| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| Data Encryption At Rest | |||
| Data Encryption In Transit | |||
| Access Controls | |||
| Data Retention & Disposal |
| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| Firewalls & Segmentation | |||
| Intrusion Detection/Prevention | |||
| Remote Access Security |
| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| Secure Development Practices | |||
| Vulnerability Management | |||
| Penetration Testing |
| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| ISO 27001 | |||
| SOC 2 | |||
| GDPR Compliance |
| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| Incident Response Plan | |||
| Notification & Escalation | |||
| Past Incidents |
| Criteria | Description | Compliance (Yes/No) | Comments/Evidence |
|---|---|---|---|
| BC/DR Plans | |||
| Backup Frequency | |||
| Testing and Review |