csa-ccm 0.1.2 → 0.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1a7011ff17953162f760e8791b78e0115c5317f36976c5123bc2b5cedc7f6109
4
- data.tar.gz: 322a021656e03630799f6695738efc4c642e56a7e9cdd0b98a97236c15b36cba
3
+ metadata.gz: 55180ab1c78b1b3dc93b2e5ecd0c76b04e9e4d12ed0126d5fe1d4006f5efe4c2
4
+ data.tar.gz: 00f7af48d6ddb79d9b1e760d434e40159cb1e7407c9d525fb66f088f54954850
5
5
  SHA512:
6
- metadata.gz: 4a942b423af43fddc9a12f150a2da04f93865a224ba19d58c72039052ebc228fdc38da4a3d13dc47e44ba51c46a3903aab9f9dbe5fade4086abe5016c003903c
7
- data.tar.gz: 891e69588dbcc034eb23cb258783962a90af24cb0d65673cb06af21ae4a00b55a73c8e5b7976c116672d33d1755e2409841b2988842c72deab5e5a1dee0f2cd8
6
+ metadata.gz: fa0d2d7322786ed652ee5d02718b488cb7e6e0edb5ddf43e2b22afb486384ef0f6c4c18814e8752733cc96d81ccd66a622588cb848ccda175b7f401b02f3de01
7
+ data.tar.gz: 58cbad62d040070721b5bf3aa8097534a61962e66900e8457139185bb797478817470f50f1f7407afe4f48b5f4c67d6c374e4ef7661b5e1e26d8d0b1a62a2406
@@ -0,0 +1,1380 @@
1
+ ---
2
+ ccm:
3
+ metadata:
4
+ version: 3.0.1
5
+ title: CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE v3.0.1
6
+ source_file: CAIQ_v3.0.1-09-01-2017_FINAL_filled.xlsx
7
+ answers:
8
+ - control_id: AIS-01
9
+ question_id: AIS-01.1
10
+ answer: 'yes'
11
+ comment: Ribose API design and implementation adheres to industry acceptance standards.
12
+ - control_id: AIS-01
13
+ question_id: AIS-01.2
14
+ answer: 'yes'
15
+ comment: In our implementation cycle, static code security analysis tools (e.g.
16
+ Brakeman) are automatically run for each commit ensuring the resulting code
17
+ does not contain any known vulnerabilities.
18
+ - control_id: AIS-01
19
+ question_id: AIS-01.3
20
+ answer: 'yes'
21
+ comment: For both design and implementation phases of our API, which constitutes
22
+ a "change" in our change management procedure, we perform requirement reviews
23
+ pre- and post-change implementation, including for legal, statutory, and compliance
24
+ obligations. This is performed during our weekly sprint cycles. All code is
25
+ peer reviewed.
26
+ - control_id: AIS-01
27
+ question_id: AIS-01.4
28
+ answer: NA
29
+ comment: Ribose does not rely on software suppliers. All software is developed
30
+ by Ribose.
31
+ - control_id: AIS-01
32
+ question_id: AIS-01.5
33
+ answer: 'yes'
34
+ comment: Ribose will test the applications piror to deployment to production.
35
+ - control_id: AIS-02
36
+ question_id: AIS-02.1
37
+ answer: 'yes'
38
+ comment: Customers are required to register with a password and have to agree
39
+ to our Terms of Service and Privacy Policy.
40
+ - control_id: AIS-02
41
+ question_id: AIS-02.2
42
+ answer: 'yes'
43
+ comment: Requirements and trust levels for customers's access are defined and
44
+ documented in Terms of Service and Privacy Policy.
45
+ - control_id: AIS-03
46
+ question_id: AIS-03.1
47
+ answer: 'yes'
48
+ comment: |-
49
+ Database import and export procedures contain a model verification procedure to prevent database integrity issues.
50
+
51
+ Application communication takes place over the secure HTTPS/TLS to make tampering of data impossible.
52
+ - control_id: AIS-04
53
+ question_id: AIS-04.1
54
+ answer: 'yes'
55
+ comment: Policies, procedures and technical measures have been implemented covering
56
+ this control. Sensitive user information is encrypted on the database and filesystem
57
+ levels. Monitoring solutions like NewRelic and CloudWatch are used to monitor
58
+ availibility of data. Ribose does not transfer any data to third-parties, and
59
+ is compliant with known legal and regulatory issues.
60
+ - control_id: AAC-01
61
+ question_id: AAC-01.1
62
+ answer: 'yes'
63
+ comment: |-
64
+ An audit program has been established and audit plans are prepared, discussed and approved by the integrated management committee (Crimson Committee).
65
+ Internal and external audits for ISO 27001 (ISM), ISO 22301 (BCM) are performed at least annually.
66
+ - control_id: AAC-02
67
+ question_id: AAC-02.1
68
+ answer: 'yes'
69
+ comment: Ribose allows tenants to view your SOC2/ISO 27001 or similar third-party
70
+ audit or certification reports.
71
+ - control_id: CO-02
72
+ question_id: AAC-02.2
73
+ answer: 'yes'
74
+ comment: Ribose conducts application and network penetration test annually.
75
+ - control_id: CO-02
76
+ question_id: AAC-02.3
77
+ answer: 'yes'
78
+ comment: Ribose conducts application and network penetration test annually.
79
+ - control_id: CO-02
80
+ question_id: AAC-02.4
81
+ answer: 'yes'
82
+ comment: Internal audits for ISO 27001 are performed by the BC manager and internal
83
+ audits for ISO 22301 are peformed by the IS manager to ensure segration of duty.
84
+ Audit results are reviewed by the integrated management committee (Crimson Committee).
85
+ - control_id: CO-02
86
+ question_id: AAC-02.5
87
+ answer: 'yes'
88
+ comment: External audits (e.g. ISO 27001, ISO 22301 , and etc.) are performed
89
+ regualrly by BSI.
90
+ - control_id: CO-02
91
+ question_id: AAC-02.6
92
+ answer: 'yes'
93
+ comment: The results of the penetration tests are available to tenants at their
94
+ request.
95
+ - control_id: CO-02
96
+ question_id: AAC-02.7
97
+ answer: 'yes'
98
+ comment: The results of internal and external audits are available to tenants
99
+ at their request.
100
+ - control_id: AAC-02
101
+ question_id: AAC-02.8
102
+ answer: 'yes'
103
+ comment: Our internal audit program allows for cross-functional audit of assessments.
104
+ - control_id: AAC-03
105
+ question_id: AAC-03.1
106
+ answer: 'yes'
107
+ comment: Each customer will have his own key to encrypt his data.
108
+ - control_id: CO-05
109
+ question_id: AAC-03.2
110
+ answer: 'yes'
111
+ comment: Ribose can restore the data to a independent infrastrucutre that allows
112
+ us to restore a specific customer in the case of a faulure or data loss.
113
+ - control_id: AAC-03
114
+ question_id: AAC-03.3
115
+ answer: 'yes'
116
+ comment: Ribose has implemented multi-region feature to allow customers to store
117
+ the data in a specific region.
118
+ - control_id: AAC-03
119
+ question_id: AAC-03.4
120
+ answer: 'yes'
121
+ comment: Risk and compliance policies and procedures have been implemented. An
122
+ inventory of legal and regulatory obligations are annually reviewed to adapt
123
+ to business needs.
124
+ - control_id: BCR-01
125
+ question_id: BCR-01.1
126
+ answer: 'yes'
127
+ comment: 'The production system of Ribose will hosts at least two geographically
128
+ seperated locations for resilience and failover.
