| Statement | Response | Score |
|---|---|---|
| Our company has a documented Remote Access policy | Sometimes | M |
| Our company has a documented Chanage Management policy | Sometimes | M |
| We understand our compliance obligations and regularly assess our adherence to those requirements | Neutral | M |
| We have purchased cyber liability insurance | Neutral | M |
| Our company has a documented Acceptable Use of IT Assets policy | Sometimes | M |
| We provide security training to our employees | Only at onboarding | L |
| Our company has a documented IT Asset Management policy | Sometimes | M |
| Our company has a documented Data Classification and Handling policy | Sometimes | M |
| Our company has a documented Third-Party Management policy | Sometimes | M |
| Our company has a documented Identity and Access Management policy | Sometimes | M |
| Our company has a documented Security Awareness and Training policy | Sometimes | M |
| Our company has a documented Backup and Recovery policy | Sometimes | M |
| We assess our third-party service providers and suppliers to evaluate their security controls and potential risk | Neutral | M |
| The last time we performed an IT security assessment was | 3+ years ago | L |
| Our company has a documented Data Retention and Disposal policy | Sometimes | M |
| Statement | Response | Score |
|---|---|---|
| The last time we performed an external penetration test on our internet facing systems was | 3+ years ago | M |
| We have implemented remote access solutions for our internal systems | Sometimes | M |
| Our company has a well documented inventory of our network infrastructure | Neutral | M |
| We have implemented firewalls with Intrusion Detection and Intrusion Prevention capabilities enabled | Neutral | M |
| We require multi-factor authentication for our remote access solutions | Neutral | M |
| Statement | Response | Score |
|---|---|---|
| Our company has a well documented inventory of our systems and applications | Neutral | M |
| Access to our internal applications is controlled through Active Directory, not locally managed user accounts | Sometimes | H |
| We utilize Active Directory or another centralized authentication source for managing employee access | Sometimes | M |
| We develop proprietary applications for internal use | Sometimes | M |
| We have a documented change management process | Sometimes | M |
| The last time we performed internal vulnerability scanning on our internal systems and applications was | 3+ years ago | M |
| We have implemented antivirus/antimalware solutions on end user computers | Sometimes | M |
| Statement | Response | Score |
|---|---|---|
| We securely dispose of sensitive data when it is no longer needed | Neutral | M |
| We encrypt sensitive data when stored at rest, whether on end user workstations, removeable media, or internal databases. | Neutral | M |
| We require third-parties that we share sensitive data with to meet minimum data protection standards | Neutral | M |
| We encrypt sensitive data when transmitted internally or to third-parties | Neutral | M |
| We perform regular data backups | Sometimes | M |
| Our company maintains an inventory of where our most sensitive data is stored, processed, or transmitted. | Neutral | M |
| Statement | Response | Score |
|---|---|---|
| We last tested our business continuity, disaster recovery, and cybersecurity incident response plans | Within the last 12 months | H |
| Our IT team receives an alert when a security event occurs | Strongly Agree | H |
| Our company has documented business continuity and disaster recovery plans | Strongly Agree | H |
| Our company has documented cybersecurity incident response plans | Strongly Agree | H |