Monitoring
Infrastructure security
CONTROL
STATUS
Service infrastructure maintained
The company has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Intrusion detection system utilized
The company uses an intrusion detection system to provide continuous monitoring of the company’s network and early detection of potential security breaches.

Database replication utilized
The company’s databases are replicated to a secondary data center in real-time. Alerts are configured to notify administrators if replication fails.

Production database access restricted
The company restricts privileged access to databases to authorized users with a business need.

Remote access MFA enforced
The company’s production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

Production network access restricted
The company restricts privileged access to the production network to authorized users with a business need.

Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.

Remote access encrypted enforced
The company’s production systems can only be remotely accessed by authorized employees via an approved encrypted connection.

Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.

Production data segmented
The company prohibits confidential or sensitive customer data, by policy, from being used or stored in non-production systems/environments.

Production application access restricted
The company restricts privileged access to the application to authorized users with a business need.

Unique network system authentication enforced
The company requires authentication to the “production network” to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.

Firewall access restricted
The company restricts privileged access to the firewall to authorized users with a business need.
