Cloud Security Alliance
CSA-Star leave-1 Compliance
|
|
|
Application & Interface Security Application Security | Applications and programming interfaces (APIs) shall be designed, developed, deployed, and tested in accordance with leading industry standards (e.g., OWASP for web applications) and adhere to applicable legal, statutory, or regulatory compliance obligations. | Yes, we ensure the same as part of our code review, static code analysis and Web Application Firewall. |
Application & Interface Security Customer Access Requirements | Prior to granting customers access to data, assets, and information systems, identified security, contractual, and regulatory requirements for customer access shall be addressed. | Yes, we provide API access only to vendors and systems authorized by the customer. |
Application & Interface Security Data Integrity | Data input and output integrity routines (i.e., reconciliation and edit checks) shall be implemented for application interfaces and databases to prevent manual or systematic processing errors, corruption of data, or misuse. | Yes, we follow multi layer application architecture to isolate database access |
Application & Interface Security Data Security / Integrity | Policies and procedures shall be established and maintained in support of data security to include (confidentiality, integrity and availability) across multiple system interfaces, jurisdictions and business functions to prevent improper disclosure, alteration, or destruction. | Complied with the requirement - We have Information security policy in place and working effectively |
Audit Assurance & Compliance Audit Planning | Audit plans shall be developed and maintained to address business process disruptions. Auditing plans shall focus on reviewing the effectiveness of the implementation of security operations. All audit activities must be agreed upon prior to executing any audits. | Complied with the requirement - We are conducting the Internal and External Audit as per the requirement and focus on the evaluation of the effectiveness security controls |
Audit Assurance & Compliance Independent Audits | Independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligations. | Complied with the requirement - reviews and assessments has been performed annually. |
Audit Assurance & Compliance Information System Regulatory Mapping | Organizations shall create and maintain a control framework which captures standards, regulatory, legal, and statutory requirements relevant for their business needs. The control framework shall be reviewed at least annually to ensure changes that could affect the business processes are reflected. | We are complied with the requirement - Information security team is reviewing the requirements at least annually to ensure changes that could affect the business processes are reflected. |
Business Continuity Management & Operational Resilience Business Continuity Planning | A consistent unified framework for business continuity planning and plan development shall be established, documented and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements. Requirements for business continuity plans include the following: • Defined purpose and scope, aligned with relevant dependencies • Accessible to and understood by those who will use them • Owned by a named person(s) who is responsible for their review, update, and approval • Defined lines of communication, roles, and responsibilities • Detailed recovery procedures, manual work-around, and reference information • Method for plan invocation | We are complied with the requirement -We have Business continuity plan and procedure which is approved by the Management and tested annually once as per the compliance requirements. |
Business Continuity Management & Operational Resilience Business Continuity Testing | Business continuity and security incident response plans shall be subject to testing at planned intervals or upon significant organizational or environmental changes. Incident response plans shall involve impacted customers (tenant) and other business relationships that represent critical intra-supply chain business process dependencies. | We are complied with the requirement -We have Business continuity plan and procedure which is approved by the Management and tested annually once as per the compliance requirements. |
Business Continuity Management & Operational Resilience Datacenter Utilities / Environmental Conditions | Datacenter utilities services and environmental conditions (e.g., water, power, temperature and humidity controls, telecommunications,and internet connectivity) shall be secured, monitored, maintained, and tested for continual effectiveness at planned intervals to ensure protection from unauthorized interception or damage, and designed with automated fail-over or other redundancies in the event of planned or unplanned disruptions. | Yes, we use Amazon Web Services (AWS) as our CSP, and they provide the same. |
Business Continuity Management & Operational Resilience Documentation | Information system documentation (e.g., administrator and user guides, and architecture diagrams) shall be made available to authorized personnel to ensure the following: • Configuring, installing, and operating the information system • Effectively using the system’s security features | Yes, we have such documentation |
Business Continuity Management & Operational Resilience Environmental Risks | Physical protection against damage from natural causes and disasters, as well as deliberate attacks, including fire, flood, atmospheric electrical discharge, solar induced geomagnetic storm, wind, earthquake, tsunami, explosion, nuclear accident, volcanic activity, biological hazard, civil unrest, mudslide, tectonic activity, and other forms of natural or man-made disaster shall be anticipated, designed, and have countermeasures applied. | We are complied with the requirement . We have Physical and Environmental Security Procedure in place and effectively working |
Business Continuity Management & Operational Resilience Equipment Location | To reduce the risks from environmental threats, hazards, and opportunities for unauthorized access, equipment shall be kept away from locations subject to high probability environmental risks and supplemented by redundant equipment located at a reasonable distance. | We are complied with the requirement |
Business Continuity Management & Operational Resilience Equipment Maintenance | Policies and procedures shall be established, and supporting business processes and technical measures implemented, for equipment maintenance ensuring continuity and availability of operations and support personnel. | Yes. We follow this and complied with the requirement |
Business Continuity Management & Operational Resilience Equipment Power Failures | Protection measures shall be put into place to react to natural and man-made threats based upon a geographically-specific Business Impact Assessment | We are complied with the requirement . We have Physical and Environmental Security Procedure in place and effectively working |
Business Continuity Management & Operational Resilience Impact Analysis | There shall be a defined and documented method for determining the impact of any disruption to the organization (cloud provider, cloud consumer) that must incorporate the following: • Identify critical products and services • Identify all dependencies, including processes, applications, business partners, and third party service providers • Understand threats to critical products and services • Determine impacts resulting from planned or unplanned disruptions and how these vary over time • Establish the maximum tolerable period for disruption • Establish priorities for recovery • Establish recovery time objectives for resumption of critical products and services within their maximum tolerable period of disruption • Estimate the resources required for resumption | We are complied with the requirement as per the Business continuity plan and procedure. |
Business Continuity Management & Operational Resilience Policy | Policies and procedures shall be established, and supporting business processes and technical measures implemented, for appropriate IT governance and service management to ensure appropriate planning, delivery and support of the organization's IT capabilities supporting business functions, workforce, and/or customers based on industry acceptable standards (i.e., ITIL v4 and COBIT 5). Additionally, policies and procedures shall include defined roles and responsibilities supported by regular workforce training. | Yes. We have the policies and procedures in place for approproate IT Governance and service management. |
Business Continuity Management & Operational Resilience Retention Policy | Policies and procedures shall be established, and supporting business processes and technical measures implemented, for defining and adhering to the retention period of any critical asset as per established policies and procedures, as well as applicable legal, statutory, or regulatory compliance obligations. Backup and recovery measures shall be incorporated as part of business continuity planning and tested accordingly for effectiveness. | We are complied with the requirement. We have data protection policy. |
Change Control & Configuration Management New Development / Acquisition | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network and systems components, or any corporate, operations and/or datacenter facilities have been pre-authorized by the organization's business leadership or other accountable business role or function. | We are complied with the requirement |
Change Control & Configuration Management Outsourced Development | External business partners shall adhere to the same policies and procedures for change management, release, and testing as internal developers within the organization (e.g. ITIL service management processes). | Yes, we comply |
Change Control & Configuration Management Quality Testing | Organization shall follow a defined quality change control and testing process (e.g. ITIL Service Management) with established baselines, testing, and release standards that focus on system availability, confidentiality, and integrity of systems and services. | Yes, we comply |
Change Control & Configuration Management Unauthorized Software Installations | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components. | We are complied with the requirement - We have installed End point security in users devices. |
Change Control & Configuration Management Production Changes | Policies and procedures shall be established for managing the risks associated with applying changes to: • business-critical or customer (tenant)-impacting (physical and virtual) applications and system-system interface (API) designs and configurations • infrastructure network and systems components Technical measures shall be implemented to provide assurance that all changes directly correspond to a registered change request, business-critical or customer (tenant) , and/or authorization by, the customer (tenant) as per agreement (SLA) prior to deployment. | Yes, we follow such a CM process. |
Data Security & Information Lifecycle Management Classification | Data and objects containing data shall be assigned a classification by the data owner based on data type, value, sensitivity, and criticality to the organization. | Yes, We comply |
Data Security & Information Lifecycle Management Data Inventory / Flows | Policies and procedures shall be established to inventory, document, and maintain data flows for data that is resident (permanently or temporarily) within the service's applications and infrastructure network and systems. In particular, providers shall ensure that data that is subject to geographic residency requirements not be migrated beyond its defined bounds. | Yes, We comply |
Data Security & Information Lifecycle Management eCommerce Transactions | Data related to electronic commerce (e-commerce) that traverses public networks shall be appropriately classified and protected from fraudulent activity, unauthorized disclosure, or modification in such a manner to prevent contract dispute and compromise of data. | Yes, We comply |
Data Security & Information Lifecycle Management Handling / Labeling / Security Policy | Policies and procedures shall be established for the labeling, handling, and security of data and objects which contain data. Mechanisms for label inheritance shall be implemented for objects that act as aggregate containers for data. | We are complied with the requirements with regards to data handling/Labeling/clasification |
Data Security & Information Lifecycle Management Non-Production Data | Production data shall not be replicated or used in non-production environments. | Yes, We dont use LIVE data in any other environment. |
Data Security & Information Lifecycle Management Ownership / Stewardship | All data shall be designated with stewardship, with assigned responsibilities defined, documented, and communicated. | Yes, We comply |
Data Security & Information Lifecycle Management Secure Disposal | Any use of customer data in non-production environments requires explicit, documented approval from all customers whose data is affected, and must comply with all legal and regulatory requirements for scrubbing of sensitive data elements. | Yes, We comply |
Datacenter Security Asset Management | Assets must be classified in terms of business criticality, service-level expectations, and operational continuity requirements. A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time shall be maintained and updated regularly, and assigned ownership by defined roles and responsibilities. | Yes, We comply |
Datacenter Security Controlled Access Points | Physical security perimeters (e.g., fences, walls, barriers, guards, gates, electronic surveillance, physical authentication mechanisms, reception desks, and security patrols) shall be implemented to safeguard sensitive data and information systems. | Yes, We comply. Our CSP(AWS) provides the same. |
Datacenter Security Equipment Identification | Automated equipment identification shall be used as a method of connection authentication. Location-aware technologies may be used to validate connection authentication integrity based on known equipment location. | Yes, We comply. Our CSP(AWS) provides the same. |
Datacenter Security Off-Site Authorization | Authorization must be obtained prior to relocation or transfer of hardware, software, or data to an offsite premises. | We are complied - As per the Information security policy and Media protection procedure. |
Datacenter Security Off-Site Equipment | Policies and procedures shall be established for the secure disposal of equipment (by asset type) used outside the organization's premises. This shall include a wiping solution or destruction process that renders recovery of information impossible. The erasure shall consist of a full overwrite of the drive to ensure that the erased drive is released to inventory for reuse and deployment, or securely stored until it can be destroyed. | We are complied. We have Asset Management Procedure |
