marketing, analytics)?ĭo you process special categories of sensitive data (i.e. Has the app been Cloud Security Alliance (CSA Star) certified?ĭo you have GDPR or other privacy or data protection requirements or obligations (such as CCPA)?ĭoes the app have an external-facing privacy notice that describes how it collects, uses, shares, and stores customer data?ĭoes the app perform automated decision making, including profiling that could have a legal effect or similar impact?ĭoes the app process customer data for a secondary purpose not described in the privacy notice (i.e. Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant?ĭoes the app comply with Family Educational Rights and Privacy Act (FERPA)?ĭoes the app comply with Children's Online Privacy Protection Act (COPPA)?ĭoes the app comply with Sarbanes-Oxley Act (SOX)? Is the app International Organization for Standardization (ISO 27001) certified?ĭoes the app comply with International Organization for Standardization (ISO 27018)?ĭoes the app comply with International Organization for Standardization (ISO 27017)?ĭoes the app comply with International Organization for Standardization (ISO 27002)? Questions or updates to any of the information you see here? Contact us!ĭoes the app comply with the Health Insurance Portability and Accounting Act (HIPAA)?ĭoes the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)?ĭoes the app comply with Service Organization Controls (SOC 1)?ĭoes the app comply with Service Organization Controls (SOC 2)?ĭoes the app comply with Service Organization Controls (SOC 3)?ĭo you carry out annual PCI DSS assessments against the appand its supporting environment? When a security event is detected are alerts automatically sent to an employee for triage?ĭo you have a formal information security risk management process established?ĭo you have a formal security incident response process documented and established?ĭo you report app or service data breaches to supervisory authorities and individuals affected by the breach within 72 hours of detection? Multifactor Authentication (MFA) enabled for:ĬodeRepositories, DNSManagement, Credentialĭo you have an established process for provisioning, modification, and deletion of employee accounts?ĭo you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app?ĭo you have event logging set up on all system components supporting your app?Īre all logs reviewed on a regular cadence by human or automated tooling to detect potential security events? Is an additional person reviewing and approving all code change requests submitted to production by the original developer?ĭo secure coding practices take into account common vulnerability classes such as OWASP Top 10? Informationĭo you perform annual penetration testing on the app?ĭoes the app have a documented disaster recovery plan, including a backup and restore strategy?ĭoes your environment use traditional anti-malware protection or application controls?ĭo you have an established process for indentifying and risk ranking security vulnerabilities?ĭo you have a policy that governs your service level agreement (SLA) for applying patches?ĭo you carry out patch management activities according to your patching policy SLAs?ĭoes your enviroment have any unsupported operating systems or software?ĭo you conduct quarterly vulnerability scanning on your app and the infastructure that supports it?ĭo you have a firewall installed on your external network boundary?ĭo you have an established change management process used to review and approve change requests before they are deployed to production? ![]() Not a day goes by in our office where we don’t use these kinds of features, and we often wonder what we did without them.Information from the Microsoft Cloud App Security catalog appears below. Screen sharing is also useful for training. Whenever you need to show someone how to accomplish a task on their computer in a specific application, you can have them share their screen while you guide them through the process. ![]() We often use this feature to review and edit documents in real time. Any person in a meeting (not just the host) can share a document on their screen and everyone participating can see it. This works with just two people or a whole team. Gone are the days of trying to describe to someone else what you’re seeing. The ability to share your screen makes collaborating so much easier. If you’ve used an instant messaging client before, such as Cisco Jabber, you might already be used to a screen sharing feature. If you are new to collaboration, this is one of the big benefits.
0 Comments
Leave a Reply. |