129
+
130
+ '
131
+ - control_id: RS-03
132
+ question_id: BCR-01.2
133
+ answer: 'yes'
134
+ comment: The production system of Ribose will hosts at least two geographically
135
+ seperated locations for resilience and failover.
136
+ - control_id: BCR-02
137
+ question_id: BCR-02.1
138
+ answer: 'yes'
139
+ comment: |-
140
+ Ribose has a tested framework for business continuity planning, rehearsed periodically to ensure smooth execution.
141
+ Security incident response testing is planned for and is aligned with NIST Special Publication 800-84 (definition of tabletop exercises).
142
+ - control_id: BCR-03
143
+ question_id: BCR-03.1
144
+ answer: NA
145
+ comment: 'Ribose is a SaaS, and our IaaS provider AWS satisies the datacenter
146
+ requirements. Amazon states in http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
147
+ on page 6 the following: "Business Continuity Management Amazon’s infrastructure
148
+ has a high level of availability and provides customers the features to deploy
149
+ a resilient IT architecture. AWS has designed its systems to tolerate system
150
+ or hardware failures with minimal customer impact. Data center Business Continuity
151
+ Management at AWS is under the direction of the Amazon Infrastructure Group.
152
+ Availability Data centers are built in clusters in various global regions. All
153
+ data centers are online and serving customers; no data center is “cold.” In
154
+ case of failure, automated processes move customer data traffic away from the
155
+ affected area. Core applications are deployed in an N+1 configuration, so that
156
+ in the event of a data center failure, there is sufficient capacity to enable
157
+ traffic to be load‐balanced to the remaining sites."'
158
+ - control_id: RS-08
159
+ question_id: BCR-03.2
160
+ answer: 'no'
161
+ comment: Customers can define the zone or region that data is available, but they
162
+ may not define if it is transported through a given legal jurisdiction.
163
+ - control_id: BCR-04
164
+ question_id: BCR-04.1
165
+ answer: 'yes'
166
+ comment: Ribose provides operational guides as well as an Information Security
167
+ Policy for authorized personnel only to ensure operational resilience.
168
+ - control_id: BCR-05
169
+ question_id: BCR-05.1
170
+ answer: 'yes'
171
+ comment: Ribose has a business continuity plan with countermeasures that covers
172
+ these areas.
173
+ - control_id: BCR-06
174
+ question_id: BCR-06.1
175
+ answer: 'no'
176
+ comment: Ribose uses the geographical resilience of the IaaS provider to ensure
177
+ that even running equipment have been disabled due to location, our backup systems
178
+ can be resumed in a short period of time.
179
+ - control_id: BCR-07
180
+ question_id: BCR-07.1
181
+ answer: 'yes'
182
+ comment: Ribose applications run on AWS and AWS has included independent hardware
183
+ restore and recovery capabilities.
184
+ - control_id: OP-04
185
+ question_id: BCR-07.2
186
+ answer: 'yes'
187
+ comment: Ribose applications are built on docker images with tags. Ribose restore
188
+ the applications by using an older images.
189
+ - control_id: OP-04
190
+ question_id: BCR-07.3
191
+ answer: 'yes'
192
+ comment: Ribose builds our images by using docker, which can be deployed into
193
+ other cloud providers.
194
+ - control_id: OP-04
195
+ question_id: BCR-07.4
196
+ answer: NA
197
+ comment: Ribose owns the images in a private repo which will not shared with customers.
198
+ - control_id: OP-04
199
+ question_id: BCR-07.5
200
+ answer: 'yes'
201
+ comment: Ribose implements different restore/recovery for differenet scenarios.
202
+ - control_id: BCR-08
203
+ question_id: BCR-08.1
204
+ answer: 'yes'
205
+ comment: Ribose has developed business continuity plans for natural, man-made
206
+ and geographically-specific risks. Examples of these risks are office physical
207
+ temporary unavailability in case of demonstrations or typhoons which are typical
208
+ for Hong Kong and happen frequently.
209
+ - control_id: BCR-09
210
+ question_id: BCR-09.1
211
+ answer: 'yes'
212
+ comment: Ribose maintains OLA which is available for all staffs.
213
+ - control_id: RS-02
214
+ question_id: BCR-09.2
215
+ answer: 'yes'
216
+ comment: The security metrics are defined in OLA.
217
+ - control_id: RS-02
218
+ question_id: BCR-09.3
219
+ answer: 'yes'
220
+ comment: Ribose maintains OLA which is available for all staffs.
221
+ - control_id: BCR-10
222
+ question_id: BCR-10.1
223
+ answer: 'yes'
224
+ comment: Ribose operational staff are trained in standards (ISO 27001, ISO 20000-1,
225
+ ISO 22301) and the company's change management policy and procedures provides
226
+ adequate definitions of roles and responsibilities. Ribose uses the task sheet
227
+ as a operational management system.
228
+ - control_id: BCR-11
229
+ question_id: BCR-11.1
230
+ answer: 'yes'
231
+ comment: Retention periods have been defined for all critical assets such as backup,
232
+ documentation and log files.
233
+ - control_id: DG-04
234
+ question_id: BCR-11.2
235
+ answer: 'yes'
236
+ comment: Retention procedures are documented in Crimson.
237
+ - control_id: BCR-11
238
+ question_id: BCR-11.4
239
+ answer: 'yes'
240
+ comment: Ribose has implemented backup mechanisms to ensure compliance with regulatory,
241
+ statutory, contractual or business requirements.
242
+ - control_id: BCR-11
243
+ question_id: BCR-11.5
244
+ answer: 'yes'
245
+ comment: Backup data will be tested in staging servers daily.
246
+ - control_id: CCC-01
247
+ question_id: CCC-01.1
248
+ answer: 'yes'
249
+ comment: Crimson
250
+ - control_id: CCC-01
251
+ question_id: CCC-01.2
252
+ answer: 'yes'
253
+ comment: Crimson
254
+ - control_id: CCC-02
255
+ question_id: CCC-02.1
256
+ answer: 'yes'
257
+ comment: change management procedure
258
+ - control_id: RM-04
259
+ question_id: CCC-02.2
260
+ answer: NA
261
+ comment: no outsouce development
262
+ - control_id: CCC-03
263
+ question_id: CCC-03.1
264
+ answer: 'yes'
265
+ comment: change management procedure and deployment procedure
266
+ - control_id: CCC-03
267
+ question_id: CCC-03.2
268
+ answer: 'yes'
269
+ comment: Crimson
270
+ - control_id: CCC-03
271
+ question_id: CCC-03.3
272
+ answer: 'yes'
273
+ comment: customer feedback and change management procedure
274
+ - control_id: CCC-03
275
+ question_id: CCC-03.4
276
+ answer: 'yes'
277
+ comment: code review
278
+ - control_id: CCC-04
279
+ question_id: CCC-04.1
280
+ answer: 'yes'
281
+ comment: Approved software list
282
+ - control_id: CCC-05
283
+ question_id: CCC-05.1
284
+ answer: 'yes'
285
+ comment: Crimson
286
+ - control_id: DSI-01
287
+ question_id: DSI-01.1
288
+ answer: 'yes'
289
+ comment: metadata in AWS console
290
+ - control_id: DG-02
291
+ question_id: DSI-01.2
292
+ answer: 'yes'
293
+ comment: instance type
294
+ - control_id: DG-02
295
+ question_id: DSI-01.3
296
+ answer: 'yes'
297
+ comment: IP
298
+ - control_id: DG-02
299
+ question_id: DSI-01.4
300
+ answer: 'yes'
301
+ comment: multi-region
302
+ - control_id: DG-02
303
+ question_id: DSI-01.5
304
+ answer: 'yes'
305
+ comment: multi-region
306
+ - control_id: DSI-01
307
+ question_id: DSI-01.6
308
+ answer: 'yes'
309
+ comment: data labeling policy
310
+ - control_id: DSI-01
311
+ question_id: DSI-01.7
312
+ answer: 'yes'
313
+ comment: multi-region
314
+ - control_id: DSI-02
315
+ question_id: DSI-02.1
316
+ answer: 'yes'
317
+ comment: inventory list
318
+ - control_id: DSI-02
319
+ question_id: DSI-02.2
320
+ answer: 'yes'
321
+ comment: multi-region
322
+ - control_id: DSI-03
323
+ question_id: DSI-03.1
324
+ answer: 'yes'
325
+ comment: AES encryption
326
+ - control_id: IS-28
327
+ question_id: DSI-03.2
328
+ answer: 'yes'
329
+ comment: OpenSSL
330
+ - control_id: DSI-04
331
+ question_id: DSI-04.1
332
+ answer: 'yes'
333
+ comment: Crimson
334
+ - control_id: DG-03
335
+ question_id: DSI-04.2
336
+ answer: 'yes'
337
+ comment: Space privacy and git security settings facilitate security inheritance.