Datacenter Security Policy | Policies and procedures shall be established, and supporting business processes implemented, for maintaining a safe and secure working environment in offices, rooms, facilities, and secure areas storing sensitive information. | We are complied. Physical and Environmental Security Procedure |
Datacenter Security - Secure Area Authorization | Ingress and egress to secure areas shall be constrained and monitored by physical access control mechanisms to ensure that only authorized personnel are allowed access. | We are complied. We have Physical and Environmental Security Procedure |
Datacenter Security Unauthorized Persons Entry | Ingress and egress points such as service areas and other points where unauthorized personnel may enter the premises shall be monitored, controlled and, if possible, isolated from data storage and processing facilities to prevent unauthorized data corruption, compromise, and loss. | We are complied. We have Physical and Environmental Security Procedure and we are monitoring the office building via CCTV cameras. |
Datacenter Security User Access | Physical access to information assets and functions by users and support personnel shall be restricted. | We are complied. We have Physical and Environmental Security Procedure in place and provided the access card to the users to restrict the specific areas. |
Encryption & Key Management Entitlement | Keys must have identifiable owners (binding keys to identities) and there shall be key management policies. | Yes, We comply. |
Encryption & Key Management Key Generation | Policies and procedures shall be established for the management of cryptographic keys in the service's cryptosystem (e.g., lifecycle management from key generation to revocation and replacement, public key infrastructure, cryptographic protocol design and algorithms used, access controls in place for secure key generation, and exchange and storage including segregation of keys used for encrypted data or sessions). Upon request, provider shall inform the customer (tenant) of changes within the cryptosystem, especially if the customer (tenant) data is used as part of the service, and/or the customer (tenant) has some shared responsibility over implementation of the control. | Yes, We comply. |
Encryption & Key Management Sensitive Data Protection | Policies and procedures shall be established, and supporting business processes and technical measures implemented, for the use of encryption protocols for protection of sensitive data in storage (e.g., file servers, databases, and end-user workstations), data in use (memory), and data in transmission (e.g., system interfaces, over public networks, and electronic messaging) as per applicable legal, statutory, and regulatory compliance obligations. | Yes, We comply. |
Encryption & Key Management Storage and Access | Platform and data-appropriate encryption (e.g., AES-256) in open/validated formats and standard algorithms shall be required. Keys shall not be stored in the cloud (i.e. at the cloud provider in question), but maintained by the cloud consumer or trusted key management provider. Key management and key usage shall be separated duties. | Yes, we use AES256 for data at rest. |
Governance and Risk Management Baseline Requirements | Baseline security requirements shall be established for developed or acquired, organizationally-owned or managed, physical or virtual, applications and infrastructure system and network components that comply with applicable legal, statutory and regulatory compliance obligations. Deviations from standard baseline configurations must be authorized following change management policies and procedures prior to deployment, provisioning, or use. Compliance with security baseline requirements must be reassessed at least annually unless an alternate frequency has been established and authorized based on business need. | We are complied with this - We have Compliance Procedure in place and reviewed by the management annually |
Governance and Risk Management Data Focus Risk Assessments | Risk assessments associated with data governance requirements shall be conducted at planned intervals and shall consider the following: • Awareness of where sensitive data is stored and transmitted across applications, databases, servers, and network infrastructure • Compliance with defined retention periods and end-of-life disposal requirements • Data classification and protection from unauthorized use, access, loss, destruction, and falsification | We are complied - We have Risk Management Procedure and Data classification policy to protect unauthorized use, access, loss, destruction, and falsification |
Governance and Risk Management Management Oversight | Managers are responsible for maintaining awareness of, and complying with, security policies, procedures, and standards that are relevant to their area of responsibility. | We are complied - we provied information security awareness training to all the employees annually once we per the ISMS requirements. |
Governance and Risk Management Management Program | An Information Security Management Program (ISMP) shall be developed, documented, approved, and implemented that includes administrative, technical, and physical safeguards to protect assets and data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The security program shall include, but not be limited to, the following areas insofar as they relate to the characteristics of the business: • Risk management • Security policy • Organization of information security • Asset management • Human resources security • Physical and environmental security • Communications and operations management • Access control • Information systems acquisition, development, and maintenance | We are complied with the requirements - We have Information security management framework consisted of all the required policies and procedures. For ex - Risk management • Security policy • Organization of information security • Asset management • Human resources security • Physical and environmental security • Communications and operations management • Access control policy etc.... |
Governance and Risk Management Management Support/Involvement | Executive and line management shall take formal action to support information security through clearly-documented direction and commitment, and shall ensure the action has been assigned. | We are complied - The management is reviewing the performance if the Information Security department and taking necessing actions and providing the recommondation on a timely basis. And all the ISMS policies has been reviewed and approved by the management yearly once as per the requirements. |
Governance and Risk Management Policy | Information security policies and procedures shall be established and made readily available for review by all impacted personnel and external business relationships. Information security policies must be authorized by the organization's business leadership (or other accountable business role or function) and supported by a strategic business plan and an information security management program inclusive of defined information security roles and responsibilities for business leadership. | We are complied. We have all the required ISMS policies and procedures in place. |
Governance and Risk Management Policy Enforcement | A formal disciplinary or sanction policy shall be established for employees who have violated security policies and procedures. Employees shall be made aware of what action might be taken in the event of a violation, and disciplinary measures must be stated in the policies and procedures. | We have Desciplinary policy in place and created an awareness among employees regarding voilation of the polciies via ISMS training. |
