Warning — possible medium-risk issue
In many countries, it's a legal requirement to have an external policy or notice that describes how you handle and protect personally identifiable information. Even when that's not the case, it's best to inform your customers about your methods for ensuring the security and privacy of personal information.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
Security policies are an important tool for establishing authoritative security requirements and enforcing them throughout the company. Policies form the basis of any security program.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
To verify that theoretical controls work well in practice, you should have an internal audit process that checks for compliance with your own policies and reviews the adequacy of your security program overall.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
External audits help to ensure that your security program meets industry standards. In addition, it is often helpful to have a second set of eyes (particularly those of security experts) review the controls and their implementation. Many companies require their vendors to do annual, independent audits of the security program.
If you don't consider audits by independent third parties necessary, please explain below:
Warning — possible critical-risk issue
Most standards for information security programs require the implementation of risk assessment and risk management processes. These help identify, evaluate, and, if necessary, address the information security risks a company is exposed to.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
Employees handling sensitive information is still a major risk factor for most companies. It's important to have security controls in human resources, including:
- Job descriptions for all employees with access to confidential or sensitive information
- Granting access to data solely on a "need-to-know" basis, in accordance with the employee's job description and responsibilities; and revoking access when the need no longer exists
- Having processes in place to make sure access (both physical and logical) is revoked when an employee, intern, vendor, contractor, or other associate leaves the company or a contract ends
- Regularly training employees on current security and awareness best practices
- Running background checks on new hires and contractors
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
Anytime a customer, partner, subcontractor, vendor, or other third party is given access to sensitive information or systems, it's necessary to ensure they are capable of protecting this information at least as well as you do. Several recent data breaches in the news were caused by the compromise of a vendor somewhere down the line.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible critical-risk issue
Unfortunately, security incidents are no longer a matter of "if," but "when." Security incident response procedures are an absolute necessity. Make sure you have procedures in place to ensure that incidents are quickly and effectively identified, contained, and investigated.
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved:
Warning — possible high-risk issue
A change management process helps to ensure that the effect of a change is properly assessed before it's actually implemented. Although it's not necessary for everyday changes within defined procedures to undergo a formal review process, any change that is out of the ordinary should be reviewed and assessed before it's made. A good change management process has the following characteristics:
- Formal documentation is in place, including classification of changes by size and impact
- Change documentation is retained, both to facilitate auditing and so that changes can be reversed if necessary
- A member of the security team sits on the change review board, to make sure security impact is properly assessed
If you have compensating controls in place or feel that this issue does not constitute a risk in your specific circumstances, please explain below. If you're working to address this issue, include an estimate of when it will be resolved: