities-defined",
"organization-structure-documented",
"role-responsibilities-specified"
]
},
{
"name": "COSO Principle 4: The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.",
"section": "CC 1.4",
"controlIds": [
"background-checks-performed",
"performance-evaluations-conducted",
"role-responsibilities-specified",
"security-awareness-training-completed"
]
},
{
"name": "COSO Principle 5: The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.",
"section": "CC 1.5",
"controlIds": [
"code-of-conduct-acknowledged-employees",
"performance-evaluations-conducted",
"role-responsibilities-specified"
]
}
]
},
{
"name": "Communication and Information",
"section": "CC 2.0",
"requirements": [
{
"name": "COSO Principle 13: The entity obtains or generates and uses relevant, quality information to support the functioning of internal control.",
"section": "CC 2.1",
"controlIds": [
"control-self-assessments-conducted",
"log-management-utilized",
"vulnerability-scans-conducted"
]
},
{
"name": "COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control. ",
"section": "CC 2.2",
"controlIds": [
"incident-response-policies-established",
"management-roles-responsibilities-defined",
"role-responsibilities-specified",
"security-awareness-training-completed",
"security-policies-established-reviewed",
"service-description-communicated",
"system-changes-communicated",
"whistleblower-policy-established"
]
},
{
"name": "COSO Principle 15: The entity communicates with external parties regarding matters affecting the functioning of internal control.",
"section": "CC 2.3",
"controlIds": [
"commitments-externally-communicated",
"external-service-impact-notifications",
"external-support-resources",
"service-description-communicated",
"support-system-available",
"third-party-agreements"
]
}
]
},
{
"name": "Risk Assessment",
"section": "CC 3.0",
"requirements": [
{
"name": "COSO Principle 6: The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.",
"section": "CC 3.1",
"controlIds": [
"risk-assessment-objectives",
"risk-assessment-program"
]
},
{
"name": "COSO Principle 7: The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.",
"section": "CC 3.2",
"controlIds": [
"continuity-disaster-recovery-plans-tested",
"risk-assessment-performed",
"risk-assessment-program",
"vendor-management-program-established"
]
},
{
"name": "COSO Principle 8: The entity considers the potential for fraud in assessing risks to the achievement of objectives.",
"section": "CC 3.3",
"controlIds": [
"risk-assessment-performed",
"risk-assessment-program"
]
},
{
"name": "COSO Principle 9: The entity identifies and assesses changes that could significantly impact the system of internal control.",
"section": "CC 3.4",
"controlIds": [
"configuration-management-system-established",
"penetration-testing",
"risk-assessment-performed",
"risk-assessment-program"
]
}
]
},
{
"name": "Monitoring Activities",
"section": "CC 4.0",
"requirements": [
{
"name": "COSO Principle 16: The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.",
"section": "CC 4.1",
"controlIds": [
"control-self-assessments-conducted",
"penetration-testing",
"vendor-management-program-established",
"vulnerability-scans-conducted"
]
},
{
"name": "COSO Principle 17: The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.",
"section": "CC 4.2",
"controlIds": [
"control-self-assessments-conducted",
"vendor-management-program-established"
]
}
]
},
{
"name": "Control Activities",
"section": "CC 5.0",
"requirements": [
{
"name": "COSO Principle 10: The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.",
"section": "CC 5.1",
"controlIds": [
"risk-assessment-program",
"security-policies-established-reviewed"
]
},
{
"name": "COSO Principle 11: The entity also selects and develops general control activities over technology to support the achievement of objectives.",
"section": "CC 5.2",
"controlIds": [
"access-control-procedures",
"development-lifecycle-established",
"security-policies-established-reviewed"
]
},
{
"name": "COSO Principle 12: The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action.",
"section": "CC 5.3",
"controlIds": [
"change-management-procedures",
"data-backup-procedures",
"data-retention-procedures-established",
"development-lifecycle-established",
"incident-response-policies-established",
"risk-assessment-objectives",
"risk-assessment-program",
"role-responsibilities-specified",
"security-policies-established-reviewed",
"vendor-management-program-established"
]
}
]
},
{
"name": "Logical and Physical Access Controls",
"section": "CC 6.0",
"requirements": [
{
"name": "The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.",
"section": "CC 6.1",
"controlIds": [
"access-application-restricted",
"access-control-procedures",