Governance and Risk Management Policy Impact on Risk Assessments | Risk assessment results shall include updates to security policies, procedures, standards, and controls to ensure that they remain relevant and effective. | We have Risk Management Procedure as per the requirement. We are complied. |
Governance and Risk Management Policy Reviews | The organization's business leadership (or other accountable business role or function) shall review the information security policy at planned intervals or as a result of changes to the organization to ensure its continuing alignment with the security strategy, effectiveness, accuracy, relevance, and applicability to legal, statutory, or regulatory compliance obligations. | We are complied with the requirements - The management is reviewing the performance if the Information Security department and taking necessing actions and providing the recommondation on a timely basis. |
Governance and Risk Management Risk Assessments | Aligned with the enterprise-wide framework, formal risk assessments shall be performed at least annually or at planned intervals, (and in conjunction with any changes to information systems) to determine the likelihood and impact of all identified risks using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risk shall be determined independently, considering all risk categories (e.g., audit results, threat and vulnerability analysis, and regulatory compliance). | We are conducting Risk assessment at least once in a year as per the ISMS requirements. |
Governance and Risk Management Risk Management Framework | Risks shall be mitigated to an acceptable level. Acceptance levels based on risk criteria shall be established and documented in accordance with reasonable resolution time frames and stakeholder approval. | Risk criteria has been established as per the Risk management procedure and consuct risk assessment once in a year as per the compliance requirements. |
Human Resources Asset Returns | Upon termination of workforce personnel and/or expiration of external business relationships, all organizationally-owned assets shall be returned within an established period. | We are complied as a part of offboarding procedure. |
Human Resources Background Screening | Pursuant to local laws, regulations, ethics, and contractual constraints, all employment candidates, contractors, and third parties shall be subject to background verification proportional to the data classification to be accessed, the business requirements, and acceptable risk. | We conduct background verification as per the compliance requirements and kept all the required data. |
Human Resources Employment Agreements | Employment agreements shall incorporate provisions and/or terms for adherence to established information governance and security policies and must be signed by newly hired or on-boarded workforce personnel (e.g., full or part-time employee or contingent staff) prior to granting workforce personnel user access to corporate facilities, resources, and assets. | We are complied with it. Also all the employees have signed for the Non disclosure agreements. |
Human Resources Employment Termination | Roles and responsibilities for performing employment termination or change in employment procedures shall be assigned, documented, and communicated. | We are complied - Roles, Responsibilities & Authorities has been defined and communicated to the respective individials. |
Human Resources Mobile Device Management | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to manage business risks associated with permitting mobile device access to corporate resources and may require the implementation of higher assurance compensating controls and acceptable-use policies and procedures (e.g., mandated security training, stronger identity, entitlement and access controls, and device monitoring). | We are complied - We have mobile device management polciy. |
Human Resources Non-Disclosure Agreements | Requirements for non-disclosure or confidentiality agreements reflecting the organization's needs for the protection of data and operational details shall be identified, documented, and reviewed at planned intervals. | We have non-disclosure or confidentiality agreements and signed by all the employees and external parties. |
Human Resources Roles / Responsibilities | Roles and responsibilities of contractors, employees, and third-party users shall be documented as they relate to information assets and security. | We are complied - Roles, Responsibilities & Authorities has been defined and communicated to the respective individials. |
Human Resources Technology Acceptable Use | Policies and procedures shall be established, and supporting business processes and technical measures implemented, for defining allowances and conditions for permitting usage of organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components. Additionally, defining allowances and conditions to permit usage of personal mobile devices and associated applications with access to corporate resources (i.e., BYOD) shall be considered and incorporated as appropriate. | We are complied with the requirement - We have controls in place through policies and procedure. |
Human Resources Training / Awareness | A security awareness training program shall be established for all contractors, third-party users, and employees of the organization and mandated when appropriate. All individuals with access to organizational data shall receive appropriate awareness training and regular updates in organizational procedures, processes, and policies relating to their professional function relative to the organization. | we are complied - We provide Information security awareness traning to all the employees and contractors, third-party users. |
Human Resources User Responsibility | All personnel shall be made aware of their roles and responsibilities for: • Maintaining awareness and compliance with established policies and procedures and applicable legal, statutory, or regulatory compliance obligations. • Maintaining a safe and secure working environment | We are complied - We have Roles, Responsibilities & Authorities policy in place as per the compliance requirements. |
Human Resources Workspace | Policies and procedures shall be established to require that unattended workspaces do not have openly visible (e.g., on a desktop) sensitive documents and user computing sessions are disabled after an established period of inactivity. | we are complied - we have an access control policy and IT Team have implemented accounts lockout policy to safeguard the sestive documents and personal information. |
Identity & Access Management Audit Tools Access | Access to, and use of, audit tools that interact with the organization's information systems shall be appropriately segmented and restricted to prevent compromise and misuse of log data. | Yes, We comply. |
