Segregation of Environments
Production Data Use is Restricted
Baseline Configurations
Uptime and Availability Monitoring
Backup Restoration Testing
Business Continuity and Disaster Recovery Policy
Internal Control Policy
Code of Conduct
Organizational Chart
Access to Customer Data is Restricted
Disposal of Customer Data
Data Classification Policy
Third-Party Penetration Test
Vulnerability and Patch Management Policy
Vulnerability Scanning
Tracking a Security Incident
Incident Response Plan Testing
Incident Response Plan
Vendor Risk Assessment
Risk Register
Vendor Risk Management Policy
Endpoint Security
Network Security Policy
Automated Alerting for Security Events
Complex Passwords
Access Control and Termination Policy
Unique Access IDs
Physical Security Policy