Here are the controls implemented at Looppanel to ensure compliance, as a part of our security program.
Identify Validation
Termination of Employment
Multi-factor Authentication
Encrypting Data At Rest
Inventory of Infrastructure Assets
Data Backups
Impact analysis
Limit Network Connections
External System Connections
Transmission Confidentiality
Anomalous Behavior
Capacity & Performance Management
Data used in Testing
Conspicuous Link To Privacy Notice
Approval of Changes
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Session Lock
Endpoints Encryption
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Automated Reporting
Incident Reporting Assistance
Risk Framing
Risk Assessment
Fraud
Assigned Cybersecurity & Privacy Responsibilities
Management Review of Risks
Segregates Roles and Responsibilities
Asset Ownership Assignment
Infosec training ack
New Hire Security & Privacy Training Records
Periodic Security & Privacy Training Records
Inventory of Endpoint Assets