Identity & Access Management Credential Lifecycle / Provision Management | User access policies and procedures shall be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data and organizationally-owned or managed (physical and virtual) application interfaces and infrastructure network and systems components. These policies, procedures, processes, and measures must incorporate the following: • Procedures and supporting roles and responsibilities for provisioning and de-provisioning user account entitlements following the rule of least privilege based on job function (e.g., internal employee and contingent staff personnel changes, customer-controlled access, suppliers' business relationships, or other third-party business relationships) • Business case considerations for higher levels of assurance and multi-factor authentication secrets (e.g., management interfaces, key generation, remote access, segregation of duties, emergency access, large-scale provisioning or geographically-distributed deployments, and personnel redundancy for critical systems) • Access segmentation to sessions and data in multi-tenant architectures by any third party (e.g., provider and/or other customer (tenant)) • Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and federation) • Account credential lifecycle management from instantiation through revocation • Account credential and/or identity store minimization or re-use when feasible • Authentication, authorization, and accounting (AAA) rules for access to data and sessions (e.g., encryption and strong/multi-factor, expireable, non-shared authentication secrets) • Permissions and supporting capabilities for customer (tenant) controls over authentication, authorization, and accounting (AAA) rules for access to data and sessions • Adherence to applicable legal, statutory, or regulatory compliance requirements | We are complied - Access control policy and Information security policies has been established as per the requirements. We provide an accesss to the data only to an authorised individial. |
Identity & Access Management Diagnostic / Configuration Ports Access | User access to diagnostic and configuration ports shall be restricted to authorized individuals and applications. | Complied with the requirements though End point security installation. |
Identity & Access Management Policies and Procedures | Policies and procedures shall be established to store and manage identity information about every person who accesses IT infrastructure and to determine their level of access. Policies shall also be developed to control access to network resources based on user identity. | We are complied - We have policies and procedure in place to store and manage identity information. |
Identity & Access Management Segregation of Duties | User access policies and procedures shall be established, and supporting business processes and technical measures implemented, for restricting user access as per defined segregation of duties to address business risks associated with a user-role conflict of interest. | We are complied - We have policies and procedure in place to have control on access of data. We provide access only to an authorised individials. |
Identity & Access Management Source Code Access Restriction | Access to the organization's own developed applications, program, or object source code, or any other form of intellectual property (IP), and use of proprietary software shall be appropriately restricted following the rule of least privilege based on job function as per established user access policies and procedures. | We have role based access system to make sure that only the authorised individual have an access to the required information. |
Identity & Access Management Third Party Access | The identification, assessment, and prioritization of risks posed by business processes requiring third-party access to the organization's information systems and data shall be followed by coordinated application of resources to minimize, monitor, and measure likelihood and impact of unauthorized or inappropriate access. Compensating controls derived from the risk analysis shall be implemented prior to provisioning access. | Yes, We comply. |
Identity & Access Management Trusted Sources | Policies and procedures are established for permissible storage and access of identities used for authentication to ensure identities are only accessible based on rules of least privilege and replication limitation only to users explicitly defined as business necessary. | We have role based access system to make sure that only the authorised individual have an access to the required information. |
Identity & Access Management User Access Authorization | Provisioning user access (e.g., employees, contractors, customers (tenants), business partners and/or supplier relationships) to data and organizationally-owned or managed (physical and virtual) applications, infrastructure systems, and network components shall be authorized by the organization's management prior to access being granted and appropriately restricted as per established policies and procedures. Upon request, provider shall inform customer (tenant) of this user access, especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control. | We have role based access system to make sure that only the authorised individual have an access to the required information. |
Identity & Access Management User Access Reviews | User access shall be authorized and revalidated for entitlement appropriateness, at planned intervals, by the organization's business leadership or other accountable business role or function supported by evidence to demonstrate the organization is adhering to the rule of least privilege based on job function. For identified access violations, remediation must follow established user access policies and procedures. | We have role based access system through access control policy to make sure that only the authorised individual have an access to the required information. |
Identity & Access Management User Access Revocation | Timely de-provisioning (revocation or modification) of user access to data and organizationally-owned or managed (physical and virtual) applications, infrastructure systems, and network components, shall be implemented as per established policies and procedures and based on user's change in status (e.g., termination of employment or other business relationship, job change or transfer). Upon request, provider shall inform customer (tenant) of these changes, especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control. | We have change management policy and Infrastructure Change Control Procedure to comply with this requirements. |
Identity & Access Management User ID Credentials | Internal corporate or customer (tenant) user account credentials shall be restricted as per the following, ensuring appropriate identity, entitlement, and access management and in accordance with established policies and procedures: • Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and Federation) • Account credential lifecycle management from instantiation through revocation • Account credential and/or identity store minimization or re-use when feasible • Adherence to industry acceptable and/or regulatory compliant authentication, authorization, and accounting (AAA) rules (e.g., strong/multi-factor, expireable, non-shared authentication secrets) | Yes, We comply. |
Identity & Access Management Utility Programs Access | Utility programs capable of potentially overriding system, object, network, virtual machine, and application controls shall be restricted. | Yes, We comply. |
Infrastructure & Virtualization Security Audit Logging / Intrusion Detection | Higher levels of assurance are required for protection, retention, and lifecyle management of audit logs, adhering to applicable legal, statutory or regulatory compliance obligations and providing unique user access accountability to detect potentially suspicious network behaviors and/or file integrity anomalies, and to support forensic investigative capabilities in the event of a security breach. | Yes, We comply. |
