Security controls align with Trust Service Criteria.
Availability and disaster recovery procedures in place.
Change management process documented.
Data processing integrity and confidentiality ensured.
Logging and monitoring of system activity.
Third-party vendor assessments completed.
Last updated 6 months ago