Here are the controls implemented at Energy Efficiency Advisers to ensure compliance, as a part of our security program.
Production System User Review
Situational Awareness For Incidents
Identity Validation
Termination of Employment
Production Databases Access Restriction
Multi-factor Authentication
User Privileges Reviews
User Access Reviews
Encrypting Data At Rest
Inventory of Infrastructure Assets
Data Backups
Impact analysis
Limit Network Connections
Transmission Confidentiality
Anomalous Behavior
Capacity & Performance Management
Data used in Testing
Centralized Collection of Security Event Logs
Conspicuous Link To Privacy Notice
Unauthorized Activities
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Session Lock
Endpoints Encryption
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Performance Review
Periodic Policy Acknowledgement
Automated Reporting
Incident Reporting Assistance
Risk Framing
Risk Assessment
Fraud
Third-Party Criticality Assessments
Assigned Cybersecurity & Privacy Responsibilities
Internal Audit using Sprinto
Periodic Review & Update of Cybersecurity & Privacy Program
Management Review of Org Chart
Management Review of Risks
Management Review of Third-Party Risks
Subservice organization evaluation
Segregates Roles and Responsibilities
Testing
Asset Ownership Assignment
New Hire Security & Privacy Training Records
Periodic Security & Privacy Training Records
Updates During Installations / Removals
Inventory of Endpoint Assets