Infrastructure & Virtualization Security Change Detection | The provider shall ensure the integrity of all virtual machine images at all times. Any changes made to virtual machine images must be logged and an alert raised regardless of their running state (e.g. dormant, off, or running). The results of a change or move of an image and the subsequent validation of the image's integrity must be immediately available to customers through electronic methods (e.g. portals or alerts). | Yes, We comply. |
Infrastructure & Virtualization Security Clock Synchronization | A reliable and mutually agreed upon external time source shall be used to synchronize the system clocks of all relevant information processing systems to facilitate tracing and reconstitution of activity timelines. | Yes, We comply. |
Infrastructure & Virtualization Security Information System Documentation | The availability, quality, and adequate capacity and resources shall be planned, prepared, and measured to deliver the required system performance in accordance with legal, statutory, and regulatory compliance obligations. Projections of future capacity requirements shall be made to mitigate the risk of system overload. | Yes, We comply. |
Infrastructure & Virtualization Security Management - Vulnerability Management | Implementers shall ensure that the security vulnerability assessment tools or services accommodate the virtualization technologies used (e.g. virtualization aware). | Yes, We comply. |
Infrastructure & Virtualization Security Network Security | Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, and ports, and by compensating controls. | Yes, We comply. |
Infrastructure & Virtualization Security OS Hardening and Base Conrols | Each operating system shall be hardened to provide only necessary ports, protocols, and services to meet business needs and have in place supporting technical controls such as: antivirus, file integrity monitoring, and logging as part of their baseline operating build standard or template. | Yes, We comply. |
Infrastructure & Virtualization Security Production / Non-Production Environments | Production and non-production environments shall be separated to prevent unauthorized access or changes to information assets. Separation of the environments may include: stateful inspection firewalls, domain/realm authentication sources, and clear segregation of duties for personnel accessing these environments as part of their job duties. | Yes, We comply. |
Infrastructure & Virtualization Security Segmentation | Multi-tenant organizationally-owned or managed (physical and virtual) applications, and infrastructure system and network components, shall be designed, developed, deployed and configured such that provider and customer (tenant) user access is appropriately segmented from other tenant users, based on the following considerations: • Established policies and procedures • Isolation of business critical assets and/or sensitive user data, and sessions that mandate stronger internal controls and high levels of assurance • Compliance with legal, statutory and regulatory compliance obligations | Yes, We comply. |
Infrastructure & Virtualization Security VM Security - vMotion Data Protection | Secured and encrypted communication channels shall be used when migrating physical servers, applications, or data to virtualized servers and, where possible, shall use a network segregated from production-level networks for such migrations. | Yes, We comply. |
Infrastructure & Virtualization Security VMM Security - Hypervisor Hardening | Access to all hypervisor management functions or administrative consoles for systems hosting virtualized systems shall be restricted to personnel based upon the principle of least privilege and supported through technical controls (e.g., two-factor authentication, audit trails, IP address filtering, firewalls, and TLS encapsulated communications to the administrative consoles). | Yes, We comply. |
Infrastructure & Virtualization Security Wireless Security | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following: • Perimeter firewalls implemented and configured to restrict unauthorized traffic • Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings) • User access to wireless network devices restricted to authorized personnel • The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network | Yes, We comply. |
Infrastructure & Virtualization Security Network Architecture | Network architecture diagrams shall clearly identify high-risk environments and data flows that may have legal compliance impacts. Technical measures shall be implemented and shall apply defense-in-depth techniques (e.g., deep packet analysis, traffic throttling, and black-holing) for detection and timely response to network-based attacks associated with anomalous ingress or egress traffic patterns (e.g., MAC spoofing and ARP poisoning attacks) and/or distributed denial-of-service (DDoS) attacks. | Yes, We comply. |
Interoperability & Portability APIs | The provider shall use open and published APIs to ensure support for interoperability between components and to facilitate migrating applications. | Yes, We comply. |
Interoperability & Portability Data Request | All structured and unstructured data shall be available to the customer and provided to them upon request in an industry-standard format (e.g., .doc, .xls, .pdf, logs, and flat files) | Yes, We comply. |
Interoperability & Portability Policy & Legal | Policies, procedures, and mutually-agreed upon provisions and/or terms shall be established to satisfy customer (tenant) requirements for service-to-service application (API) and information processing interoperability, and portability for application development and information exchange, usage, and integrity persistence. | Yes, We comply. |
Interoperability & Portability Standardized Network Protocols | The provider shall use secure (e.g., non-clear text and authenticated) standardized network protocols for the import and export of data and to manage the service, and shall make available a document to consumers (tenants) detailing the relevant interoperability and portability standards that are involved. | Yes, We comply. |
Interoperability & Portability Virtualization | The provider shall use an industry-recognized virtualization platform and standard virtualization formats (e.g., OVF) to help ensure interoperability, and shall have documented custom changes made to any hypervisor in use and all solution-specific virtualization hooks available for customer review. | Yes, We comply. |
Mobile Security Anti-Malware | Anti-malware awareness training, specific to mobile devices, shall be included in the provider's information security awareness training. | We are complied with this - We provide information security awareness training |
Mobile Security Application Stores | A documented list of approved application stores has been defined as acceptable for mobile devices accessing or storing provider managed data. | We are complied with it by having Mobile device Management Policy |
Mobile Security Approved Applications | The company shall have a documented policy prohibiting the installation of non-approved applications or approved applications not obtained through a pre-identified application store. | We are complied with Mobile device Management Policy |
Mobile Security Approved Software for BYOD | The BYOD policy and supporting awareness training clearly states the approved applications, application stores, and application extensions and plugins that may be used for BYOD usage. | We are complied with it - We have BYOD policy and conducted the awareness training as per the requirements. |
