User Tools

Site Tools


company_application_and_data_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
company_application_and_data_security [2019/11/24 18:03] – [Vulnerability management] lucycompany_application_and_data_security [2021/09/01 15:11] (current) lucy
Line 225: Line 225:
  
 ^ Questions ^ Response ^ Comments ^ ^ Questions ^ Response ^ Comments ^
-| Will you use tenant data for testing purposes? | no | |+| Will you use tenant data for testing purposes? | no | Using of tenant data is prohibited in test and development environments |
  
 ==== Data input and output validation ==== ==== Data input and output validation ====
Line 237: Line 237:
  
 ^ Questions ^ Response ^ Comments ^ ^ Questions ^ Response ^ Comments ^
-| Has the provider a defined and documented method for coping with a business continuity situation? | no The software has not mission criticality for the business |+| Has the provider a defined and documented method for coping with a business continuity situation? | yes There is a Business Continuity Plan |
  
 ==== Plans and procedures ==== ==== Plans and procedures ====
  
 ^ Questions ^ Response ^ Comments ^ ^ Questions ^ Response ^ Comments ^
-| Has the provider implemented, tested and documented a set of procedures and actions for a contingency situation? | no The software has not mission criticality for the business |+| Has the provider implemented, tested and documented a set of procedures and actions for a contingency situation? | yes There are tested and documented procedures for a contingency situations |
  
 ==== Data and production recovery ==== ==== Data and production recovery ====
company_application_and_data_security.1574614985.txt.gz · Last modified: 2019/11/24 18:03 by lucy