338
+ Objects within a space or in a git repository cannot have different security
339
+ settings than the parent.
340
+ - control_id: DSI-05
341
+ question_id: DSI-05.1
342
+ answer: 'yes'
343
+ comment: data masking
344
+ - control_id: DSI-06
345
+ question_id: DSI-06.1
346
+ answer: 'yes'
347
+ comment: We have established information labeling procedures that cover this control.
348
+ - control_id: DSI-07
349
+ question_id: DSI-07.1
350
+ answer: 'yes'
351
+ comment: A data masking procedure has been established and is enforced.
352
+ - control_id: DG-05
353
+ question_id: DSI-07.2
354
+ answer: 'yes'
355
+ comment: It is company policy to prohibit the copying of production customer data
356
+ to testing environments or other locations such as an office network
357
+ - control_id: DCS-01
358
+ question_id: DCS-01.1
359
+ answer: 'yes'
360
+ comment: inventory list
361
+ - control_id: FS-08
362
+ question_id: DCS-01.2
363
+ answer: 'yes'
364
+ comment: CMDB
365
+ - control_id: DCS-02
366
+ question_id: DCS-02.1
367
+ answer: 'yes'
368
+ comment: "Ribose utilizes a CCTV camera system and biometric + proximity card
369
+ based access control to secure the office location.\nThe Ribose office is located
370
+ in a building which has 24/7 security sentries.\n\nAmazon have stringent physical
371
+ security measures that deal with unauthorised access to their data center, as
372
+ described in http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
373
+ page 4.\n\n\"Physical and Environmental Security \n\nAWS’s data centers are
374
+ state of the art, utilizing innovative architectural and engineering approaches.
375
+ Amazon has many \nyears of experience in designing, constructing, and operating
376
+ large‐scale data centers. This experience has been applied \nto the AWS platform
377
+ and infrastructure. AWS data centers are housed in nondescript facilities. Physical
378
+ access is strictly \ncontrolled both at the perimeter and at building ingress
379
+ points by professional security staff utilizing video surveillance, \nintrusion
380
+ detection systems, and other electronic means. Authorized staff must pass two‐factor
381
+ authentication a \nminimum of two times to access data center floors. All visitors
382
+ and contractors are required to present identification and \nare signed in and
383
+ continually escorted by authorized staff. \nAWS only provides data center access
384
+ and information to employees and contractors who have a legitimate business
385
+ \nneed for such privileges. When an employee no longer has a business need for
386
+ these privileges, his or her access is \nimmediately revoked, even if they continue
387
+ to be an employee of Amazon or Amazon Web Services. All physical access \nto
388
+ data centers by AWS employees is logged and audited routinely.\""
389
+ - control_id: DCS-03
390
+ question_id: DCS-03.1
391
+ answer: 'yes'
392
+ comment: Ribose uses Amazon security groups. Server instances defined by environment
393
+ type (MY, QA) are automatically placed in the right security group according
394
+ to their label. It is not possible for a newly deployed server to contact other
395
+ instances outside it's security group unless specifically specified. No IP configuration
396
+ is required to setup this connection authentication.
397
+ - control_id: DCS-04
398
+ question_id: DCS-04.1
399
+ answer: 'yes'
400
+ comment: Ribose is a SaaS and uses IaaS provider's datacenters. Ribose staff adheres
401
+ to a Property Removal and Offsite Security Procedure to relocate or transfer
402
+ company assets.
403
+ - control_id: DCS-05
404
+ question_id: DCS-05.1
405
+ answer: 'yes'
406
+ comment: "1 i) Ribose has implemented and enforced a secure disposal procedure.\n1
407
+ ii) Ribose' IaaS provider Amazon states the following:\n\n\"Storage Device Decommissioning
408
+ \n \nWhen a storage device has reached the end of its useful life, AWS procedures
409
+ include a decommissioning process that is \ndesigned to prevent customer data
410
+ from being exposed to unauthorized individuals. AWS uses the techniques detailed
411
+ \nin DoD 5220.22‐M (“National Industrial Security Program Operating Manual “)
412
+ or NIST 800‐88 (“Guidelines for Media \nSanitization”) to destroy data as part
413
+ of the decommissioning process. All decommissioned magnetic storage devices
414
+ are \ndegaussed and physically destroyed in accordance with industry‐standard
415
+ practices.\"\n\nAs stated in http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
416
+ page 6."
417
+ - control_id: DCS-06
418
+ question_id: DCS-06.1
419
+ answer: 'yes'
420
+ comment: |-
421
+ 1) Emergency exit and fire extinguisher procedures have been established and published in the Ribose security space.
422
+ 2) A clean desk policy has been established as stated in our security policy.
423
+ 3) Regular access audits are performed.
424
+ - control_id: DCS-06
425
+ question_id: DCS-06.2
426
+ answer: 'yes'
427
+ comment: security awareness training
428
+ - control_id: DCS-07
429
+ question_id: DCS-07.1
430
+ answer: 'yes'
431
+ comment: multi-region
432
+ - control_id: DCS-08
433
+ question_id: DCS-08.1
434
+ answer: 'yes'
435
+ comment: cctv
436
+ - control_id: DCS-09
437
+ question_id: DCS-09.1
438
+ answer: 'yes'
439
+ comment: |-
440
+ Secure physical access to the Ribose office is ensured by utilising biometric scanners using a system that is reviewed on a quarterly basis.
441
+ Ribose also maintains a list of approved users that can access the office computer room. This list is reviewed on a quarterly basis.
442
+ - control_id: EKM-01
443
+ question_id: EKM-01.1
444
+ answer: 'yes'
445
+ comment: Cryptographic Key management policies
446
+ - control_id: EKM-02
447
+ question_id: EKM-02.1
448
+ answer: 'yes'
449
+ comment: 'A separate encryption key management system and process is used for
450
+ Ribose customers for security of their data. '
451
+ - control_id: IS-19
452
+ question_id: EKM-02.2
453
+ answer: 'yes'
454
+ comment: |2-
455
+
456
+ Ribose customers do not have access to keys or key management because it is not used by them directly. Customers have no responsibility of this control.