"access-database-restricted-users",
"access-datastores-ssh",
"access-encryption-keys",
"access-firewalls",
"access-operating-system-restricted",
"access-production-network-restricted",
"access-role-based",
"access-ssh-required",
"changes-approval-required",
"data-classification-policy",
"data-encrypted",
"infra-network-segregation",
"policies-password-complexity",
"production-inventory-maintained",
"remote-access-mfa-enforced",
"remote-access-vpn-enforced",
"unique-account-authentication-enforced"
]
},
{
"name": "Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.",
"section": "CC 6.2",
"controlIds": [
"access-control-procedures",
"access-reviews",
"access-revoked-termination",
"access-role-based",
"access-ssh-required"
]
},
{
"name": "The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity’s objectives.",
"section": "CC 6.3",
"controlIds": [
"access-control-procedures",
"access-reviews",
"access-revoked-termination",
"access-role-based",
"access-ssh-required"
]
},
{
"name": "The entity restricts physical access to facilities and protected information assets (for example, data center facilities, back-up media storage, and other sensitive locations) to authorized personnel to meet the entity’s objectives.",
"section": "CC 6.4",
"controlIds": [
"access-physical-datacenter",
"access-physical-review",
"access-physical-visitors",
"access-reviews"
]
},
{
"name": "The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.",
"section": "CC 6.5",
"controlIds": [
"access-revoked-termination",
"asset-disposal-procedures-utilized",
"customer-data-deleted upon-leave",
"data-retention-procedures-established"
]
},
{
"name": "The entity implements logical access security measures to protect against threats from sources outside its system boundaries.",
"section": "CC 6.6",
"controlIds": [
"access-ssh-required",
"data-encrypted-in-transit",
"intrusion-detection-system",
"network-firewalls-reviewed",
"network-firewalls-utilized",
"remote-access-mfa-enforced",
"remote-access-vpn-enforced",
"support-infra-patched",
"system-network-hardening"
]
},
{
"name": "The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.",
"section": "CC 6.7",
"controlIds": [
"assets-portable-media-encrypted",
"data-encrypted-in-transit",
"MDM-system-utilized"
]
},
{
"name": "The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.",
"section": "CC 6.8",
"controlIds": [
"assets-anti-malware",
"development-lifecycle-established",
"support-infra-patched"
]
}
]
},
{
"name": "System Operations",
"section": "CC 7.0",
"requirements": [
{
"name": "To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.",
"section": "CC 7.1",
"controlIds": [
"change-management-procedures",
"configuration-management-system-established",
"policies-incident-monitoring",
"risk-assessment-performed",
"vulnerability-scans-conducted"
]
},
{
"name": "The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.",
"section": "CC 7.2",
"controlIds": [
"intrusion-detection-system",
"log-management-utilized",
"penetration-testing",
"policies-incident-monitoring",
"support-infra-patched",
"system-threshold-monitoring",
"vulnerability-scans-conducted"
]
},
{
"name": "The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents) and, if so, takes actions to prevent or address such failures.",
"section": "CC 7.3",
"controlIds": [
"incident-response-policies-established",
"policies-incident-management"
]
},
{
"name": "The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.",
"section": "CC 7.4",
"controlIds": [
"incident-response-plan-tested",
"incident-response-policies-established",
"policies-incident-management",
"support-infra-patched",
"vulnerability-scans-conducted"
]
},
{
"name": "The entity identifies, develops, and implements activities to recover from identified security incidents.",
"section": "CC 7.5",
"controlIds": [
"continuity-disaster-recovery-plans-tested",
"incident-response-plan-tested",
"incident-response-policies-established",
"policies-incident-management"
]
}
]
},
{
"name": "Change Management",
"section": "CC 8.0",
"requirements": [
{
"name": "The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.",
"section": "CC 8.1",
"controlIds": [
"change-management-procedures",
"changes-approval-required",
"development-lifecycle-established",
"penetration-testing",
"support-infra-patched",
"system-network-hardening",
"vulnerability-scans-conducted"
]
}
]
},
{
"name": "Risk Mitigation",
"section": "CC 9.0",
"requirements": [
{
"name": "The entity identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions.",
"section": "CC 9.1",
"controlIds": [
"continuity-and-disaster-recovery-plans-established",
"cybersecurity-insurance-maintained",
"risk-assessment-performed",
"risk-assessment-program"
]
},
{
