Evidence Catalog
Comprehensive evidence repository for SOC 2 audit preparation
140
Total Evidence
136
Ready for Audit
0
Accepted
97.1%
Audit Readiness
K
Showing 140 of 140 evidence items
Name | Category | Status | Type |
---|---|---|---|
Critical vulnerabilities identified in packages are addressed (GitHub Repo) This test ensures that all critical severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved. | VULNERABILITY MANAGEMENT | Ready | TEST |
High vulnerabilities identified in packages are addressed (GitHub Repo) This test ensures that all high severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved. | VULNERABILITY MANAGEMENT | Ready | TEST |
Low vulnerabilities identified in packages are addressed (GitHub Repo) This test ensures that all low severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved. | VULNERABILITY MANAGEMENT | Ready | TEST |
Medium vulnerabilities identified in packages are addressed (GitHub Repo) This test ensures that all medium severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved. | VULNERABILITY MANAGEMENT | Ready | TEST |
Password manager records This test verififes that all personnel workstations with Vanta Device Monitor installed have a password manager installed. | COMPUTERS | Ready | TEST |
SSL/TLS on admin page of infrastructure console This test confirms that all AWS service API endpoints enforce encryption via TLS (Transport Layer Security) by default. This ensures secure communication between your administrators and AWS infrastructure services. | MONITORING ALERTS | Ready | TEST |
Risk Assessment exercise completed annually This test checks that a snapshot of your risk register was taken within the past year and that it is available to auditors. | RISK ANALYSIS | Ready | TEST |
Security awareness training selected This test checks whether your organization has selected a general security awareness training program. Choosing a training program is the first step to ensure employees receive education on fundamental security best practices. | EMPLOYEES | Ready | TEST |
General security awareness training records tracked This test verifies that all employees have completed general security awareness training and that their completion is tracked within Vanta. This helps ensure that everyone is aware of essential security protocols and best practices. | EMPLOYEES | Ready | TEST |
Serverless function error rate monitored (AWS) This test verifies that all AWS Lambda functions have CloudWatch alarms configured to monitor their Errors metric—either individually per function or globally for all functions. | MONITORING ALERTS | Ready | TEST |
Server CPU monitored (AWS) This test verifies whether all AWS EC2 instances have a CloudWatch alarm set specifically for the `CPUUtilization` metric to ensure proper monitoring and alerts in case of high CPU usage. | MONITORING ALERTS | Ready | TEST |
Slack accounts deprovisioned when personnel leave This test checks that Slack accounts associated with removed users have been removed or deactivated. | ACCOUNT SECURITY | Ready | TEST |
Slack accounts associated with users This test verifies that all Slack accounts in your organization are linked (assigned) to active users managed within your identity system, ensuring each account has a clearly identified owner. | ACCOUNT SETUP | Ready | TEST |
Messaging queue message age monitored This test verifies that all AWS SQS queues have appropriate CloudWatch alarms configured to monitor the `ApproximateAgeOfOldestMessage` metric, which indicates message processing delays or potential queue blockages. | MONITORING ALERTS | Ready | TEST |
Strong SSL/TLS ciphers used This test verifies that your SSL/TLS configurations only permit secure cipher suites (those with a cipher grade of "A") for encrypted web connections. | INFRASTRUCTURE | Ready | TEST |
SSL configuration has no known issues This test verifies that your website's SSL configuration does not produce any security-related TLS warnings that could compromise secure communication. | INFRASTRUCTURE | Ready | TEST |
SSL/TLS certificate has not expired This test verifies that the SSL/TLS certificate for your company’s primary website has not expired. An expired certificate can lead to browser warnings, disrupt customer trust, and leave your site vulnerable to man-in-the-middle attacks. | INFRASTRUCTURE | Ready | TEST |
SSL/TLS enforced on company website This test checks that your company's website automatically redirects from HTTP to HTTPS using a 3XX status code. Enforcing HTTPS ensures encrypted communication, protecting users from data interception or tampering. | INFRASTRUCTURE | Ready | TEST |
Personnel have unique SSH keys Verifies that any two computers with Vanta Device Monitor installed share no SSH keys if the computers are owned by different personnel. This test doesn't check Windows computers. | COMPUTERS | Ready | TEST |
Offboarding completed for terminated personnel within SLA This test verifies that all ex-employees linked to Vanta have been properly offboarded within the service-level agreement (SLA) timeframe. | EMPLOYEES | Ready | TEST |
