Security

TODO: insert GovAssure baseline? or excerpt from?

How does your organization authenticate and manage non-human service accounts?

How does your organization authenticate and manage user identities?

How does your organization ensure that users have appropriate permissions aligned with their roles?

How does your organization handle user provisioning for cloud systems, focusing on authentication for human users?

How does your organization manage authentication for non-human service accounts in cloud systems?

How does your organization manage risks?

How does your organization manage staff identities?

How does your organization mitigate risks associated with privileged internal threat actors?

How does your organization monitor and manage security within its software supply chain?

How does your organization monitor and manage threats, vulnerabilities, and misconfigurations?

What approach does your organization take towards network architecture for security?

What is your organization's approach to implementing 2FA/MFA for securing access?

What is your organization's approach to managing privileged access?

What measures are in place in your organization to mitigate the risk of data breaches, including exfiltration, corruption, deletion, and non-availability?

Reset Section Save and continue