Change Management

Level N/A

Mechanisms exist to restrict software library privileges to those individuals with a pertinent business need for access.


Login

Change Management

Mechanisms exist to ensure stakeholders are made aware of and understand the impact of proposed changes.


Login

Change Management

Mechanisms exist to verify the functionality of cybersecurity controls when anomalies are discovered.


Login

Change Management

Mechanisms exist to report the results of cybersecurity & data privacy function verification to appropriate organizational management.


Login

Cloud Security

Level N/A

Mechanisms exist to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.


Login

Cloud Security

Mechanisms exist to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.


Login

Cloud Security

Mechanisms exist to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.


Login

Cloud Security

Mechanisms exist to ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments.


Login

Cloud Security

Mechanisms exist to host security-specific technologies in a dedicated subnet.


Login

Cloud Security

Mechanisms exist to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).


Login