Vendors list maintained This test verifies that you have manually added at least one vendor (other than automatically integrated accounts) on the [Vendors page](/vendors) that is visible to auditors. If you do not have any vendors beyond what Vanta integrates with, you can deactivate this test. | VENDORS | Ready | TEST |
Vendors assigned risk levels Verifies that all vendors on the [Vendors page](/vendors) have a risk level assigned. | VENDORS | Ready | TEST |
Company has a version control system This test checks whether any repository in your connected version control system has been updated within the past 30 days. | SOFTWARE DEVELOPMENT | Ready | TEST |
Zoom accounts deprovisioned when personnel leave Verifies that Zoom accounts linked to removed users are removed. | IT | Ready | TEST |
Zoom accounts associated with users Verifies that all Zoom accounts have been linked to users within Vanta. | IT | Ready | TEST |
Code of Conduct acknowledged by employees and enforced Please provide evidence that Ishant Gupta acknowledged code of conduct. | CUSTOM | Ready | EVIDENCE_REQUEST |
Log management utilized Please provide timestamped evidence of log management tool being utilized during the window. | CUSTOM | Not Ready | EVIDENCE_REQUEST |
Risks assessments performed Please provide examples of remediation for the medium risks identified (if applicable). | CUSTOM | Ready | EVIDENCE_REQUEST |
Vendor management program established Please provide compliance reports for Certn, and Google workspace. | CUSTOM | Flagged | EVIDENCE_REQUEST |
Unique production database authentication enforced Vanta indicates that MFA is not enabled on the following GWS user accounts: Careers Mesta, Compliance Operations, Media Contact, Mesta Security, and Shubhada Bhat. Please enable MFA for these accounts and provide updated evidence confirming compliance. | CUSTOM | Not Ready | EVIDENCE_REQUEST |
Encryption key access restricted Please provide timestamped screenshots directly from the KMS showing the users who had access to the encryption keys during the audit period. | CUSTOM | Ready | EVIDENCE_REQUEST |
Password policy enforced Please provide timestamped screenshots showing the password configuration settings for GitHub, GWS, AWS, Certn and Jira. | CUSTOM | Ready | EVIDENCE_REQUEST |
Remote access encrypted enforced Please provide a timestamped screenshot of the encryption configuration (e.g., SSL/TLS/VPN) used for accessing the production systems remotely. | CUSTOM | Ready | EVIDENCE_REQUEST |
Anti-malware technology utilized Vanta is not displaying the antivirus status for the devices assigned to Abin Thomas, Aiswarya Paichadathil, Alwin Josep, Joel Paul, Rahul Giridharan, Riya Joseph, and Swathi Krishna. Please remediate this issue and provide the updated status. | CUSTOM | Ready | EVIDENCE_REQUEST |
Incident management procedures followed Please confirm whether any security or privacy incidents occurred during the audit period. If so, provide a list of such incidents. | CUSTOM | Not Ready | EVIDENCE_REQUEST |
Malware detection on Windows workstations Verifies that all employee Windows workstations with Vanta Device Monitor installed have antivirus software installed. | COMPUTERS | Ready | TEST |
Secure Development Policy To ensure that information security is designed and implemented within the development lifecycle for applications and information systems. | Uncategorized | Ready | POLICY |
Risk Management Policy To define the methodology for assessing and managing the company’s information security risks in order to achieve the company’s business and information security objectives. | Uncategorized | Ready | POLICY |
Physical Security Policy To prevent unauthorized physical access or damage to the organization’s information and information processing facilities. | Uncategorized | Ready | POLICY |
Operations Security Policy To ensure the correct and secure operation of information processing systems and facilities. | Uncategorized | Ready | POLICY |
Information Security Roles and Responsibilities This policy and associated guidance establish the roles and responsibilities within the company, which is critical for effective communication of information security policies and standards. | Uncategorized | Ready | POLICY |
Information Security Policy (AUP) The purpose of this policy is to communicate our information security policies and outline the acceptable use and protection of the company’s information and assets. | Uncategorized | Ready | POLICY |
Incident Response Plan This document establishes the plan for managing information security incidents and events, and offers guidance for employees or incident responders who believe they have discovered, or are responding to, a security incident. | Uncategorized | Ready | POLICY |
Human Resource Security Policy To ensure that personnel and contractors meet security requirements, understand their responsibilities, and are suitable for their roles. | Uncategorized | Ready | POLICY |
Data Management Policy To ensure that information is classified, protected, retained and securely disposed of in accordance with its importance to the organization. | Uncategorized | Ready | POLICY |
Cryptography Policy To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. This policy establishes requirements for the use and protection of cryptographic keys throughout their entire lifecycle. | Uncategorized | Ready | POLICY |
Code of Conduct Develops and maintains a standard of conduct that is acceptable to the company and its employees, customers, and vendors. | Uncategorized | Ready | POLICY |
Business Continuity and Disaster Recovery Plan The purpose of this business continuity plan is to prepare the company in the event of extended service outages caused by factors beyond our control (e.g., natural disasters, man-made events), and to restore services to the widest extent possible in a minimum time frame. | Uncategorized | Ready | POLICY |
Asset Management Policy To identify organizational assets and define appropriate protection responsibilities. To ensure that information receives an appropriate level of protection in accordance with its importance to the organization. To prevent unauthorized disclosure, modification, removal, or destruction of information stored on media. | Uncategorized | Ready | POLICY |
Access Control Policy To limit access to information and information processing systems, networks, and facilities to authorized parties in accordance with business objectives. | Uncategorized | Ready | POLICY |
Identity provider linked to Vanta This test verifies if you have at least one active identity provider (IdP) integration linked and providing data without errors. | ACCOUNT SETUP | Ready | TEST |
AWS accounts reviewed This test verifies that all AWS accounts have been linked to users within Vanta. Accounts that have open access requests or have not been linked to a Vanta user may cause this test to fail. | ACCOUNT SETUP | Ready | TEST |
CloudTrail enabled This test verifies that CloudTrail is enabled on all AWS accounts within your organization. | LOGGING | Ready | TEST |
Cloud infrastructure linked to Vanta This test verifies that at least one of the supported cloud infrastructure providers (AWS, GCP, Heroku, Azure, or DigitalOcean) is properly linked to Vanta. | INFRASTRUCTURE | Ready | TEST |
Groups manage employee accounts permissions Verifies that every AWS group has at least one IAM policy attached. | ACCOUNT SECURITY | Ready | TEST |
Service accounts used Verifies that every AWS account is assigned a role. | ACCOUNT SECURITY | Ready | TEST |
Root infrastructure account unused This test checks whether AWS root accounts have been used within the past 30 days. | ACCOUNT SECURITY | Ready | TEST |
Old infrastructure accounts disabled (AWS) This test checks for AWS IAM users (non-root) that have been inactive for more than 90 days and should be considered for removal. | ACCOUNT SECURITY | Ready | TEST |
No user account has a policy attached directly This test verifies that no AWS IAM users have policies attached directly to their user accounts, checking that policies are instead applied through user groups. | ACCOUNT SECURITY | Ready | TEST |
Company uses Vanta for continuous security monitoring Automatically passes. | INFRASTRUCTURE | Ready | TEST |
Password policy configured for infrastructure This test verifies that all AWS accounts in your organization have an active and properly configured password policy defined. | ACCOUNT SECURITY | Ready | TEST |
Inventory items have descriptions Verifies that all items on the Vanta inventory page have descriptions. | INFRASTRUCTURE | Ready | TEST |
Inventory items have active owners This test determines whether each item in the Vanta inventory has an assigned owner who is an active employee. | INFRASTRUCTURE | Ready | TEST |
Inventory list tracks resources that contain user data This test verifies whether certain resources—such as storage buckets, databases, PaaS apps, queues, data warehouses, or custom items—are marked as containing user data in Vanta. | INFRASTRUCTURE | Ready | TEST |
Jira accounts deprovisioned when personnel leave This test verifies that Jira accounts are promptly removed or deactivated when the associated user has been marked as terminated or removed from your organization. | ACCOUNT SECURITY | Ready | TEST |
Jira accounts associated with users This test verifies that each user account in Jira is properly linked to a corresponding user or clearly classified and managed (e.g., external or service account) within Vanta. | ACCOUNT SETUP | Ready | TEST |
LaunchDarkly accounts deprovisioned when personnel leave Verifies that LaunchDarkly accounts linked to removed users are removed. | ACCOUNT SECURITY | Ready | TEST |
LaunchDarkly accounts associated with users Verifies that all LaunchDarkly accounts have been linked to users within Vanta. | ACCOUNT SETUP | Ready | TEST |
Load balancer used (AWS) This test validates that each AWS account in your organization has at least one Application Load Balancer (ALB) configured. | INFRASTRUCTURE | Ready | TEST |
Only authorized users can access logging buckets Verifies that no AWS S3 logging buckets grant access to the built-in AWS groups AllUsers or AuthenticatedUsers | LOGGING | Ready | TEST |