Mobile Security Awareness and Training | The provider shall have a documented mobile device policy that includes a documented definition for mobile devices and the acceptable usage and requirements for all mobile devices. The provider shall post and communicate the policy and requirements through the company's security awareness and training program. | We are complied with it by having Mobile device Management Policy |
Mobile Security Cloud Based Services | All cloud-based services used by the company's mobile devices or BYOD shall be pre-approved for usage and the storage of company business data. | We have Mobile device policy and BYOD Policies in place and given the proper guidelines for usage as per the requirements. |
Mobile Security Compatibility | The company shall have a documented application validation process to test for mobile device, operating system, and application compatibility issues. | Yes, We comply. |
Mobile Security Device Eligibility | The BYOD policy shall define the device and eligibility requirements to allow for BYOD usage. | We are complied with requirements - We have well defined BYOD policy in place. |
Mobile Security Device Inventory | An inventory of all mobile devices used to store and access company data shall be kept and maintained. All changes to the status of these devices (i.e., operating system and patch levels, lost or decommissioned status, and to whom the device is assigned or approved for usage (BYOD)) will be included for each device in the inventory. | We are complied with the requrements. |
Mobile Security Device Management | A centralized, mobile device management solution shall be deployed to all mobile devices permitted to store, transmit, or process customer data. | We do not have a centralized mobile device management solution but having control via Google workspace admin console on the Mobile devices. |
Mobile Security Encryption | The mobile device policy shall require the use of encryption either for the entire device or for data identified as sensitive on all mobile devices and shall be enforced through technology controls. | We are complied with the requrements. |
Mobile Security Jailbreaking and Rooting | The mobile device policy shall prohibit the circumvention of built-in security controls on mobile devices (e.g. jailbreaking or rooting) and shall enforce the prohibition through detective and preventative controls on the device or through a centralized device management system (e.g. mobile device management). | We are complied with the requrements. |
Mobile Security Legal | The BYOD policy includes clarifying language for the expectation of privacy, requirements for litigation, e-discovery, and legal holds. The BYOD policy shall clearly state the expectations regarding the loss of non-company data in the case a wipe of the device is required. | We are complied with the requrements. |
Mobile Security Lockout Screen | BYOD and/or company-owned devices are configured to require an automatic lockout screen, and the requirement shall be enforced through technical controls. | We are complied with the requrements. |
Mobile Security Operating Systems | Changes to mobile device operating systems, patch levels, and/or applications shall be managed through the company's change management processes. | We are complied with the requrements. |
Mobile Security Passwords | Password policies, applicable to mobile devices, shall be documented and enforced through technical controls on all company devices or devices approved for BYOD usage, and shall prohibit the changing of password/PIN lengths and authentication requirements. | We are complied with the requrements. |
Mobile Security Policy | The mobile device policy shall require the BYOD user to perform backups of data, prohibit the usage of unapproved application stores, and require the use of anti-malware software (where supported). | We are complied with the requrements. |
Mobile Security Remote Wipe | All mobile devices permitted for use through the company BYOD program or a company-assigned mobile device shall allow for remote wipe by the company's corporate IT or shall have all company-provided data wiped by the company's corporate IT. | We are complied with the requrements. |
Mobile Security Security Patches | Mobile devices connecting to corporate networks, or storing and accessing company information, shall allow for remote software version/patch validation. All mobile devices shall have the latest available security-related patches installed upon general release by the device manufacturer or carrier and authorized IT personnel shall be able to perform these updates remotely. | We are complied with the requrements. We have defined in the policy that Devices must be kept up to date with manufacturer or network provided patches. |
Mobile Security Users | The BYOD policy shall clarify the systems and servers allowed for use or access on a BYOD-enabled device. | We are complied with the requrements. |
Security Incident Management, E-Discovery & Cloud Forensics Contact / Authority Maintenance | Points of contact for applicable regulation authorities, national and local law enforcement, and other legal jurisdictional authorities shall be maintained and regularly updated (e.g., change in impacted-scope and/or a change in any compliance obligation) to ensure direct compliance liaisons have been established and to be prepared for a forensic investigation requiring rapid engagement with law enforcement. | We are complied with the requrements. |
Security Incident Management, E-Discovery & Cloud Forensics Incident Management | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to triage security-related events and ensure timely and thorough incident management, as per established IT service management policies and procedures. | We are complied with the requrements. We also have incident management plan in place and taken care by Information security team. |
Security Incident Management, E-Discovery & Cloud Forensics Incident Reporting | Workforce personnel and external business relationships shall be informed of their responsibilities and, if required, shall consent and/or contractually agree to report all information security events in a timely manner. Information security events shall be reported through predefined communications channels in a timely manner adhering to applicable legal, statutory, or regulatory compliance obligations. | We are complied with it - We have an conyratcs and SLA/MSA and all the external parties have signed the NDA as well. |
Security Incident Management, E-Discovery & Cloud Forensics Incident Response Legal Preparation | Proper forensic procedures, including chain of custody, are required for the presentation of evidence to support potential legal action subject to the relevant jurisdiction after an information security incident. Upon notification, customers and/or other external business partners impacted by a security breach shall be given the opportunity to participate as is legally permissible in the forensic investigation. | Yes, We comply. |
Security Incident Management, E-Discovery & Cloud Forensics Incident Response Metrics | Mechanisms shall be put in place to monitor and quantify the types, volumes, and costs of information security incidents. | We have Security Incident Management plan and communicated to all the employees. |