457
+ - control_id: IS-19
458
+ question_id: EKM-02.3
459
+ answer: 'yes'
460
+ comment: Crimson
461
+ - control_id: IS-19
462
+ question_id: EKM-02.4
463
+ answer: 'yes'
464
+ comment: Crimson
465
+ - control_id: EKM-02
466
+ question_id: EKM-02.5
467
+ answer: 'no'
468
+ comment: Ribose uses a combination of open source and proprietary code to develop
469
+ its encryption solutions
470
+ - control_id: EKM-03
471
+ question_id: EKM-03.1
472
+ answer: 'yes'
473
+ comment: database and S3 are encrypted
474
+ - control_id: IS-18
475
+ question_id: EKM-03.2
476
+ answer: 'yes'
477
+ comment: AWS can transfer the container images to and from Amazon ECR via HTTPS.
478
+ AWS images are also automatically encrypted at rest using Amazon S3 server-side
479
+ encryption.
480
+ - control_id: EKM-03
481
+ question_id: EKM-03.3
482
+ answer: 'yes'
483
+ comment: Each customer will have his own key to encrypt his data.
484
+ - control_id: EKM-03
485
+ question_id: EKM-03.4
486
+ answer: 'yes'
487
+ comment: Crimson
488
+ - control_id: EKM-04
489
+ question_id: EKM-04.1
490
+ answer: 'yes'
491
+ comment: Our key management system uses industry-best filesystem encryption and
492
+ is maintained by ourselves.
493
+ - control_id: EKM-04
494
+ question_id: EKM-04.2
495
+ answer: 'yes'
496
+ comment: Ribose maintains its own encryption keys.
497
+ - control_id: EKM-04
498
+ question_id: EKM-04.3
499
+ answer: 'yes'
500
+ comment: database and environment vairable
501
+ - control_id: EKM-04
502
+ question_id: EKM-04.4
503
+ answer: 'yes'
504
+ comment: Ribose's key management operates as a service for development teams to
505
+ use in their application code.
506
+ - control_id: GRM-01
507
+ question_id: GRM-01.1
508
+ answer: 'yes'
509
+ comment: The document "Technical Baseline Guidance" specifies baselines for UNIX
510
+ systems, Windows systems, OSX systems, Juniper and Cisco systems. In ISP it
511
+ is stated that this document is reviewed annually for changes or updates and
512
+ baseline deviations must be approved through change management procedures.
513
+ - control_id: IS-04
514
+ question_id: GRM-01.2
515
+ answer: 'yes'
516
+ comment: review annually
517
+ - control_id: IS-04
518
+ question_id: GRM-01.3
519
+ answer: NA
520
+ comment: Ribose is SAAS, but not PAAS or IAAS
521
+ - control_id: GRM-02
522
+ question_id: GRM-02.1
523
+ answer: 'yes'
524
+ comment: brakeman
525
+ - control_id: GRM-02
526
+ question_id: GRM-02.2
527
+ answer: 'yes'
528
+ comment: Data classification, location and retention period is defined.
529
+ - control_id: GRM-03
530
+ question_id: GRM-03.1
531
+ answer: 'yes'
532
+ comment: Security awareness sessions are mandatory and employees are required
533
+ to sign an attendance list or finish an exam.
534
+ - control_id: GRM-04
535
+ question_id: GRM-04.1
536
+ answer: 'yes'
537
+ comment: Ribose is ISO/IEC 27001:2013 certified and the ISMP is similar to the
538
+ operation of an ISMS.
539
+ - control_id: GRM-04
540
+ question_id: GRM-04.2
541
+ answer: 'yes'
542
+ comment: internal and external audits
543
+ - control_id: GRM-05
544
+ question_id: GRM-05.1
545
+ answer: 'yes'
546
+ comment: supplier evaluations
547
+ - control_id: GRM-06
548
+ question_id: GRM-06.1
549
+ answer: 'yes'
550
+ comment: ISO 27001, ISO 22301, ISO 20000-1
551
+ - control_id: GRM-06
552
+ question_id: GRM-06.2
553
+ answer: 'yes'
554
+ comment: Tos and privacy policy
555
+ - control_id: GRM-06
556
+ question_id: GRM-06.3
557
+ answer: 'yes'
558
+ comment: Crimson
559
+ - control_id: GRM-06
560
+ question_id: GRM-06.4
561
+ answer: 'yes'
562
+ comment: announced in commitments
563
+ - control_id: GRM-07
564
+ question_id: GRM-07.1
565
+ answer: 'yes'
566
+ comment: |-
567
+ Chapter 21 in the Information Security Policy covers the control specification:
568
+ "Staff of Ribose has the responsibility to enforce compliance with this policy. Violations of security policy are subject to disciplinary action.
569
+ Team leads shall require employees, contractors and third party users to follow the principles and standard as described in this policy.
570
+ Information Security Officer has the responsibility to enforce compliance with this policy, and ensure that internal audit mechanisms exist to monitor and mea- sure compliance with this policy."
571
+
572
+ Ribose staff is required to sign the "appropriate usage of company resources and facilities" document:
573
+ "I agree to adhere to the guidelines stated in the Company’s policies and procedures as may be amended from time to time.
574
+
575
+ I agree to:
576
+
577
+ 1. Conform to the Company’s obligations pertaining to the use of software.
578
+ 2. Install and use only that software which is relevant for my work in the Company.
579
+ 3. Not use any software downloaded from the Internet without proper authorization.
580
+ 4. Not use any software beyond the period for which its use is authorized or legally permitted.
581
+ 5. Abide by Company’s policy in respect of password control.
582
+ 6. Access only those web sites, which are relevant to my work at hand.
583
+ 7. Not indulge in "Hacking"
584
+ 8. Not circulate or distribute offensive/ pornographic material through e-mail or in any other manner.
585
+
586
+ I am aware that relevant process documents are available on the LAN and shall refer to them in case of doubt.
587
+
588
+ I am fully aware that violation of the above undertaking in any manner will lead to disciplinary action, including termination of my employment (or secondment)."
589
+ - control_id: IS-06
590
+ question_id: GRM-07.2
591
+ answer: 'yes'
592
+ comment: security awareness training
593
+ - control_id: GRM-08
594
+ question_id: GRM-08.1
595
+ answer: 'yes'
596
+ comment: During the annual review of risk assessments any policies that require
597
+ modification will be updated following the document control procedure.
598
+ - control_id: GRM-09
599
+ question_id: GRM-09.1
600
+ answer: 'yes'
601
+ comment: ISC consists of management and all team leads. This can be proven with
602
+ the ISC meeting minute notes as verified during internal and external audits.
603
+ - control_id: GRM-09
604
+ question_id: GRM-09.2
605
+ answer: 'yes'
606
+ comment: internal and external audits
607
+ - control_id: GRM-10
608
+ question_id: GRM-10.1
609
+ answer: 'yes'
610
+ comment: Risk assessments have been performed and have been audited during internal
611
+ and external audits. Every risk assessment will be reviewed annually.
612
+ - control_id: RI-02
613
+ question_id: GRM-10.2
614
+ answer: 'yes'
615
+ comment: Outputs from audit results, threat and vulnerability analysis, and regulatory
616
+ compliance are reviewed in Crimson Committee Meetings and tasks are created
617
+ in task list for continuous imrpovement .
618
+ - control_id: GRM-11
619
+ question_id: GRM-11.1
620
+ answer: 'yes'
621
+ comment: Crimson
622
+ - control_id: RI-01
623
+ question_id: GRM-11.2
624
+ answer: 'yes'
625
+ comment: Published in ribose.com
626
+ - control_id: HRS-01
627
+ question_id: HRS-01.1
628
+ answer: 'yes'
629
+ comment: papertrails and datadog
630
+ - control_id: IS-27
631
+ question_id: HRS-01.2
632
+ answer: 'yes'
633
+ comment: ISO 27001
634
+ - control_id: HRS-02
635
+ question_id: HRS-02.1
636
+ answer: 'yes'
637
+ comment: Stringent background checks are performed as pre-employment checks. Contractors
638
+ and third-parties are subject to background checks depending on business requirements
639
+ and risks. See Ribose HR space.