S3 server access logs enabled This test verifies that there is at least one AWS S3 bucket configured as a central storage destination for CloudTrail event logging or S3 server access logging. | LOGGING | Ready | TEST |
Server logs retained for 365 days (AWS) This test verifies that AWS CloudWatch Log Groups are configured to retain logs for at least 365 days or are set to unlimited retention. | LOGGING | Ready | TEST |
MFA on Google Workspace This test verifies that all members of a Google Workspace organization have multi-factor authentication (MFA) enabled, except for users who were recently added within the configured SLA. | ACCOUNT SECURITY | Ready | TEST |
MFA on infrastructure provider This test checks whether all AWS accounts with a password have multi-factor authentication (MFA) enabled. | ACCOUNT SECURITY | Ready | TEST |
MFA on infrastructure root accounts (AWS) This test verifies that Multi-Factor Authentication (MFA) is enabled on AWS root accounts that have console password access enabled, excluding AWS GovCloud accounts. | ACCOUNT SECURITY | Ready | TEST |
SQL database CPU monitored Checks that all Amazon RDS database instances have CloudWatch alarms configured to monitor CPU utilization. | MONITORING ALERTS | Ready | TEST |
SQL database freeable memory monitored (AWS) Verifies that all Amazon RDS instances have associated AWS CloudWatch alarms configured to monitor the `FreeableMemory` metric. | MONITORING ALERTS | Ready | TEST |
Database IO monitored (AWS) This test verifies that Amazon RDS databases have CloudWatch alarms configured for at least one key Input/Output (IO) performance metrics (such as `DiskQueueDepth`, `WriteIOPS`, `ReadIOPS`, `VolumeWriteIOPs`, `VolumeReadIOPs`). | MONITORING ALERTS | Ready | TEST |
RDS instance IP restricted (AWS) This test verifies that your AWS RDS (MySQL-compatible) instances are not publicly accessible. Specifically, it ensures that the security groups attached to each RDS instance do not allow unrestricted inbound access from any IP address (e.g., `0.0.0.0/0` or `::/0`). | INFRASTRUCTURE | Ready | TEST |
NoSQL database read capacity monitored (AWS) This test verifies whether each AWS DynamoDB table has a configured CloudWatch alarm for monitoring the `ConsumedReadCapacityUnits` metric. | MONITORING ALERTS | Ready | TEST |
NoSQL database write capacity monitored (AWS) This test verifies whether each AWS DynamoDB table has a configured CloudWatch alarm for monitoring the `ConsumedWriteCapacityUnits` metric. | MONITORING ALERTS | Ready | TEST |
Cluster control plane endpoint private access is enabled (AWS EKS) This test checks whether AWS Elastic Kubernetes Service (EKS) clusters have private endpoint access enabled for their control plane endpoints. | INFRASTRUCTURE | Ready | TEST |
Cluster has a security group (AWS EKS) Verifies that all AWS EKS Kubernetes clusters have a security group. | INFRASTRUCTURE | Ready | TEST |
Application changes reviewed This test verifies the branch protection settings to ensure that at least one approval is required to merge code changes into the default or specified production branch of all linked version control repositories. | SOFTWARE DEVELOPMENT | Ready | TEST |
User data is encrypted at rest This test checks that all Amazon RDS instances storing user data are encrypted at rest. Encryption at rest helps ensure sensitive data remains secure even if storage is compromised. | DATA STORAGE | Ready | TEST |
Personnel have computers monitored by Vanta Device Monitor or an MDM This test verifies that all relevant personnel have a computer tracked in Vanta that is monitored by Vanta Device Monitor or an MDM. | COMPUTERS | Ready | TEST |
Unwanted traffic filtered Verifies that all AWS EC2 instances have network ACLs or security groups attached. | INFRASTRUCTURE | Ready | TEST |
Firewall default disallows traffic This test verifies that AWS firewall configurations (Security Groups and Network ACLs) default to denying inbound traffic, a behavior inherent to AWS infrastructure. It ensures that unless traffic is explicitly permitted, it will be blocked by default. | INFRASTRUCTURE | Ready | TEST |
Public SSH denied (AWS) This test verifies whether AWS EC2 instances have security groups configured to restrict inbound SSH (TCP port 22) traffic from the public internet (0.0.0.0/0). | INFRASTRUCTURE | Ready | TEST |
VPC Flow Logs enabled This test checks whether your AWS Virtual Private Clouds (VPCs) have VPC Flow Logs enabled for network traffic monitoring. | LOGGING | Ready | TEST |
Personnel computer hard disk encryption This test verifies that all of the employees' workstations with Vanta Device Monitor installed have encrypted hard drives across macOS, Windows, and Linux platforms. | COMPUTERS | Ready | TEST |
GitHub accounts deprovisioned when personnel leave This test verifies that GitHub accounts associated with terminated or inactive users have been promptly deprovisioned. | ACCOUNT SECURITY | Ready | TEST |