"name": "The entity assesses and manages risks associated with vendors and business partners.",
"section": "CC 9.2",
"controlIds": [
"third-party-agreements",
"vendor-management-program-established"
]
}
]
},
{
"name": "Additional Criteria for Availability",
"section": "A 1",
"requirements": [
{
"name": "The entity maintains, monitors, and evaluates current processing capacity and use of system components (infrastructure, data, and software) to manage capacity demand and to enable the implementation of additional capacity to help meet its objectives.",
"section": "A 1.1",
"controlIds": [
"system-capacity-reviewed",
"system-threshold-monitoring"
]
},
{
"name": "The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives.",
"section": "A 1.2",
"controlIds": [
"continuity-disaster-recovery-plans-tested",
"data-backup-procedures",
"database-replication-utilized",
"environmental-monitoring-devices-implemented",
"environmental-security-inspected-annually",
"production-data-backups-conducted",
"risk-assessment-performed",
"risk-assessment-program",
"system-multiple-availability-zones"
]
},
{
"name": "The entity tests recovery plan procedures supporting system recovery to meet its objectives.",
"section": "A 1.3",
"controlIds": [
"continuity-and-disaster-recovery-plans-established",
"continuity-disaster-recovery-plans-tested",
"data-backup-procedures",
"intrusion-detection-system"
]
}
]
},
{
"name": "Additional Criteria for Confidentiality",
"section": "C 1",
"requirements": [
{
"name": "The entity identifies and maintains confidential information to meet the entity’s objectives related to confidentiality.",
"section": "C 1.1",
"controlIds": [
"data-classification-policy",
"data-retention-procedures-established",
"production-data-segmented",
"third-party-agreements",
"unique-account-authentication-enforced"
]
},
{
"name": "The entity disposes of confidential information to meet the entity’s objectives related to confidentiality.",
"section": "C 1.2",
"controlIds": [
"asset-disposal-procedures-utilized",
"customer-data-deleted upon-leave"
]
}
]
},
{
"name": "Additional Criteria for Processing Integrity",
"section": "PI 1",
"requirements": [
{
"name": "The entity obtains or generates, uses, and communicates relevant, quality information regarding the objectives related to processing, including definitions of data processed and product and service specifications, to support the use of products and services.",
"section": "PI 1.1",
"controlIds": [
"commitments-externally-communicated",
"external-support-resources",
"service-description-communicated"
]
},
{
"name": "The entity implements policies and procedures over system inputs, including controls over completeness and accuracy, to result in products, services, and reporting to meet the entity’s objectives.",
"section": "PI 1.2",
"controlIds": [
"customer-data-retained",
"development-lifecycle-established",
"policies-passwords-enforced",
"system-activity-logged",
"system-data-input-monitoring"
]
},
{
"name": "The entity implements policies and procedures over system processing to result in products, services, and reporting to meet the entity’s objectives.",
"section": "PI 1.3",
"controlIds": [
"development-lifecycle-established",
"processing-issues-automatically-alerted",
"system-activity-logged",
"system-customer-input-validation",
"system-data-input-monitoring",
"system-threshold-monitoring"
]
},
{
"name": "The entity implements policies and procedures to make available or deliver output completely, accurately, and timely in accordance with specifications to meet the entity’s objectives.",
"section": "PI 1.4",
"controlIds": [
"customer-data-retained",
"customer-transactions-portal-available",
"data-encrypted",
"processing-alerts-available",
"processing-issues-automatically-alerted",
"system-data-input-monitoring"
]
},
{
"name": "The entity implements policies and procedures to store inputs, items in processing, and outputs completely, accurately, and timely in accordance with system specifications to meet the entity’s objectives.",
"section": "PI 1.5",
"controlIds": [
"access-production-network-restricted",
"continuity-disaster-recovery-plans-tested",
"customer-data-retained",
"customer-transaction-modifications-restricted"
]
}
]
},
{
"name": "Privacy Criteria Related to Notice and Communication of Objectives Related to Privacy",
"section": "P 1.0",
"requirements": [
{
"name": "The entity provides notice to data subjects about its privacy practices to meet the entity’s objectives related to privacy. The notice is updated and communicated to data subjects in a timely manner for changes to the entity’s privacy practices, including changes in the use of personal information, to meet the entity’s objectives related to privacy.",