640
+ - control_id: HRS-03
641
+ question_id: HRS-03.1
642
+ answer: 'yes'
643
+ comment: security awareness training
644
+ - control_id: HR-02
645
+ question_id: HRS-03.2
646
+ answer: 'yes'
647
+ comment: attendance list
648
+ - control_id: HRS-03
649
+ question_id: HRS-03.3
650
+ answer: 'yes'
651
+ comment: All staff are required to sign NDA and the Ribose Confidential Information
652
+ Agreement
653
+ - control_id: HRS-03
654
+ question_id: HRS-03.4
655
+ answer: 'yes'
656
+ comment: security awareness training
657
+ - control_id: HRS-03
658
+ question_id: HRS-03.5
659
+ answer: 'yes'
660
+ comment: security awareness training
661
+ - control_id: HRS-04
662
+ question_id: HRS-04.1
663
+ answer: 'yes'
664
+ comment: Employment procedures are documented in the Ribose HR space. Our HR process
665
+ is outsourced.
666
+ - control_id: HRS-04
667
+ question_id: HRS-04.2
668
+ answer: 'yes'
669
+ comment: exit procedures
670
+ - control_id: HRS-05
671
+ question_id: HRS-05.1
672
+ answer: 'yes'
673
+ comment: Mobile device policies are covered in the ISP and regularly reviewed
674
+ by the ISC to adjust for business risks.
675
+ - control_id: HRS-06
676
+ question_id: HRS-06.1
677
+ answer: 'yes'
678
+ comment: Our employee agreements and confidential agreements are reviewed on every
679
+ usage.
680
+ - control_id: HRS-07
681
+ question_id: HRS-07.1
682
+ answer: 'yes'
683
+ comment: We have a company organogram describing the roles of all staff.
684
+ - control_id: HRS-08
685
+ question_id: HRS-08.1
686
+ answer: 'yes'
687
+ comment: Covered by ISP Mobile Devices chapter.
688
+ - control_id: IS-26
689
+ question_id: HRS-08.2
690
+ answer: 'yes'
691
+ comment: privacy policy
692
+ - control_id: IS-26
693
+ question_id: HRS-08.3
694
+ answer: 'yes'
695
+ comment: Agreed privacy policy before use
696
+ - control_id: HRS-09
697
+ question_id: HRS-09.1
698
+ answer: 'yes'
699
+ comment: All staff are required to participate in the CFISA security awareness
700
+ training and mobile device security training.
701
+ - control_id: IS-11
702
+ question_id: HRS-09.2
703
+ answer: 'yes'
704
+ comment: All staff are required to participate in the CFISA security awareness
705
+ training and mobile device security training.
706
+ - control_id: HRS-10
707
+ question_id: HRS-10.1
708
+ answer: 'yes'
709
+ comment: All staff are required to participate in the CFISA security awareness
710
+ training and mobile device security training.
711
+ - control_id: IS-16
712
+ question_id: HRS-10.2
713
+ answer: 'yes'
714
+ comment: All staff are required to participate in the CFISA security awareness
715
+ training and mobile device security training.
716
+ - control_id: IS-16
717
+ question_id: HRS-10.3
718
+ answer: 'yes'
719
+ comment: All staff are required to participate in the CFISA security awareness
720
+ training and mobile device security training.
721
+ - control_id: HRS-11
722
+ question_id: HRS-11.1
723
+ answer: 'yes'
724
+ comment: Roles and responsbilities
725
+ - control_id: IS-16
726
+ question_id: HRS-11.2
727
+ answer: 'yes'
728
+ comment: papertrails
729
+ - control_id: IS-16
730
+ question_id: HRS-11.3
731
+ answer: 'yes'
732
+ comment: Images are managed by git and only authorized users can make changes
733
+ - control_id: IAM-01
734
+ question_id: IAM-01.1
735
+ answer: 'yes'
736
+ comment: |-
737
+ Ribose uses S3 storage to place log archives. Ribose also uses a remote syslog service.
738
+ S3 and the remote syslog have strong authentication mechanisms. papertrails and datadog
739
+ - control_id: IAM-01
740
+ question_id: IAM-01.2
741
+ answer: 'yes'
742
+ comment: papertrails and datadog
743
+ - control_id: IAM-02
744
+ question_id: IAM-02.1
745
+ answer: 'yes'
746
+ comment: Ribose has defined a data governance procedure that covers the account
747
+ life cycle (removal) of Ribose users.
748
+ - control_id: IS-07
749
+ question_id: IAM-02.2
750
+ answer: 'yes'
751
+ comment: Crimson
752
+ - control_id: IAM-03
753
+ question_id: IAM-03.1
754
+ answer: 'yes'
755
+ comment: VPC
756
+ - control_id: IAM-04
757
+ question_id: IAM-04.1
758
+ answer: 'yes'
759
+ comment: All user accounts are centrally egistered in the Access Rights spreadsheet.
760
+ Network, system and document access is based on least priviledge.
761
+ - control_id: IAM-04
762
+ question_id: IAM-04.2
763
+ answer: 'yes'
764
+ comment: All user accounts are centrally egistered in the Access Rights spreadsheet.
765
+ Network, system and document access is based on least priviledge.
766
+ - control_id: IAM-05
767
+ question_id: IAM-05.1
768
+ answer: 'yes'
769
+ comment: An Access Control Policy has been defined in the Information Security
770
+ Policy.
771
+ - control_id: IAM-06
772
+ question_id: IAM-06.1
773
+ answer: 'yes'
774
+ comment: Access control to the Ribose version control system (git) is enforced
775
+ by change management requiring senior management approval.
776
+ - control_id: IS-33
777
+ question_id: IAM-06.2
778
+ answer: 'yes'
779
+ comment: Access control to the Ribose version control system (git) is enforced
780
+ by change management requiring senior management approval.
781
+ - control_id: IAM-07
782
+ question_id: IAM-07.1
783
+ answer: 'yes'
784
+ comment: BCP and risk management procedure
785
+ - control_id: RI-05
786
+ question_id: IAM-07.2
787
+ answer: 'yes'
788
+ comment: datadog
789
+ - control_id: RI-05
790
+ question_id: IAM-07.3
791
+ answer: 'yes'
792
+ comment: Mainly AWS, can be switched to Rackspace or Azure
793
+ - control_id: RI-05
794
+ question_id: IAM-07.4
795
+ answer: 'yes'
796
+ comment: network diagram
797
+ - control_id: RI-05
798
+ question_id: IAM-07.5
799
+ answer: 'yes'
800
+ comment: customer feedback
801
+ - control_id: RI-05
802
+ question_id: IAM-07.6
803
+ answer: NA
804
+ comment: SaaS, not Iaas. failover will be performed automatically
805
+ - control_id: RI-05
806
+ question_id: IAM-07.7
807
+ answer: 'yes'
808
+ comment: on request
809
+ - control_id: IAM-08
810
+ question_id: IAM-08.1
811
+ answer: 'yes'
812
+ comment: |-
813
+ Chapter 11, Access Control Policy of the ISP covers this control:
814
+ Principles
815
+ - Access to network, systems, applications and information are granted to users on a need-to-know basis, taking into considerations of the business need versus security implications, separation of duties within business pro- cesses, and classification of information.