GitHub accounts associated with users This test verifies that all GitHub accounts have been linked to users within Vanta. | ACCOUNT SETUP | Ready | TEST |
MFA on GitHub This test verifies that multi-factor authentication (MFA) is enabled on all GitHub accounts that are not marked as external or non-human. | ACCOUNT SECURITY | Ready | TEST |
Author is not the reviewer of pull requests This test ensures that pull requests in GitHub are not self-approved by their authors. GitHub enforces this automatically—authors cannot approve their own pull requests. | SOFTWARE DEVELOPMENT | Ready | TEST |
Ensure branch protection rules are enforced for administrators (GitHub) This test verifies that all GitHub repositories linked to Vanta have branch protection rules enforced for administrators on the default branch or the explicitly specified production branch. | SOFTWARE DEVELOPMENT | Ready | TEST |
GitHub repository visibility has been set to private This test verifies that all GitHub repositories in your organization, excluding those explicitly forked from external repositories, have their visibility set to private. | SOFTWARE DEVELOPMENT | Ready | TEST |
Vulnerability scanning is enabled (GitHub) This test verifies that vulnerability scanning (via Dependabot) is enabled for your GitHub repositories, allowing you to identify and manage software vulnerabilities effectively. | VULNERABILITY MANAGEMENT | Ready | TEST |
Company completes security reviews for relevant vendors This test verifies whether vendors requiring security reviews have current and up-to-date reviews according to their risk levels. | VENDORS | Ready | TEST |
HR accounts associated with users This test verifies whether all active HR accounts have been properly linked to user profiles within Vanta. | ACCOUNT SETUP | Ready | TEST |
Company has an approved Access Control Policy This test verifies whether your company has an approved Access Control Policy (BSI). | POLICIES | Ready | TEST |
Company has an approved Asset Management Policy This test checks whether your company has an approved Asset Management Policy (BSI). | POLICIES | Ready | TEST |
Company has an approved Business Continuity and Disaster Recovery Plan This test verifies that your company has an approved Business Continuity and Disaster Recovery Plan (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Code of Conduct This test verifies that your company has an approved Code of Conduct (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Cryptography Policy This test verifies that your company has an approved Cryptography Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Data Management Policy This test verifies that your company has an approved Data Management Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Human Resource Security Policy This test verifies that your company has an approved Human Resource Security Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Incident Response Plan This test verifies that your company has an approved Incident Response Plan (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Risk Management Policy This test verifies that your company has an approved Risk Management Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Secure Development Policy This test verifies that your company has an approved Secure Development Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Company has an approved Third-Party Management Policy This test verifies that your company has an approved Third-Party Management Policy (BSI) in Vanta. | POLICIES | Ready | TEST |
Personnel agree to Access Control Policy Verifies that all relevant personnel have agreed to the [Access Control Policy](/policies/access-control-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Asset Management Policy Verifies that all relevant personnel have agreed to the [Asset Management Policy](/policies/asset-management-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Business Continuity and Disaster Recovery Plan Verifies that all relevant personnel have agreed to the [Business Continuity and Disaster Recovery Plan](/policies/business-continuity-and-disaster-recovery-plan-bsi). | POLICIES | Ready | TEST |
Personnel agree to Code of Conduct Verifies that all relevant personnel have agreed to the [Code of Conduct](/policies/code-of-conduct-bsi). | POLICIES | Ready | TEST |
Personnel agree to Cryptography Policy Verifies that all relevant personnel have agreed to the [Cryptography Policy](/policies/cryptography-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Data Management Policy Verifies that all relevant personnel have agreed to the [Data Management Policy](/policies/data-management-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Human Resource Security Policy Verifies that all relevant personnel have agreed to the [Human Resource Security Policy](/policies/human-resource-security-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Incident Response Plan Verifies that all relevant personnel have agreed to the [Incident Response Plan](/policies/incident-response-plan-bsi). | POLICIES | Ready | TEST |