Supply Chain Management, Transparency and Accountability Data Quality and Integrity | Providers shall inspect, account for, and work with their cloud supply-chain partners to correct data quality errors and associated risks. Providers shall design and implement controls to mitigate and contain data security risks through proper separation of duties, role-based access, and least-privilege access for all personnel within their supply chain. | Yes, We comply. |
Supply Chain Management, Transparency and Accountability Incident Reporting | The provider shall make security incident information available to all affected customers and providers periodically through electronic methods (e.g. portals). | Yes, We comply. |
Supply Chain Management, Transparency and Accountability Network / Infrastructure Services | Business-critical or customer (tenant) impacting (physical and virtual) application and system-system interface (API) designs and configurations, and infrastructure network and systems components, shall be designed, developed, and deployed in accordance with mutually agreed-upon service and capacity-level expectations, as well as IT governance and service management policies and procedures. | Yes, We comply. |
Supply Chain Management, Transparency and Accountability Provider Internal Assessments | The provider shall perform annual internal assessments of conformance to, and effectiveness of, its policies, procedures, and supporting measures and metrics. | We perform annual internal assessments of conformance to, and effectiveness of, its policies, procedures, and supporting measures and metrics. |
Supply Chain Management, Transparency and Accountability Supply Chain Agreements | Supply chain agreements (e.g., SLAs) between providers and customers (tenants) shall incorporate at least the following mutually-agreed upon provisions and/or terms: • Scope of business relationship and services offered (e.g., customer (tenant) data acquisition, exchange and usage, feature sets and functionality, personnel and infrastructure network and systems components for service delivery and support, roles and responsibilities of provider and customer (tenant) and any subcontracted or outsourced business relationships, physical geographical location of hosted services, and any known regulatory compliance considerations) • Information security requirements, provider and customer (tenant) primary points of contact for the duration of the business relationship, and references to detailed supporting and relevant business processes and technical measures implemented to enable effectively governance, risk management, assurance and legal, statutory and regulatory compliance obligations by all impacted business relationships • Notification and/or pre-authorization of any changes controlled by the provider with customer (tenant) impacts • Timely notification of a security incident (or confirmed breach) to all customers (tenants) and other business relationships impacted (i.e., up- and down-stream impacted supply chain) • Assessment and independent verification of compliance with agreement provisions and/or terms (e.g., industry-acceptable certification, attestation audit report, or equivalent forms of assurance) without posing an unacceptable business risk of exposure to the organization being assessed • Expiration of the business relationship and treatment of customer (tenant) data impacted • Customer (tenant) service-to-service application (API) and data interoperability and portability requirements for application development and information exchange, usage, and integrity persistence | We are complied with it - We have an conyratcs and SLA/MSA and all the external parties have signed the NDA as well. |
Supply Chain Management, Transparency and Accountability Supply Chain Governance Reviews | Providers shall review the risk management and governance processes of their partners so that practices are consistent and aligned to account for risks inherited from other members of that partner's cloud supply chain. | We have Risk Management Procedures in place. |
Supply Chain Management, Transparency and Accountability Supply Chain Metrics | Policies and procedures shall be implemented to ensure the consistent review of service agreements (e.g., SLAs) between providers and customers (tenants) across the relevant supply chain (upstream/downstream). Reviews shall performed at least annually and identity non-conformance to established agreements. The reviews should result in actions to address service-level conflicts or inconsistencies resulting from disparate supplier relationships. | We review the SLA/MSA and NDA with external parties annually. |
Supply Chain Management, Transparency and Accountability Third Party Assessment | Providers shall assure reasonable information security across their information supply chain by performing an annual review. The review shall include all partners/third party-providers upon which their information supply chain depends on. | We review the SLA/MSA and NDA with external parties annually. |
Supply Chain Management, Transparency and Accountability Third Party Audits | Third-party service providers shall demonstrate compliance with information security and confidentiality, access control, service definitions, and delivery level agreements included in third-party contracts. Third-party reports, records, and services shall undergo audit and review at least annually to govern and maintain compliance with the service delivery agreements. | We have ISMS framework including all the required polcieis and procedures as per the compliance requirements. |
Threat and Vulnerability Management Anti-Virus / Malicious Software | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to prevent the execution of malware on organizationally-owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components. | We conduct Vulnerability assessment and Penetration testing on a timely interval and have controls on Anti-Virus / Malicious Software throgh End point security. |
Threat and Vulnerability Management Vulnerability / Patch Management | Policies and procedures shall be established, and supporting processes and technical measures implemented, for timely detection of vulnerabilities within organizationally-owned or managed applications, infrastructure network and system components (e.g. network vulnerability assessment, penetration testing) to ensure the efficiency of implemented security controls. A risk-based model for prioritizing remediation of identified vulnerabilities shall be used. Changes shall be managed through a change management process for all vendor-supplied patches, configuration changes, or changes to the organization's internally developed software. Upon request, the provider informs customer (tenant) of policies and procedures and identfied weaknesses especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control. | We conduct Vulnerability assessment and Penetration testing on a timely interval and have controls on Anti-Virus / Malicious Software throgh End point security. |
Threat and Vulnerbility Management Mobile Code | Policies and procedures shall be established, and supporting business processes and technical measures implemented, to prevent the execution of unauthorized mobile code, defined as software transferred between systems over a trusted or untrusted network and executed on a local system without explicit installation or execution by the recipient, on organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components. | We have Threat and Vulnerabilities Management procedure and we conduct Vulnerability assessment and Penetration testing through an athorised vendor. |
Last updated