check mark
Continuity and Disaster Recovery plans established
check mark
Continuity and disaster recovery plans tested
check mark
Cybersecurity insurance maintained
check mark
Configuration management system established
check mark
Change management procedures enforced
check mark
Production deployment access restricted
check mark
Development lifecycle established
check mark
SOC 2 - System Description
check mark
Whistleblower policy established
check mark
Board oversight briefings conducted
check mark
Board expertise developed
check mark
Board charter documented
check mark
Board meetings conducted
check mark
Backup processes established
check mark
System changes externally communicated
check mark
Management roles and responsibilities defined
check mark
Organization structure documented
check mark
Roles and responsibilities specified
check mark
Security policies established and reviewed
check mark
Support system available
check mark
System changes communicated
check mark
Access requests required
check mark
Incident response plan tested
check mark
Incident response policies established
check mark
Incident management procedures followed
check mark
Physical access processes established
check mark
Data center access reviewed
check mark
Company commitments externally communicated
check mark
External support resources available
check mark
Service description communicated
check mark
Risk assessment objectives specified
check mark
Risks assessments performed
check mark
Risk management program established
check mark
Third-party agreements established
check mark
Vendor management program established
check mark
Vulnerabilities scanned and remediated
check mark
Continuity and Disaster Recovery plans established
check mark
Continuity and disaster recovery plans tested
check mark
Cybersecurity insurance maintained
check mark
Configuration management system established
check mark
Change management procedures enforced
check mark
Production deployment access restricted
check mark
Development lifecycle established
check mark
SOC 2 - System Description
check mark
Whistleblower policy established
check mark
Board oversight briefings conducted
check mark
Board expertise developed
check mark
Board charter documented
check mark
Board meetings conducted
check mark
Backup processes established
check mark
System changes externally communicated
check mark
Management roles and responsibilities defined
check mark
Organization structure documented
check mark
Roles and responsibilities specified
check mark
Security policies established and reviewed
check mark
Support system available
check mark
System changes communicated
check mark
Access requests required
check mark
Incident response plan tested
check mark
Incident response policies established
check mark
Incident management procedures followed
check mark
Physical access processes established
check mark
Data center access reviewed
check mark
Company commitments externally communicated
check mark
External support resources available
check mark
Service description communicated
check mark
Risk assessment objectives specified
check mark
Risks assessments performed
check mark
Risk management program established
check mark
Third-party agreements established
check mark
Vendor management program established
check mark
Vulnerabilities scanned and remediated