
InspireIP recently completed its SOC 2® examination.
What that means for your IP?

Menu
Entity's Infosec officer reviews and approves the list of people with access to production console annually
Entity ensures that logical access provisioning to critical systems requires approval from authorized personnel on an individual need or for a predefined role.
Entity ensures logical access that is no longer required in the event of termination is made inaccessible in a timely manner.
Entity ensures that access to the production databases is restricted to only those individuals who require such access to perform their job functions.
Entity requires that all staff members with access to any critical system be protected with a secure login mechanism such as Multifactor-authentication.
Entity's Senior Management or the Information Security Officer periodically reviews and ensures that access to the critical systems is restricted to only those individuals who require such access to perform their job functions.
Entity's Senior Management or the Information Security Officer periodically reviews and ensures that administrative access to the critical systems is restricted to only those individuals who require such access to perform their job functions.
Entity has set up cryptographic mechanisms to encrypt all production database[s] that store customer data at rest.
Entity develops, documents, and maintains an inventory of organizational infrastructure systems, including all necessary information to achieve accountability.
Entity tests backup information periodically to verify media reliability and information integrity.
Entity systems generate information that is reviewed and evaluated to determine impacts on the functioning of internal controls.
Entity ensures that the production databases access and Secure Shell access to infrastructure entities are protected from public internet access.
Every Production host is protected by a firewall with a deny-by-default rule. Deny by default rule set is a default on the Entity's cloud provider.
Entity has set up processes to utilize standard encryption methods, including HTTPS with the TLS algorithm, to keep transmitted data confidential.
Entity's infrastructure is configured to review and analyze audit events to detect anomalous or suspicious activity and threats
Entity has set up methods to continuously monitor critical assets to generate capacity alerts to ensure optimal performance, meet future capacity requirements, and protect against denial-of-service attacks.
Entity ensures that customer data used in non-Production environments requires the same level of protection as the production environment.
Entity's infrastructure is configured to generate audit events for actions of interest related to security for all critical systems.
Entity displays the most current information about its services on its website, which is accessible to its customers.
Entity has procedures to govern changes to its operating environment.
Entity has established procedures for approval when implementing changes to the operating environment.
Entity uses Sprinto, a continuous monitoring system, to alert the security team to update the access levels of team members whose roles have changed.
Where applicable, Entity ensures that endpoints with access to critical servers or data must be protected by malware-protection software.
Where applicable, Entity ensures that endpoints with access to critical servers or data must be encrypted to protect from unauthorized access.
Entity has set up measures to perform security and privacy compliance checks on the software versions and patches of remote devices prior to the establishment of the internal connection.
Entity ensures that endpoints with access to critical servers or data are configured to auto-screen-lock after 15 minutes of inactivity.
Entity requires that all critical endpoints are encrypted to protect them from unauthorized access.
Entity has a documented policy to define behavioral standards and acceptable business conduct.
Entity maintains an organizational structure to define authorities, facilitate information flow and establish responsibilities.
Entity has established procedures to communicate with staff about their roles and responsibilities.
Entity has procedures to ensure that all security-related positions are staffed by qualified individuals who have the necessary skill set.
Entity has established procedures for new staff to acknowledge applicable company policies as a part of their onboarding.
Entity provides information security and privacy training to staff that is relevant to their job function.
Entity requires that all employees in client serving, IT, Engineering, and Information Security roles are periodically evaluated regarding their job responsibilities.
Entity has established procedures for staff to acknowledge applicable company policies periodically.
Entity has provided information to employees, via various Information Security Policies/procedures, on how to report failures, incidents, concerns, or other complaints related to the services or systems provided by the entity in the event there are problems.
Entity performs a formal risk assessment exercise annually, as per documented guidelines and procedures, to identify threats that could impair systems' security commitments and requirements.
Each risk is assessed and given a risk score in relation to the likelihood of it occurring and the potential impact on the security, availability, and confidentiality of the Company platform. Risks are mapped to mitigating factors that address some or all of the risk.
Entity considers the potential for fraud when assessing risks. This is an entry in the risk matrix.
Entity performs a formal vendor risk assessment exercise annually to identify vendors that are critical to the systems' security commitments and requirements.
Entity's Senior Management assigns the role of Information Security Officer who is delegated to centrally manage, coordinate, develop, implement, and maintain an enterprise-wide cybersecurity and privacy program.
Entity uses Sprinto, a continuous monitoring system, to track and report the health of the information security program to the Information Security Officer and other stakeholders.
Entity's Senior Management reviews and approves the state of the Information Security program including policies, standards, and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy, and effectiveness.
Entity's Senior Management reviews and approves the Organizational Chart for all employees annually.
Entity's Senior Management reviews and approves the "Risk Assessment Report" annually.
Entity's Senior Management reviews and approves the "Vendor Risk Assessment Report" annually.
Entity reviews and evaluates all subservice organizations periodically, to ensure commitments to Entity's customers can be met.
Entity's Senior Management segregates responsibilities and duties across the organization to mitigate risks to the services provided to its customers.
Entity has procedures to conduct regular tests and exercises that determine the effectiveness and the readiness to execute the contingency plan.
Entity has set up mechanisms to assign and manage asset ownership responsibilities and establish a common understanding of asset protection requirements.
Entity has established procedures for new staff to complete security and privacy literacy training as a part of their onboarding.
Entity documents, monitors, and retains individual training activities and records.
Entity periodically updates and reviews the inventory of systems as a part of installations, removals, and system updates.
Entity develops, documents, and maintains an inventory of organizational endpoint systems, including all necessary information to achieve accountability.
InspireIP has restricted access for 'System Acquisition and Development Lifecycle Policy'. We need your work email to validate OR request your access to this item.