Monitoring

Infrastructure security

CONTROL

STATUS

Service infrastructure maintained

The company has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Tick

Intrusion detection system utilized

The company uses an intrusion detection system to provide continuous monitoring of the company’s network and early detection of potential security breaches.

Tick

Database replication utilized

The company’s databases are replicated to a secondary data center in real-time. Alerts are configured to notify administrators if replication fails.

Tick

Production database access restricted

The company restricts privileged access to databases to authorized users with a business need.

Tick

Remote access MFA enforced

The company’s production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

Tick

Production network access restricted

The company restricts privileged access to the production network to authorized users with a business need.

Tick

Unique production database authentication enforced

The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.

Tick

Remote access encrypted enforced

The company’s production systems can only be remotely accessed by authorized employees via an approved encrypted connection.

Tick

Encryption key access restricted

The company restricts privileged access to encryption keys to authorized users with a business need.

Tick

Production data segmented

The company prohibits confidential or sensitive customer data, by policy, from being used or stored in non-production systems/environments.

Tick

Production application access restricted

The company restricts privileged access to the application to authorized users with a business need.

Tick

Unique network system authentication enforced

The company requires authentication to the “production network” to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.

Tick

Firewall access restricted

The company restricts privileged access to the firewall to authorized users with a business need.

Tick
Scroll to Top