
Unique production database authentication enforced

Encryption key access restricted

Unique account authentication enforced

Production application access restricted

Access control procedures established

Production database access restricted

Firewall access restricted

Production OS access restricted

Production network access restricted

Access revoked upon termination

Unique network system authentication enforced

Remote access MFA enforced

Remote access encrypted enforced

Intrusion detection system utilized

Log management utilized

Infrastructure performance monitored

Network segmentation implemented

Network firewalls reviewed

Network firewalls utilized

Network and system hardening standards maintained

Service infrastructure maintained