Personnel agree to Information Security Policy (AUP) This test verifies that all required personnel have accepted your company's `Information Security Policy (AUP)`, ensuring they acknowledge and comply with your organization's information security practices. | POLICIES | Ready | TEST |
Personnel agree to Information Security Roles and Responsibilities Verifies that all relevant personnel have agreed to the [Information Security Roles and Responsibilities](/policies/information-security-roles-and-responsibilities-bsi). | POLICIES | Ready | TEST |
Personnel agree to Operations Security Policy Verifies that all relevant personnel have agreed to the [Operations Security Policy](/policies/operations-security-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Physical Security Policy Verifies that all relevant personnel have agreed to the [Physical Security Policy](/policies/physical-security-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Risk Management Policy Verifies that all relevant personnel have agreed to the [Risk Management Policy](/policies/risk-management-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Secure Development Policy Verifies that all relevant personnel have agreed to the [Secure Development Policy](/policies/secure-development-policy-bsi). | POLICIES | Ready | TEST |
Personnel agree to Third-Party Management Policy Verifies that all relevant personnel have agreed to the [Third-Party Management Policy](/policies/third-party-management-policy-bsi). | POLICIES | Ready | TEST |
Third-Party Management Policy To ensure protection of the organization's data and assets that are shared with, accessible to, or managed by suppliers, including external parties or third-party organizations such as service providers, vendors, and customers, and to maintain an agreed level of information security and service delivery in line with supplier agreements. | Uncategorized | Ready | POLICY |
Cloud provider service agreement Provide the most recent signed service agreement with your cloud provider (e.g., AWS, Azure, GCP). | VENDORS | Ready | EVIDENCE_REQUEST |
AWS accounts deprovisioned when personnel leave This test verifies AWS accounts are promptly deprovisioned once the associated user has been removed or terminated from your organization. | ACCOUNT SECURITY | Ready | TEST |
DynamoDB Tables encrypted (AWS) Verifies that AWS provides encryption at rest of all data stored within DynamoDB by default. | DATA STORAGE | Ready | TEST |
EC2 instance public ports restricted (AWS) This test verifies that AWS EC2 instances do not have any unapproved TCP/UDP ports exposed publicly through their security groups. Instances should only expose explicitly permitted ports defined in your configuration. | INFRASTRUCTURE | Ready | TEST |
EKS Clusters have audit logs enabled This test verifies that all audit log types (API server, audit, authenticator, controller manager, scheduler) are enabled for your AWS EKS clusters, ensuring comprehensive audit logging for security and compliance purposes. | LOGGING | Ready | TEST |
Intrusion detection system enabled (AWS) This test verifies whether AWS GuardDuty is correctly enabled in every AWS account and region connected to your environment. | INFRASTRUCTURE | Ready | TEST |
Intrusion detection system notifications configured (AWS) This test verifies that notifications for AWS GuardDuty threat detections are configured correctly, ensuring each AWS account and region is receiving GuardDuty notifications. | INFRASTRUCTURE | Ready | TEST |
AWS IAM Identity Center users deprovisioned when personnel leave Verifies that AWS Identity Center users linked to removed Vanta users are removed. | ACCOUNT SECURITY | Ready | TEST |
Cluster control plane endpoint public access is restricted (AWS EKS) This test verifies if AWS EKS clusters with public endpoint access enabled restrict access by setting specific CIDR blocks and do not allow traffic from all IP addresses (`0.0.0.0/0` or `::0/0`). | INFRASTRUCTURE | Ready | TEST |
Customer support site or email alias Provide a link to your publicly available customer support site (e.g., https://help.vanta.com/hc/en-us) or a screenshot of a recent customer support request (e.g., Jira ticket or email) being resolved. | SOFTWARE DEVELOPMENT | Ready | EVIDENCE_REQUEST |
Product documentation site Provide a public link, documentation of how-to guides, or reference materials for your product or service. | SOFTWARE DEVELOPMENT | Ready | EVIDENCE_REQUEST |
Intrusion detection system installation Screenshots or configuration showing that an Intrusion Detection System (IDS) is set up to monitor traffic for abnormal activity. | INFRASTRUCTURE | Ready | EVIDENCE_REQUEST |
CI/CD system in use Provide screenshots from your CI/CD (e.g., Jenkins, Gitlab, Travis CI) dashboard showing recent successful production code deployments. The dashboard may include name, environment, release version, relevant tags, and the state of the deploy. | SOFTWARE DEVELOPMENT | Ready | EVIDENCE_REQUEST |
Critical vulnerabilities identified in packages are addressed (GitHub Repo)
This test ensures that all critical severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved.