816
+ - For network connectivity or services, the security principle “Everything is generally forbidden unless expressly permitted” shall also be considered when granting accesses.
817
+ - control_id: IS-08
818
+ question_id: IAM-08.2
819
+ answer: 'yes'
820
+ comment: Data classification is defined.
821
+ - control_id: IAM-09
822
+ question_id: IAM-09.1
823
+ answer: 'yes'
824
+ comment: |-
825
+ An Access Control Policy has been defined in the Information Security Policy.
826
+
827
+ Ribose users have fine grained access control over the spaces that they administer.
828
+ - control_id: IAM-09
829
+ question_id: IAM-09.2
830
+ answer: NA
831
+ comment: Ribose users have fine grained access control over the spaces that they
832
+ administer.
833
+ - control_id: IAM-10
834
+ question_id: IAM-10.1
835
+ answer: 'yes'
836
+ comment: An Access Control Policy has been defined in the Information Security
837
+ Policy.
838
+ - control_id: IS-10
839
+ question_id: IAM-10.2
840
+ answer: 'yes'
841
+ comment: log changes in auditing and papertrails
842
+ - control_id: IS-10
843
+ question_id: IAM-10.3
844
+ answer: NA
845
+ comment: Ribose will notice customers for security incidents
846
+ - control_id: IAM-11
847
+ question_id: IAM-11.1
848
+ answer: 'yes'
849
+ comment: |-
850
+ Entry and Exit Procedures are described in the Ribose Operations wiki
851
+ 1. Entry Procedures
852
+ 2. Exit Procedures
853
+ - control_id: IS-09
854
+ question_id: IAM-11.2
855
+ answer: 'yes'
856
+ comment: exit procedures
857
+ - control_id: IAM-12
858
+ question_id: IAM-12.1
859
+ answer: 'yes'
860
+ comment: Users can access all applications in Ribose after sign on.
861
+ - control_id: SA-02
862
+ question_id: IAM-12.2
863
+ answer: 'yes'
864
+ comment: devise
865
+ - control_id: SA-02
866
+ question_id: IAM-12.3
867
+ answer: 'yes'
868
+ comment: devise
869
+ - control_id: SA-02
870
+ question_id: IAM-12.4
871
+ answer: 'yes'
872
+ comment: User Access Management policy
873
+ - control_id: SA-02
874
+ question_id: IAM-12.5
875
+ answer: 'yes'
876
+ comment: role-based
877
+ - control_id: SA-02
878
+ question_id: IAM-12.6
879
+ answer: 'yes'
880
+ comment: 2 factor authentication enabled for AWS console
881
+ - control_id: SA-02
882
+ question_id: IAM-12.7
883
+ answer: 'yes'
884
+ comment: AWS supports integration with third-party identity assurance services.
885
+ - control_id: IAM-12
886
+ question_id: IAM-12.8
887
+ answer: 'yes'
888
+ comment: Password Management Policy
889
+ - control_id: IAM-12
890
+ question_id: IAM-12.9
891
+ answer: 'no'
892
+ comment: Ribose enforces the password policy
893
+ - control_id: IAM-12
894
+ question_id: IAM-12.10
895
+ answer: 'yes'
896
+ comment: Users need to enter the password himself when first logon.
897
+ - control_id: IAM-12
898
+ question_id: IAM-12.11
899
+ answer: NA
900
+ comment: account locking is disabled to prevent hackers to lock someone's account.
901
+ - control_id: IAM-13
902
+ question_id: IAM-13.1
903
+ answer: 'yes'
904
+ comment: administrators
905
+ - control_id: IS-34
906
+ question_id: IAM-13.2
907
+ answer: 'no'
908
+ comment: detections by Amazon
909
+ - control_id: IS-34
910
+ question_id: IAM-13.3
911
+ answer: 'yes'
912
+ comment: BCP and risk management procedure
913
+ - control_id: IVS-01
914
+ question_id: IVS-01.1
915
+ answer: 'yes'
916
+ comment: AIDE installed
917
+ - control_id: SA-14
918
+ question_id: IVS-01.2
919
+ answer: 'yes'
920
+ comment: audit and logging are enabled
921
+ - control_id: SA-14
922
+ question_id: IVS-01.3
923
+ answer: 'yes'
924
+ comment: Legal and Regulatory Compliance Procedure
925
+ - control_id: IVS-01
926
+ question_id: IVS-01.4
927
+ answer: 'yes'
928
+ comment: papertrails and S3
929
+ - control_id: IVS-01
930
+ question_id: IVS-01.5
931
+ answer: 'yes'
932
+ comment: papertrails
933
+ - control_id: IVS-02
934
+ question_id: IVS-02.1
935
+ answer: 'yes'
936
+ comment: changes are restrcited by git and user permission
937
+ - control_id: IVS-02
938
+ question_id: IVS-02.2
939
+ answer: 'yes'
940
+ comment: changes are restrcited by git and user permission
941
+ - control_id: IVS-03
942
+ question_id: IVS-03.1
943
+ answer: 'yes'
944
+ comment: NTP
945
+ - control_id: IVS-04
946
+ question_id: IVS-04.1
947
+ answer: 'yes'
948
+ comment: Crimson and git repo ribose-infrastructure
949
+ - control_id: OP-03
950
+ question_id: IVS-04.2
951
+ answer: 'yes'
952
+ comment: ribose-infrastructure
953
+ - control_id: IVS-04
954
+ question_id: IVS-04.3
955
+ answer: 'yes'
956
+ comment: capacity plan and auto scaling
957
+ - control_id: IVS-04
958
+ question_id: IVS-04.4
959
+ answer: 'yes'
960
+ comment: AWS metrics and datadog
961
+ - control_id: IVS-05
962
+ question_id: IVS-05.1
963
+ answer: 'yes'
964
+ comment: penetration test and vulnerability scanning
965
+ - control_id: IVS-06
966
+ question_id: IVS-06.1
967
+ answer: NA
968
+ comment: SaaS
969
+ - control_id: IVS-06
970
+ question_id: IVS-06.2
971
+ answer: 'yes'
972
+ comment: network diagram
973
+ - control_id: IVS-06
974
+ question_id: IVS-06.3
975
+ answer: 'yes'
976
+ comment: change management procedure
977
+ - control_id: IVS-06
978
+ question_id: IVS-06.4
979
+ answer: 'yes'
980
+ comment: ribose-infrastructure
981
+ - control_id: IVS-07
982
+ question_id: IVS-07.1
983
+ answer: 'yes'
984
+ comment: ribose-infrastructure
985
+ - control_id: IVS-08
986
+ question_id: IVS-08.1
987
+ answer: 'yes'
988
+ comment: prodcution environment for customers and staging environment for internal
989
+ developers
990
+ - control_id: SA-06
991
+ question_id: IVS-08.2
992
+ answer: NA
993
+ comment: SaaS
994
+ - control_id: IVS-08
995
+ question_id: IVS-08.3
996
+ answer: 'yes'
997
+ comment: different VPC
998
+ - control_id: IVS-09
999
+ question_id: IVS-09.1
1000
+ answer: 'yes'
1001
+ comment: VPC and security groups
1002
+ - control_id: SA-09
1003
+ question_id: IVS-09.2
1004
+ answer: 'yes'
1005
+ comment: VPC and security groups
1006
+ - control_id: SA-09
1007
+ question_id: IVS-09.3
1008
+ answer: 'yes'
1009
+ comment: different VPC
1010
+ - control_id: SA-09
1011
+ question_id: IVS-09.4
1012
+ answer: 'yes'
1013
+ comment: VPC and security groups
1014
+ - control_id: IVS-10
1015
+ question_id: IVS-10.1
1016
+ answer: 'yes'
1017
+ comment: SSH and SSL
1018
+ - control_id: IVS-10
1019
+ question_id: IVS-10.2
1020
+ answer: 'yes'
1021
+ comment: VPC
1022
+ - control_id: IVS-11
1023
+ question_id: IVS-11.1
1024
+ answer: 'yes'
1025
+ comment: administrators
1026
+ - control_id: IVS-12
1027
+ question_id: IVS-12.1
1028
+ answer: 'yes'
1029
+ comment: Wireless Communication Policy
1030
+ - control_id: SA-10
1031
+ question_id: IVS-12.2
1032
+ answer: 'yes'
1033
+ comment: Wireless Communication Policy
1034
+ - control_id: SA-10
1035
+ question_id: IVS-12.3
1036
+ answer: 'yes'
1037
+ comment: whitelist of company-owned/managed MAC addresses used to reject any rogue
1038
+ wireless network devices.
