Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant?ĭoes the app comply with Family Educational Rights and Privacy Act (FERPA)?ĭoes the app comply with Children's Online Privacy Protection Act (COPPA)?ĭoes the app comply with Sarbanes-Oxley Act (SOX)? Is the app International Organization for Standardization (ISO 27001) certified?ĭoes the app comply with International Organization for Standardization (ISO 27018)?ĭoes the app comply with International Organization for Standardization (ISO 27017)?ĭoes the app comply with International Organization for Standardization (ISO 27002)? When a security event is detected are alerts automatically sent to an employee for triage?ĭo you have a formal information security risk management process established?ĭo you have a formal security incident response process documented and established?ĭoes the app comply with the Health Insurance Portability and Accounting Act (HIPAA)?ĭoes the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)?ĭoes the app comply with Service Organization Controls (SOC 1)?ĭoes the app comply with Service Organization Controls (SOC 2)?ĭoes the app comply with Service Organization Controls (SOC 3)?ĭo you carry out annual PCI DSS assessments against the appand its supporting environment? Multifactor Authentication (MFA) enabled for:ĬodeRepositories, Credential, DNSManagementĭo you have an established process for provisioning, modification, and deletion of employee accounts?ĭo you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app?ĭo you have event logging set up on all system components supporting your app? Is an additional person reviewing and approving all code change requests submitted to production by the original developer?ĭo secure coding practices take into account common vulnerability classes such as OWASP Top 10? Informationĭo you perform annual penetration testing on the app?ĭoes the app have a documented disaster recovery plan, including a backup and restore strategy?ĭoes your environment use traditional anti-malware protection or application controls?ĭo you have an established process for indentifying and risk ranking security vulnerabilities?ĭo you have a policy that governs your service level agreement (SLA) for applying patches?ĭo you carry out patch management activities according to your patching policy SLAs?ĭoes your enviroment have any unsupported operating systems or software?ĭo you conduct quarterly vulnerability scanning on your app and the infastructure that supports it?ĭo you have a firewall installed on your external network boundary?ĭo you have an established change management process used to review and approve change requests before they are deployed to production? Information from the Microsoft Cloud App Security catalog appears below. Questions or updates to any of the information you see here? Contact us! How long is data retained after account termination?ĭo you have an established data access management process?ĭo you transfer customer data or customer content to third parties or sub-processors? If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored?ĭo you have an established data rentention and disposal process? Payment information is handled only by our third party payment providers (Paddle and Microsoft). Only if they purchase a license we store the object id, tenant id and email. If the user does not purchase a license we store nothing at all. All done via MS Graph, but no data is ever transferred away from the user's computer.ĭoes the app or underlying infrastructure store any Microsoft customer data? The add-in reads Outlook contacts and categories and it sends Outlook mails. Informationĭoes the app or underlying infrastructure process any data relating to a Microsoft customer or their device? This information has been provided by Sol Inventum OÜ about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |