Founded in 2022

|
|

Controls (49)

Here are the controls implemented at Project Manda to ensure compliance, as a part of our security program.

Product security (1)

Situational Awareness For Incidents

Data security (5)

Termination of Employment

Multi-factor Authentication

Inventory of Infrastructure Assets

Data Backups

Testing for Reliability and Integrity

Network security (8)

Impact analysis

Limit Network Connections

External System Connections

Transmission Confidentiality

Anomalous Behavior

Capacity & Performance Management

Data used in Testing

Centralized Collection of Security Event Logs

App security (1)

Conspicuous Link To Privacy Notice

Endpoint security (5)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Session Lock

Endpoints Encryption

Corporate security (29)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Competency Screening

Personnel Screening

New Hire Policy Acknowledgement

Security & Privacy Awareness

Periodic Policy Acknowledgement

Automated Reporting

Incident Reporting Assistance

Risk Framing

Risk Assessment

Fraud

Third-Party Criticality Assessments

Assigned Cybersecurity & Privacy Responsibilities

Internal Audit using Sprinto

Periodic Review & Update of Cybersecurity & Privacy Program

Management Review of Org Chart

Management Review of Risks

Management Review of Third-Party Risks

Subservice organization evaluation

Segregates Roles and Responsibilities

Testing

Asset Ownership Assignment

Data Governance

New Hire Security & Privacy Training Records

Periodic Security & Privacy Training Records

Updates During Installations / Removals

Inventory of Endpoint Assets