1039
+ - control_id: IVS-13
1040
+ question_id: IVS-13.1
1041
+ answer: 'yes'
1042
+ comment: Crimson states which legal and privacy regulations affect the data handling
1043
+ and location
1044
+ - control_id: IVS-13
1045
+ question_id: IVS-13.2
1046
+ answer: 'yes'
1047
+ comment: Ribose IaaS provider Amazon has various levels of protection
1048
+ - control_id: IPY-01
1049
+ question_id: IPY-01.1
1050
+ answer: 'yes'
1051
+ comment: Ribose-api in github
1052
+ - control_id: IPY-02
1053
+ question_id: IPY-02.1
1054
+ answer: 'yes'
1055
+ comment: json
1056
+ - control_id: IPY-03
1057
+ question_id: IPY-03.1
1058
+ answer: 'yes'
1059
+ comment: same as service
1060
+ - control_id: IPY-03
1061
+ question_id: IPY-03.2
1062
+ answer: 'yes'
1063
+ comment: same as service
1064
+ - control_id: IPY-04
1065
+ question_id: IPY-04.1
1066
+ answer: 'yes'
1067
+ comment: ssl
1068
+ - control_id: IPY-04
1069
+ question_id: IPY-04.2
1070
+ answer: NA
1071
+ comment: https is a common protocol
1072
+ - control_id: IPY-05
1073
+ question_id: IPY-05.1
1074
+ answer: 'yes'
1075
+ comment: Xen
1076
+ - control_id: IPY-05
1077
+ question_id: IPY-05.2
1078
+ answer: 'yes'
1079
+ comment: Refer to the AWS Cloud Security Whitepaper for additional details - available
1080
+ at http://aws.amazon.com/security."
1081
+ - control_id: MOS-01
1082
+ question_id: MOS-01.1
1083
+ answer: 'yes'
1084
+ comment: Training is included and performed. This is incorporated in our Information
1085
+ Security Policy, chapter "Mobile Device Policy"
1086
+ - control_id: MOS-02
1087
+ question_id: MOS-02.1
1088
+ answer: 'yes'
1089
+ comment: Approved software list
1090
+ - control_id: MOS-03
1091
+ question_id: MOS-03.1
1092
+ answer: 'yes'
1093
+ - control_id: MOS-04
1094
+ question_id: MOS-04.1
1095
+ answer: NA
1096
+ comment: Ribose does not allow BYOD.
1097
+ - control_id: MOS-05
1098
+ question_id: MOS-05.1
1099
+ answer: 'yes'
1100
+ comment: This is incorporated in our Information Security Policy, chapter "Mobile
1101
+ Device Policy"
1102
+ - control_id: MOS-06
1103
+ question_id: MOS-06.1
1104
+ answer: 'yes'
1105
+ comment: This is incorporated in our Information Security Policy, chapter "Mobile
1106
+ Device Policy"
1107
+ - control_id: MOS-07
1108
+ question_id: MOS-07.1
1109
+ answer: 'yes'
1110
+ comment: Ribose has a documented application validation process in the Ribose
1111
+ development space wiki named "Application Validation Process"
1112
+ - control_id: MOS-08
1113
+ question_id: MOS-08.1
1114
+ answer: NA
1115
+ comment: Ribose does not allow BYOD.
1116
+ - control_id: MOS-09
1117
+ question_id: MOS-09.1
1118
+ answer: NA
1119
+ comment: Ribose does not allow BYOD.
1120
+ - control_id: MOS-10
1121
+ question_id: MOS-10.1
1122
+ answer: 'yes'
1123
+ comment: meraki
1124
+ - control_id: MOS-11
1125
+ question_id: MOS-11.1
1126
+ answer: 'yes'
1127
+ comment: 'Mobile device policy requires use of entire disk encryption. '
1128
+ - control_id: MOS-12
1129
+ question_id: MOS-12.1
1130
+ answer: 'yes'
1131
+ comment: This is incorporated in our Information Security Policy, chapter "Mobile
1132
+ Device Policy"
1133
+ - control_id: MOS-12
1134
+ question_id: MOS-12.2
1135
+ answer: 'yes'
1136
+ comment: This is incorporated in our Information Security Policy, chapter "Mobile
1137
+ Device Policy"
1138
+ - control_id: MOS-13
1139
+ question_id: MOS-13.1
1140
+ answer: NA
1141
+ comment: Ribose does not allow BYOD.
1142
+ - control_id: MOS-13
1143
+ question_id: MOS-13.2
1144
+ answer: NA
1145
+ comment: Ribose does not allow BYOD.
1146
+ - control_id: MOS-14
1147
+ question_id: MOS-14.1
1148
+ answer: 'yes'
1149
+ comment: Screensaver functionality has been enabled.
1150
+ - control_id: MOS-15
1151
+ question_id: MOS-15.1
1152
+ answer: 'yes'
1153
+ comment: meraki
1154
+ - control_id: MOS-16
1155
+ question_id: MOS-16.1
1156
+ answer: 'yes'
1157
+ comment: password policy
1158
+ - control_id: MOS-16
1159
+ question_id: MOS-16.2
1160
+ answer: 'yes'
1161
+ comment: Password policy has been enforced.
1162
+ - control_id: MOS-16
1163
+ question_id: MOS-16.3
1164
+ answer: 'yes'
1165
+ comment: Password policy has been enforced.
1166
+ - control_id: MOS-17
1167
+ question_id: MOS-17.1
1168
+ answer: NA
1169
+ comment: Ribose does not allow BYOD.
1170
+ - control_id: MOS-17
1171
+ question_id: MOS-17.2
1172
+ answer: NA
1173
+ comment: Ribose does not allow BYOD.
1174
+ - control_id: MOS-17
1175
+ question_id: MOS-17.3
1176
+ answer: NA
1177
+ comment: Ribose does not allow BYOD.
1178
+ - control_id: MOS-18
1179
+ question_id: MOS-18.1
1180
+ answer: NA
1181
+ comment: Ribose does not allow BYOD.
1182
+ - control_id: MOS-18
1183
+ question_id: MOS-18.2
1184
+ answer: 'yes'
1185
+ comment: meraki
1186
+ - control_id: MOS-19
1187
+ question_id: MOS-19.1
1188
+ answer: 'yes'
1189
+ comment: meraki
1190
+ - control_id: MOS-19
1191
+ question_id: MOS-19.2
1192
+ answer: 'yes'
1193
+ comment: meraki
1194
+ - control_id: MOS-20
1195
+ question_id: MOS-20.1
1196
+ answer: NA
1197
+ comment: Ribose does not allow BYOD.