"section": "P 1.1",
"controlIds": [
"personal-information-collection-changes-communicated",
"policies-privacy-policy",
"privacy-policy-available",
"privacy-policy-reviewed"
]
},
{
"name": "The entity's privacy commitments are communicated to external users, as appropriate, and those commitments and the associated system requirements are communicated to internal users to enable them to carry out their responsibilities.",
"section": "P 1.2",
"controlIds": []
}
]
},
{
"name": "Privacy Criteria Related to Choice and Consent",
"section": "P 2.0",
"requirements": [
{
"name": "The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information to the data subjects and the consequences, if any, of each choice. Explicit consent for the collection, use, retention, disclosure, and disposal of personal information is obtained from data subjects or other authorized persons, if required. Such consent is obtained only for the intended purpose of the information to meet the entity’s objectives related to privacy. The entity’s basis for determining implicit consent for the collection, use, retention, disclosure, and disposal of personal information is documented.",
"section": "P 2.1",
"controlIds": [
"policies-privacy-policy",
"privacy-explicity-consent-obtained",
"privacy-individual-consent-obtained",
"privacy-new-information-purpose-consent",
"privacy-opt-out"
]
}
]
},
{
"name": "Privacy Criteria Related to Collection",
"section": "P 3.0",
"requirements": [
{
"name": "Personal information is collected consistent with the entity’s objectives related to privacy.",
"section": "P 3.1",
"controlIds": [
"personal-information-collection-changes-communicated",
"personal-information-collection-reviewed",
"personal-information-reliability-verified",
"privacy-policies-personal-information-use-reviewed"
]
},
{
"name": "For information requiring explicit consent, the entity communicates the need for such consent, as well as the consequences of a failure to provide consent for the request for personal information, and obtains the consent prior to the collection of the information to meet the entity’s objectives related to privacy.",
"section": "P 3.2",
"controlIds": ["privacy-explicity-consent-obtained"]
}
]
},
{
"name": "Privacy Criteria Related to Use, Retention, and Disposal",
"section": "P 4.0",
"requirements": [
{
"name": "The entity limits the use of personal information to the purposes identified in the entity’s objectives related to privacy.",
"section": "P 4.1",
"controlIds": ["privacy-policies-personal-information-use-reviewed"]
},
{
"name": "The entity retains personal information consistent with the entity’s objectives related to privacy.",
"section": "P 4.2",
"controlIds": [
"data-retention-procedures-established",
"privacy-data-retained"
]
},
{
"name": "The entity securely disposes of personal information to meet the entity’s objectives related to privacy.",
"section": "P 4.3",
"controlIds": [
"data-deletion-requests-handled",
"privacy-inquiries-handled",
"privacy-sensitive-data-disposal"
]
}
]
},
{
"name": "Privacy Criteria Related to Access",
"section": "P 5.0",
"requirements": [
{
"name": "The entity grants identified and authenticated data subjects the ability to access their stored personal information for review and, upon request, provides physical or electronic copies of that information to data subjects to meet the entity’s objectives related to privacy. If access is denied, data subjects are informed of the denial and reason for such denial, as required, to meet the entity’s objectives related to privacy.",
"section": "P 5.1",
"controlIds": [
"policies-privacy-policy",
"privacy-identity-verification",
"privacy-policy-established"
]
},
{
"name": "The entity corrects, amends, or appends personal information based on information provided by data subjects and communicates such information to third parties, as committed or required, to meet the entity’s objectives related to privacy. If a request for correction is denied, data subjects are informed of the denial and reason for such denial to meet the entity’s objectives related to privacy.",
"section": "P 5.2",
"controlIds": [
"personal-information-changes-communicated",
"privacy-policy-established"
]
}
]
},
{
"name": "Privacy Criteria Related to Disclosure and Notification",
"section": "P 6.0",
"requirements": [
{
"name": "The entity discloses personal information to third parties with the explicit consent of data subjects, and such consent is obtained prior to disclosure to meet the entity’s objectives related to privacy.",
"section": "P 6.1",
"controlIds": [
"legal-personal-information-tracked",
"policies-privacy-policy",
"privacy-individual-consent-obtained",
"privacy-new-information-purpose-consent",
