Load answers from file:

Security and Privacy Programs Questionnaire🔗
Questionnaire Options🔗
Select the options that describe your project. These settings configure the questionnaire to fit different scenarios.
Security and Privacy🔗
Why this section matters: An information security and privacy program is a comprehensive set of policies, guidelines, and processes for identifying and addressing the threats and risks to company information and systems. An established security and privacy program can help assure customers that their information will be safe while it's in your custody.
Does your company have a strong, established security program, and does the scope of the program include all information processed as part of this project?
Security Controls🔗
Select the controls you currently maintain as elements of your information security and privacy program:

Warning — possible medium-risk issue

In many countries, it's a legal requirement to have an external policy or notice that describes how you handle and protect personally identifiable information. Even when that's not the case, it's best to inform your customers about your methods for ensuring the security and privacy of personal information.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

Security policies are an important tool for establishing authoritative security requirements and enforcing them throughout the company. Policies form the basis of any security program.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

To verify that theoretical controls work well in practice, you should have an internal audit process that checks for compliance with your own policies and reviews the adequacy of your security program overall.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

External audits help to ensure that your security program meets industry standards. In addition, it is often helpful to have a second set of eyes (particularly those of security experts) review the controls and their implementation. Many companies require their vendors to do annual, independent audits of the security program.

If you don't consider audits by independent third parties necessary, please explain below:

Warning — possible critical-risk issue

Most standards for information security programs require the implementation of risk assessment and risk management processes. These help identify, evaluate, and, if necessary, address the information security risks a company is exposed to.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

Employees handling sensitive information is still a major risk factor for most companies. It's important to have security controls in human resources, including:

  • Job descriptions for all employees with access to confidential or sensitive information
  • Granting access to data solely on a "need-to-know" basis, in accordance with the employee's job description and responsibilities; and revoking access when the need no longer exists
  • Having processes in place to make sure access (both physical and logical) is revoked when an employee, intern, vendor, contractor, or other associate leaves the company or a contract ends
  • Regularly training employees on current security and awareness best practices
  • Running background checks on new hires and contractors

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

Anytime a customer, partner, subcontractor, vendor, or other third party is given access to sensitive information or systems, it's necessary to ensure they are capable of protecting this information at least as well as you do. Several recent data breaches in the news were caused by the compromise of a vendor somewhere down the line.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible critical-risk issue

Unfortunately, security incidents are no longer a matter of "if," but "when." Security incident response procedures are an absolute necessity. Make sure you have procedures in place to ensure that incidents are quickly and effectively identified, contained, and investigated.

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:

Warning — possible high-risk issue

A change management process helps to ensure that the effect of a change is properly assessed before it's actually implemented. Although it's not necessary for everyday changes within defined procedures to undergo a formal review process, any change that is out of the ordinary should be reviewed and assessed before it's made. A good change management process has the following characteristics:

  • Formal documentation is in place, including classification of changes by size and impact
  • Change documentation is retained, both to facilitate auditing and so that changes can be reversed if necessary
  • A member of the security team sits on the change review board, to make sure security impact is properly assessed

If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Feedback🔗

Status: No changes
Download Answers Reset Questionnaire