Maintenance
Last updated
Last updated
Copyright © 2009 - 2023
Maintenance | Supplier's response |
---|---|
Are there logging functions for security-related events, and if so, which events do you log?
Nothing
How do you protect logging features and logging tools against tampering and unauthorized access, including from your own staff?
n/a
Describe how you inform customers about technical vulnerabilities. How and when do you report that you have discovered a vulnerability or leak?
Via email immediately
Describe what you use for principles and methods for developing secure systems.
n/a
Do you have guidelines for information security in your development processes? How are these applied to major changes?
n/a
The supplier must have routines for reviewing and testing the availability and security of changes to business-critical operating platforms. Describe your routines for reviewing and testing the availability and security of changes to business-critical operating platforms.
n/a
Do you have documented routines for monitoring, detecting, analyzing, reporting, escalating, and handling security events and security incidents?
n/a
Do you follow the routines for handling safety incidents from current laws and regulations?
n/a
Briefly describe your routines to ensure the availability of the system/application.
Internal information
Describe your routines for continuity and disaster management. How is our data protected from a reliability and accessibility perspective?
Data is always stored on your side. We don’t have access to it.
What are your SLA levels? (What do you guarantee for availability/uptime?)
Same as Azure
How often is data backed up?
We don’t store data