Name | Description |
Access Reviews | User access reviews and re-validation for least privilege and separation of duties purposes is completed on at least an annual basis. |
Administrative Authentication | Administrative authentication is controlled via an Authentication account, acting as a bastion authentication gateway. |
Application Administrative Access | The processes and procedures for the segregation of privileged access roles has been defined and implemented to maintain the separation of duties for administrative users. |
Application Log Alerts | A process has been established and implemented to review and take appropriate and timely actions on detected alerts and anomalies within log data. |
Application Logging | A secure, separate log of all changes and data requests is kept for our applications, with appropriate authentication and date/time stamp information. |
Application Patching | Application code is run on AWS serverless services which are automatically updated, patched and managed by AWS under their shared service model. |
Application Security Baseline | Application baseline requirements are defined to secure different applications based on the sensitivity of the data they contain. |
Application Security Policies | Application security policies and procedures are established, documented, and approved to guide appropriate delivery of our application security capabilities. Policies are reviewed at least annually. |
Application Testing | Application and code testing is automated when applicable and possible. |
Authentication Policies | Strong password policies and multi-factor authentication (MFA) has been established and deployed for all applications. |
IAM Policies | Identity and access management policies and procedures have been established, documented, and approved. The policies and procedures are reviewed and updated at least annually. |
Key Usage | Key lifecycle management events are logged and monitored to enable auditing and reporting on cryptographic keys' usage. |
Key Management | Key are securely controlled and monitored within an AWS system mangere parameter store |
Least Privilege Access | Least privilege principle has been employed when implementing information system access. |
Password Management | Processes and procedures for the secure management of passwords have been defined and implemented. |
Penetration Testing | Annual Penetration testing is used to review current Application & API security. |
Roll-back | A process to proactively roll back changes to a previously known "good state" is defined and implemented in case of errors or security concerns. |
Secure Application Deployment | Strategies and capabilities have been established and implemented to deploy application code in a secure, standardized, automated and compliant manner. |
Secure Application Development | A secure software development lifecycle (SSDLC) process is defined and implemented. |
Separation of Duties | The separation of duties principle has been employed when implementing information system access. |
Unique User ID | Processes and procedures have been established and deployed to ensure that users are identifiable through unique identification within each application. Shared User IDs are not allowed. |
User Provisioning & De-provisioning | A user access provisioning process has been defined and implemented which authorizes, records, and communicates data and assets access changes. The process to de-provision or modify access has also been defined and implemented. |