ReadyVULNERABILITY MANAGEMENTTEST
High vulnerabilities identified in packages are addressed (GitHub Repo)
This test ensures that all high severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved.
ReadyVULNERABILITY MANAGEMENTTEST
Low vulnerabilities identified in packages are addressed (GitHub Repo)
This test ensures that all low severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved.
ReadyVULNERABILITY MANAGEMENTTEST
Medium vulnerabilities identified in packages are addressed (GitHub Repo)
This test ensures that all medium severity vulnerabilities identified by GitHub's Dependabot in your repositories are addressed and resolved.
ReadyVULNERABILITY MANAGEMENTTEST
Password manager records
This test verififes that all personnel workstations with Vanta Device Monitor installed have a password manager installed.
ReadyCOMPUTERSTEST
SSL/TLS on admin page of infrastructure console
This test confirms that all AWS service API endpoints enforce encryption via TLS (Transport Layer Security) by default. This ensures secure communication between your administrators and AWS infrastructure services.
ReadyMONITORING ALERTSTEST
Risk Assessment exercise completed annually
This test checks that a snapshot of your risk register was taken within the past year and that it is available to auditors.
ReadyRISK ANALYSISTEST
Security awareness training selected
This test checks whether your organization has selected a general security awareness training program. Choosing a training program is the first step to ensure employees receive education on fundamental security best practices.
ReadyEMPLOYEESTEST
General security awareness training records tracked
This test verifies that all employees have completed general security awareness training and that their completion is tracked within Vanta. This helps ensure that everyone is aware of essential security protocols and best practices.
ReadyEMPLOYEESTEST
Serverless function error rate monitored (AWS)
This test verifies that all AWS Lambda functions have CloudWatch alarms configured to monitor their Errors metric—either individually per function or globally for all functions.
ReadyMONITORING ALERTSTEST
Server CPU monitored (AWS)
This test verifies whether all AWS EC2 instances have a CloudWatch alarm set specifically for the `CPUUtilization` metric to ensure proper monitoring and alerts in case of high CPU usage.
ReadyMONITORING ALERTSTEST
Slack accounts deprovisioned when personnel leave
This test checks that Slack accounts associated with removed users have been removed or deactivated.
ReadyACCOUNT SECURITYTEST
Slack accounts associated with users
This test verifies that all Slack accounts in your organization are linked (assigned) to active users managed within your identity system, ensuring each account has a clearly identified owner.
ReadyACCOUNT SETUPTEST
Messaging queue message age monitored
This test verifies that all AWS SQS queues have appropriate CloudWatch alarms configured to monitor the `ApproximateAgeOfOldestMessage` metric, which indicates message processing delays or potential queue blockages.
ReadyMONITORING ALERTSTEST
Strong SSL/TLS ciphers used
This test verifies that your SSL/TLS configurations only permit secure cipher suites (those with a cipher grade of "A") for encrypted web connections.
ReadyINFRASTRUCTURETEST
SSL configuration has no known issues
This test verifies that your website's SSL configuration does not produce any security-related TLS warnings that could compromise secure communication.
ReadyINFRASTRUCTURETEST
SSL/TLS certificate has not expired
This test verifies that the SSL/TLS certificate for your company’s primary website has not expired. An expired certificate can lead to browser warnings, disrupt customer trust, and leave your site vulnerable to man-in-the-middle attacks.
ReadyINFRASTRUCTURETEST
SSL/TLS enforced on company website
This test checks that your company's website automatically redirects from HTTP to HTTPS using a 3XX status code. Enforcing HTTPS ensures encrypted communication, protecting users from data interception or tampering.
ReadyINFRASTRUCTURETEST
Personnel have unique SSH keys
Verifies that any two computers with Vanta Device Monitor installed share no SSH keys if the computers are owned by different personnel. This test doesn't check Windows computers.
ReadyCOMPUTERSTEST
Offboarding completed for terminated personnel within SLA
This test verifies that all ex-employees linked to Vanta have been properly offboarded within the service-level agreement (SLA) timeframe.