1198
+ - control_id: MOS-20
1199
+ question_id: MOS-20.2
1200
+ answer: NA
1201
+ comment: Ribose does not allow BYOD.
1202
+ - control_id: SEF-01
1203
+ question_id: SEF-01.1
1204
+ answer: 'yes'
1205
+ comment: A contact law enforcement policy has been established with details of
1206
+ the Hong Kong Police Force Technology Crime Division(TCD).
1207
+ - control_id: SEF-02
1208
+ question_id: SEF-02.1
1209
+ answer: 'yes'
1210
+ comment: A security incident procedure has been established.
1211
+ - control_id: IS-22
1212
+ question_id: SEF-02.2
1213
+ answer: 'yes'
1214
+ comment: A security incident procedure has been established.
1215
+ - control_id: IS-22
1216
+ question_id: SEF-02.3
1217
+ answer: 'yes'
1218
+ comment: Terms of Use
1219
+ - control_id: SEF-02
1220
+ question_id: SEF-02.4
1221
+ answer: 'yes'
1222
+ comment: BCP
1223
+ - control_id: SEF-03
1224
+ question_id: SEF-03.1
1225
+ answer: 'yes'
1226
+ comment: A security incident procedure has been established.
1227
+ - control_id: IS-23
1228
+ question_id: SEF-03.2
1229
+ answer: NA
1230
+ comment: SaaS
1231
+ - control_id: SEF-04
1232
+ question_id: SEF-04.1
1233
+ answer: 'yes'
1234
+ comment: ISO 27001
1235
+ - control_id: IS-24
1236
+ question_id: SEF-04.2
1237
+ answer: 'yes'
1238
+ comment: Ribose has established a forensics evidence procedure.
1239
+ - control_id: IS-24
1240
+ question_id: SEF-04.3
1241
+ answer: 'yes'
1242
+ comment: account can be disabled
1243
+ - control_id: IS-24
1244
+ question_id: SEF-04.4
1245
+ answer: NA
1246
+ comment: SaaS
1247
+ - control_id: SEF-05
1248
+ question_id: SEF-05.1
1249
+ answer: 'yes'
1250
+ comment: papertrails
1251
+ - control_id: IS-25
1252
+ question_id: SEF-05.2
1253
+ answer: NA
1254
+ comment: SaaS
1255
+ - control_id: STA-01
1256
+ question_id: STA-01.1
1257
+ answer: 'yes'
1258
+ comment: This control has been incorporated in the External Service Provider Audit
1259
+ Checklist which has been used for key vendors. These checklists are subject
1260
+ to annual review.
1261
+ - control_id: STA-01
1262
+ question_id: STA-01.2
1263
+ answer: 'yes'
1264
+ comment: This control has been incorporated in the External Service Provider Audit
1265
+ Checklist which has been used for key vendors. These checklists are subject
1266
+ to annual review.
1267
+ - control_id: STA-02
1268
+ question_id: STA-02.1
1269
+ answer: 'yes'
1270
+ comment: All users will be notified of security incidents through the Ribose blog.
1271
+ This is listed in the communications procedure.
1272
+ - control_id: STA-03
1273
+ question_id: STA-03.1
1274
+ answer: 'yes'
1275
+ comment: capacity plan and auto scaling
1276
+ - control_id: IS-31
1277
+ question_id: STA-03.2
1278
+ answer: NA
1279
+ comment: SaaS
1280
+ - control_id: STA-04
1281
+ question_id: STA-04.1
1282
+ answer: 'yes'
1283
+ comment: internal and external audits
1284
+ - control_id: STA-05
1285
+ question_id: STA-05.1
1286
+ answer: 'yes'
1287
+ comment: supplier evaluations
1288
+ - control_id: LG-02
1289
+ question_id: STA-05.2
1290
+ answer: 'yes'
1291
+ comment: supplier evaluations
1292
+ - control_id: LG-02
1293
+ question_id: STA-05.3
1294
+ answer: 'yes'
1295
+ comment: supplier evaluations
1296
+ - control_id: STA-05
1297
+ question_id: STA-05.4
1298
+ answer: 'yes'
1299
+ comment: supplier evaluations
1300
+ - control_id: STA-05
1301
+ question_id: STA-05.5
1302
+ answer: 'yes'
1303
+ comment: supplier evaluations
1304
+ - control_id: STA-06
1305
+ question_id: STA-06.1
1306
+ answer: 'yes'
1307
+ comment: Annual review during of the risk assessment and External Service Provider
1308
+ Audit Checklist is performed.
1309
+ - control_id: STA-07
1310
+ question_id: STA-07.1
1311
+ answer: 'yes'
1312
+ comment: OLA and datadog
1313
+ - control_id: STA-07
1314
+ question_id: STA-07.2
1315
+ answer: 'yes'
1316
+ comment: Ribose performs annual reviews of supplier evalutations
1317
+ - control_id: STA-07
1318
+ question_id: STA-07.3
1319
+ answer: 'yes'
1320
+ comment: Ribose defined OLA/SLA with the alignment of suppliers
1321
+ - control_id: STA-07
1322
+ question_id: STA-07.4
1323
+ answer: 'yes'
1324
+ comment: Ribose performs annual reviews of supplier evalutations
1325
+ - control_id: STA-08
1326
+ question_id: STA-08.1
1327
+ answer: 'yes'
1328
+ comment: Ribose performs annual reviews of supplier evalutations
1329
+ - control_id: STA-08
1330
+ question_id: STA-08.2
1331
+ answer: 'yes'
1332
+ comment: Ribose performs annual reviews of supplier evalutations
1333
+ - control_id: STA-09
1334
+ question_id: STA-09.1
1335
+ answer: 'yes'
1336
+ comment: Ribose performs annual reviews of supplier evalutations
1337
+ - control_id: STA-09
1338
+ question_id: STA-09.2
1339
+ answer: 'yes'
1340
+ comment: vulnerability scans and penetration tests are performed annually.
1341
+ - control_id: TVM-01
1342
+ question_id: TVM-01.1
1343
+ answer: 'yes'
1344
+ comment: Relevant policies and procedures are defined in the ISMS
1345
+ - control_id: IS-21
1346
+ question_id: TVM-01.2
1347
+ answer: 'yes'
1348
+ comment: meraki
1349
+ - control_id: TVM-02
1350
+ question_id: TVM-02.1
1351
+ answer: 'yes'
1352
+ comment: suricata
1353
+ - control_id: IS-20
1354
+ question_id: TVM-02.2
1355
+ answer: 'yes'
1356
+ comment: vuls openscap
1357
+ - control_id: IS-20
1358
+ question_id: TVM-02.3
1359
+ answer: 'yes'
1360
+ comment: Ossec
1361
+ - control_id: IS-20
1362
+ question_id: TVM-02.4
1363
+ answer: NA
1364
+ comment: SaaS
1365
+ - control_id: IS-20
1366
+ question_id: TVM-02.5
1367
+ answer: 'yes'
1368
+ comment: packer
1369
+ - control_id: IS-20
1370
+ question_id: TVM-02.6
1371
+ answer: 'yes'
1372
+ comment: maintenance page (statuspage)
1373
+ - control_id: TVM-03
1374
+ question_id: TVM-03.1
1375
+ answer: 'yes'
1376
+ comment: antivirus installed
1377
+ - control_id: SA-15
1378
+ question_id: TVM-03.2
1379
+ answer: 'yes'
1380
+ comment: antivirus installed