Data security
Last updated
Last updated
Copyright © 2009 - 2023
Data security | Supplier's response |
---|---|
How do you store credentials such as passwords? (It also applies to system accounts in source code).
n/a, you install an app in your SharePoint and use your Office 365 credentials
Do you have rules that staff follow regarding how authentication information is handled?
n/a
Briefly describe how you allocate and update permissions for users and system components.
n/a
The supplier must protect and ensure that there is traceability in the tools intended for system maintenance, its security configuration, and information. How do you protect these tools?
n/a
Do you own and operate your own data center, or is it outsourced to a third party or cloud-based solution such as AWS/Azure? To whom is it outsourced?
We store it in Azure.
If you have your own data center, what level of protection does it have?
n/a
Do you have routines that ensure that only authorized personnel have physical access to any potential data centers?
n/a
The supplier must have routines regarding change management for the parts that may affect the delivery’s security and availability. Do you have routines regarding change management for components, systems, and other factors that may affect the security and availability of the delivery?
n/a
What malware protection do you use, and how often is it updated?
n/a
What security measures have you implemented against unauthorized access and unauthorized information modifications?
Internal information
Which authentication solution have you opted for?
n/a
Do you have routines for conducting security tests, such as penetration testing?
n/a
How do you mitigate any security incidents?
n/a