"third-party-agreements",
"third-party-privacy-documentation-reviewed",
"vendor-management-program-established"
]
},
{
"name": "The entity creates and retains a complete, accurate, and timely record of authorized disclosures of personal information to meet the entity’s objectives related to privacy.",
"section": "P 6.2",
"controlIds": ["third-party-privacy-documentation-reviewed"]
},
{
"name": "The entity creates and retains a complete, accurate, and timely record of detected or reported unauthorized disclosures (including breaches) of personal information to meet the entity’s objectives related to privacy.",
"section": "P 6.3",
"controlIds": [
"incident-response-policies-established",
"policies-incident-management"
]
},
{
"name": "The entity obtains privacy commitments from vendors and other third parties who have access to personal information to meet the entity’s objectives related to privacy. The entity assesses those parties’ compliance on a periodic and as-needed basis and takes corrective action, if necessary.",
"section": "P 6.4",
"controlIds": [
"incident-response-policies-established",
"policies-incident-management",
"third-party-agreements",
"third-party-privacy-documentation-reviewed",
"vendor-management-program-established"
]
},
{
"name": "The entity obtains commitments from vendors and other third parties with access to personal information to notify the entity in the event of actual or suspected unauthorized disclosures of personal information. Such notifications are reported to appropriate personnel and acted on in accordance with established incident response procedures to meet the entity’s objectives related to privacy.",
"section": "P 6.5",
"controlIds": [
"incident-response-policies-established",
"policies-incident-management",
"third-party-agreements"
]
},
{
"name": "The entity provides notification of breaches and incidents to affected data subjects, regulators, and others to meet the entity’s objectives related to privacy.",
"section": "P 6.6",
"controlIds": [
"incident-response-policies-established",
"policies-incident-management"
]
},
{
"name": "The entity provides data subjects with an accounting of the personal information held and disclosure of the data subjects’ personal information, upon the data subjects’ request, to meet the entity’s objectives related to privacy.",
"section": "P 6.7",
"controlIds": [
"privacy-data-sharing",
"privacy-identity-verification",
"privacy-inquiries-handled",
"third-party-privacy-documentation-reviewed"
]
}
]
},
{
"name": "Privacy Criteria Related to Quality",
"section": "P 7.0",
"requirements": [
{
"name": "The entity collects and maintains accurate, up-to-date, complete, and relevant personal information to meet the entity’s objectives related to privacy.",
"section": "P 7.1",
"controlIds": [
"personal-data-updates",
"privacy-policy-established",
"third-party-privacy-documentation-reviewed"
]
}
]
},
{
"name": "Privacy Criteria Related to Monitoring and Enforcement",
"section": "P 8.0",
"requirements": [
{
"name": "The entity implements a process for receiving, addressing, resolving, and communicating the resolution of inquiries, complaints, and disputes from data subjects and others and periodically monitors compliance to meet the entity’s objectives related to privacy. Corrections and other necessary actions related to identified deficiencies are made or taken in a timely manner.",
"section": "P 8.1",
"controlIds": [
"board-of-directors-briefing",
"control-self-assessments-conducted",
"policies-incident-management",
"privacy-complaints-procedures",
"privacy-policy-established",
"risk-assessment-program",
"third-party-privacy-documentation-reviewed"
]
}
]
}
]
},
"controlDetail": [
{
"id": "access-application-restricted",
"name": "Production application access restricted",
"description": "The company restricts privileged access to the application to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-control-procedures",
"name": "Access control procedures established",
"description": "The company's access control policy documents the requirements for the following access control functions: \n- adding new users;\n- modifying users; and/or \n- removing an existing user's access.",
"categories": ["Administrative"]
},
{
"id": "access-database-restricted-users",
"name": "Production database access restricted",
"description": "The company restricts privileged access to databases to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-datastores-ssh",
"name": "Unique production database authentication enforced",
"description": "The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.",
"categories": ["Technical"]
},
{
"id": "access-encryption-keys",
"name": "Encryption key access restricted",
