Controls

Assets and Infrastructure

STATUS

CONTROL

Compliant

Digital Asset Inventory

All digital assets, such as software lists and domain names, must be discovered and maintained in the asset inventory system.

Compliant

Physical Asset Inventory

All physical assets, such as laptops and phones issued to employees, must be listed in an enterprise asset inventory.

Not applicable

Periodic system updates

Operating systems and critical applications on employee computers and servers must be regularly upgraded and patched.

Compliant

Safe product deployment process

Products must undergo comprehensive code reviews and system configuration evaluations before deployment to production.

Compliant

Employee device security

User devices are configured with basic security measures including disk encryption, separate user accounts, strong password policies, firewalls, enabled screen locks, and automated security patch updates.

Compliant

Enhanced server security

Servers deployed for production services must implement enhanced security measures such as firewalls, intrusion detection, and automatic attack prevention.

Compliant

Manage USB Devices and External Drives

Storing sensitive and critical data on USB or external drives is prohibited and only approved on a case-by-case basis.