Periodic compliance activities supported by the Software
- Automated generation of compliance status reports
 - Ensuring data privacy and protection measures are up to date.
 - Maintain compliance and evidence documentation
 - Monitor and address customers' compliance failures
 - Monitoring and documenting system changes for compliance impact
 - Ongoing evaluation and management of security risks.
 - Organizing periodic security awareness training for users
 - Periodic audits of user permissions and access rights.
 - Perform quarterly compliance process review
 - Regular updates to the incident response plan
 - Routine updates to fix vulnerabilities and maintain security standards
 - Testing backup and recovery plans to ensure operational
 
The Software store, process, or transmit
- Customer account data
 - Sensitive information such a as Cardholder Data (CHD), Protected Health Information (PHI), Intellectual Property (IP), Bulk Electric System Critical Information (BCSI)
 - Other classified information as per relevant compliance standards
 - Not Applicable
 
The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
- Required integration
 - Optional integration
 - Not Applicable
 
Software modules implemented
- Modules that provide cybersecurity services for compliance (e.g., built-in features for PCI DSS, NERC CIP compliance, recurring activities, etc.)
 - Modules that securely store, process, or transmit customer account data or other sensitive information
 - Modules that facilitate network security controls
 - Modules that virtualize (e.g., machines, networks, appliances, applications, and hypervisors)
 - Modules purchased, subscribed (e.g., SaaS, bespoke and custom software, etc.)
 - Tools, code repositories, and systems that implement software configuration management or to systems that can impact the cybersecurity
 - Not Applicable
 
Software vendor Third-Party Service Providers (TPSPs) used
- TPSPs that store, process, or transmit customer account data or other sensitive information on the entity’s behalf
 - TPSPs that impact the cybersecurity of the software vendor account data, sensitive information (e.g. vendors providing remote support)
 - TPSPs that manage software vendor modules/components included in the evaluation scope
 - Not Applicable