"description": "The company restricts privileged access to encryption keys to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-firewalls",
"name": "Firewall access restricted",
"description": "The company restricts privileged access to the firewall to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-operating-system-restricted",
"name": "Production OS access restricted",
"description": "The company restricts privileged access to the operating system to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-physical-datacenter",
"name": "Physical access processes established",
"description": "The company has processes in place for granting, changing, and terminating physical access to company data centers based on an authorization from control owners.",
"categories": ["Physical"]
},
{
"id": "access-physical-review",
"name": "Data center access reviewed",
"description": "The company reviews access to the data centers at least annually.",
"categories": ["Physical"]
},
{
"id": "access-physical-visitors",
"name": "Visitor procedures enforced",
"description": "The company requires visitors to sign-in, wear a visitor badge, and be escorted by an authorized employee when accessing the data center or secure areas.",
"categories": ["Physical"]
},
{
"id": "access-production-network-restricted",
"name": "Production network access restricted",
"description": "The company restricts privileged access to the production network to authorized users with a business need.",
"categories": ["Technical"]
},
{
"id": "access-reviews",
"name": "Access reviews conducted",
"description": "The company conducts quarterly access reviews for the in-scope system components to help ensure that access is restricted appropriately. Required changes are tracked to completion.",
"categories": ["Administrative"]
},
{
"id": "access-revoked-termination",
"name": "Access revoked upon termination",
"description": "The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.",
"categories": ["Administrative"]
},
{
"id": "access-role-based",
"name": "Access requests required",
"description": "The company ensures that user access to in-scope system components is based on job role and function or requires a documented access request form and manager approval prior to access being provisioned.",
"categories": ["Administrative"]
},
{
"id": "access-ssh-required",
"name": "Unique network system authentication enforced",
"description": "The company requires authentication to the \"production network\" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.",
"categories": ["Technical"]
},
{
"id": "asset-disposal-procedures-utilized",
"name": "Asset disposal procedures utilized",
"description": "The company has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.",
"categories": ["Administrative"]
},
{
"id": "assets-anti-malware",
"name": "Anti-malware technology utilized",
"description": "The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.",
"categories": ["Technical"]
},
{
"id": "assets-portable-media-encrypted",
"name": "Portable media encrypted",
"description": "The company encrypts portable and removable media devices when used.",
"categories": ["Technical"]
},
{
"id": "background-checks-performed",
"name": "Employee background checks performed",
"description": "The company performs background checks on new employees.",
"categories": ["Administrative"]
},
{
"id": "board-of-directors-briefing",
"name": "Board oversight briefings conducted",
"description": "The company's board of directors or a relevant subcommittee is briefed by senior management at least annually on the state of the company's cybersecurity and privacy risk. The board provides feedback and direction to management as needed.",
"categories": ["Administrative"]
},
{
"id": "board-of-directors-charter",
"name": "Board charter documented",
"description": "The company's board of directors has a documented charter that outlines its oversight responsibilities for internal control.",
"categories": ["Administrative"]
},
{
"id": "board-of-directors-expertise",
"name": "Board expertise developed",
"description": "The company's board members have sufficient expertise to oversee management's ability to design, implement and operate information security controls. The board engages third-party information security experts and consultants as needed.",
"categories": ["Administrative"]
},
{
"id": "board-of-directors-meeting",
"name": "Board meetings conducted",
"description": "The company's board of directors meets at least annually and maintains formal meeting minutes. The board includes directors that are independent of the company.",
"categories": ["Administrative"]
},
{
"id": "change-management-procedures",
"name": "Change management procedures enforced",
