1.1 External Vulnerability Reports
#
Do you have a process in place to accept and process external reports of security issues in your products and/or services?
If yes, please describe the process.
1.2 Customer Testing
#
Do you allow customers to safely and effectively perform testing against your products and/or services?
If yes, please describe the process.
1.3 Self-Assessment
#
Do you perform annual reviews of your application security controls for each qualifying product or service to identify corrective actions or areas of continued improvement?
If yes, please describe the process.
1.4 External Testing
#
Do you schedule and perform regular third-party penetration testing against your products and/or services?
If yes, please describe the process.
1.5 Training
#
Do you provide regular and ongoing security awareness training for your employees?
If yes, please describe the process.
1.6 Compliance
#
Do you identify and complete relevant compliance obligations based on your industry and regulatory requirements?
If yes, please describe the process.
1.7 Incident Handling
#
Do you have processes in place to ensure the smooth handling of security and privacy incidents?
If yes, please describe the process.
1.8 Data Handling
#
Do you have a process in place to handle data stored on removable or decommissioned hardware?
If yes, please describe the process.