company_application_and_data_security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
company_application_and_data_security [2019/11/24 18:03] – [Vulnerability management] lucy | company_application_and_data_security [2021/09/01 15:11] (current) – lucy | ||
---|---|---|---|
Line 225: | Line 225: | ||
^ Questions ^ Response ^ Comments ^ | ^ Questions ^ Response ^ Comments ^ | ||
- | | Will you use tenant data for testing purposes? | no | | | + | | Will you use tenant data for testing purposes? | no | Using of tenant data is prohibited in test and development environments |
==== Data input and output validation ==== | ==== Data input and output validation ==== | ||
Line 237: | Line 237: | ||
^ Questions ^ Response ^ Comments ^ | ^ Questions ^ Response ^ Comments ^ | ||
- | | Has the provider a defined and documented method for coping with a business continuity situation? | no | The software has not mission criticality for the business | + | | Has the provider a defined and documented method for coping with a business continuity situation? | yes | There is a Business Continuity Plan | |
==== Plans and procedures ==== | ==== Plans and procedures ==== | ||
^ Questions ^ Response ^ Comments ^ | ^ Questions ^ Response ^ Comments ^ | ||
- | | Has the provider implemented, | + | | Has the provider implemented, |
==== Data and production recovery ==== | ==== Data and production recovery ==== |
company_application_and_data_security.1574614985.txt.gz · Last modified: 2019/11/24 18:03 by lucy