"description": "The company requires changes to software and infrastructure components of the service to be authorized, formally documented, tested, reviewed, and approved prior to being implemented in the production environment.",
"categories": ["Technical"]
},
{
"id": "changes-approval-required",
"name": "Production deployment access restricted",
"description": "The company restricts access to migrate changes to production to authorized personnel.",
"categories": ["Technical"]
},
{
"id": "code-of-conduct-acknowledged-contractors",
"name": "Code of Conduct acknowledged by contractors",
"description": "The company requires contractor agreements to include a code of conduct or reference to the company code of conduct.",
"categories": ["Administrative"]
},
{
"id": "code-of-conduct-acknowledged-employees",
"name": "Code of Conduct acknowledged by employees and enforced",
"description": "The company requires employees to acknowledge a code of conduct at the time of hire. Employees who violate the code of conduct are subject to disciplinary actions in accordance with a disciplinary policy.",
"categories": ["Administrative"]
},
{
"id": "commitments-externally-communicated",
"name": "Company commitments externally communicated",
"description": "The company's security commitments are communicated to customers in Master Service Agreements (MSA) or Terms of Service (TOS).",
"categories": ["Administrative"]
},
{
"id": "confidentiality-agreement-acknowledged-contractors",
"name": "Confidentiality Agreement acknowledged by contractors",
"description": "The company requires contractors to sign a confidentiality agreement at the time of engagement.",
"categories": ["Administrative"]
},
{
"id": "confidentiality-agreement-acknowledged-employees",
"name": "Confidentiality Agreement acknowledged by employees",
"description": "The company requires employees to sign a confidentiality agreement during onboarding.",
"categories": ["Administrative"]
},
{
"id": "configuration-management-system-established",
"name": "Configuration management system established",
"description": "The company has a configuration management procedure in place to ensure that system configurations are deployed consistently throughout the environment.",
"categories": ["Technical"]
},
{
"id": "continuity-and-disaster-recovery-plans-established",
"name": "Continuity and Disaster Recovery plans established",
"description": "The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.",
"categories": ["Administrative"]
},
{
"id": "continuity-disaster-recovery-plans-tested",
"name": "Continuity and disaster recovery plans tested",
"description": "The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it at least annually.",
"categories": ["Administrative"]
},
{
"id": "control-self-assessments-conducted",
"name": "Control self-assessments conducted",
"description": "The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings.",
"categories": ["Administrative"]
},
{
"id": "customer-data-deleted upon-leave",
"name": "Customer data deleted upon leave",
"description": "The company purges or removes customer data containing confidential information from the application environment, in accordance with best practices, when customers leave the service.",
"categories": ["Technical"]
},
{
"id": "customer-data-retained",
"name": "Customer data retained",
"description": "The company retains customer transaction data for the life of a customer account. No historic transaction data is purged until the customer account is deleted.",
"categories": ["Technical"]
},
{
"id": "customer-transaction-modifications-restricted",
"name": "Customer transaction modifications restricted",
"description": "The company ensures that neither customers nor administrators have the ability to modify customer transaction data within the production application.",
"categories": ["Technical"]
},
{
"id": "customer-transactions-portal-available",
"name": "Customer transaction portal available",
"description": "The company provides customers with customer portals that contain dashboards, reports, or history for transactional and account information.",
"categories": ["Technical"]
},
{
"id": "cybersecurity-insurance-maintained",
"name": "Cybersecurity insurance maintained",
"description": "The company maintains cybersecurity insurance to mitigate the financial impact of business disruptions.",
"categories": ["Administrative"]
},
{
"id": "data-backup-procedures",
"name": "Backup processes established",
"description": "The company's data backup policy documents requirements for backup and recovery of customer data.",
"categories": ["Administrative"]
},
{
"id": "data-classification-policy",
"name": "Data classification policy established",