ReadyEMPLOYEESTEST
Vendors list maintained
This test verifies that you have manually added at least one vendor (other than automatically integrated accounts) on the [Vendors page](/vendors) that is visible to auditors. If you do not have any vendors beyond what Vanta integrates with, you can deactivate this test.
ReadyVENDORSTEST
Vendors assigned risk levels
Verifies that all vendors on the [Vendors page](/vendors) have a risk level assigned.
ReadyVENDORSTEST
Company has a version control system
This test checks whether any repository in your connected version control system has been updated within the past 30 days.
ReadySOFTWARE DEVELOPMENTTEST
Zoom accounts deprovisioned when personnel leave
Verifies that Zoom accounts linked to removed users are removed.
ReadyITTEST
Zoom accounts associated with users
Verifies that all Zoom accounts have been linked to users within Vanta.
ReadyITTEST
Code of Conduct acknowledged by employees and enforced
Please provide evidence that Ishant Gupta acknowledged code of conduct.
ReadyCUSTOMEVIDENCE_REQUEST
Log management utilized
Please provide timestamped evidence of log management tool being utilized during the window.
Not ReadyCUSTOMEVIDENCE_REQUEST
Risks assessments performed
Please provide examples of remediation for the medium risks identified (if applicable).
ReadyCUSTOMEVIDENCE_REQUEST
Vendor management program established
Please provide compliance reports for Certn, and Google workspace.
FlaggedCUSTOMEVIDENCE_REQUEST
Unique production database authentication enforced
Vanta indicates that MFA is not enabled on the following GWS user accounts: Careers Mesta, Compliance Operations, Media Contact, Mesta Security, and Shubhada Bhat. Please enable MFA for these accounts and provide updated evidence confirming compliance.
Not ReadyCUSTOMEVIDENCE_REQUEST
Encryption key access restricted
Please provide timestamped screenshots directly from the KMS showing the users who had access to the encryption keys during the audit period.
ReadyCUSTOMEVIDENCE_REQUEST
Password policy enforced
Please provide timestamped screenshots showing the password configuration settings for GitHub, GWS, AWS, Certn and Jira.
ReadyCUSTOMEVIDENCE_REQUEST
Remote access encrypted enforced
Please provide a timestamped screenshot of the encryption configuration (e.g., SSL/TLS/VPN) used for accessing the production systems remotely.
ReadyCUSTOMEVIDENCE_REQUEST
Anti-malware technology utilized
Vanta is not displaying the antivirus status for the devices assigned to Abin Thomas, Aiswarya Paichadathil, Alwin Josep, Joel Paul, Rahul Giridharan, Riya Joseph, and Swathi Krishna. Please remediate this issue and provide the updated status.
ReadyCUSTOMEVIDENCE_REQUEST
Incident management procedures followed
Please confirm whether any security or privacy incidents occurred during the audit period. If so, provide a list of such incidents.
Not ReadyCUSTOMEVIDENCE_REQUEST
Malware detection on Windows workstations
Verifies that all employee Windows workstations with Vanta Device Monitor installed have antivirus software installed.
ReadyCOMPUTERSTEST
Secure Development Policy
To ensure that information security is designed and implemented within the development lifecycle for applications and information systems.
ReadyUncategorizedPOLICY
Risk Management Policy
To define the methodology for assessing and managing the company’s information security risks in order to achieve the company’s business and information security objectives.
ReadyUncategorizedPOLICY
Physical Security Policy
To prevent unauthorized physical access or damage to the organization’s information and information processing facilities.
ReadyUncategorizedPOLICY
Operations Security Policy
To ensure the correct and secure operation of information processing systems and facilities.
ReadyUncategorizedPOLICY
Information Security Roles and Responsibilities
This policy and associated guidance establish the roles and responsibilities within the company, which is critical for effective communication of information security policies and standards.
ReadyUncategorizedPOLICY
Information Security Policy (AUP)
The purpose of this policy is to communicate our information security policies and outline the acceptable use and protection of the company’s information and assets.
ReadyUncategorizedPOLICY
Incident Response Plan
This document establishes the plan for managing information security incidents and events, and offers guidance for employees or incident responders who believe they have discovered, or are responding to, a security incident.
ReadyUncategorizedPOLICY
Human Resource Security Policy
To ensure that personnel and contractors meet security requirements, understand their responsibilities, and are suitable for their roles.
ReadyUncategorizedPOLICY
Data Management Policy
To ensure that information is classified, protected, retained and securely disposed of in accordance with its importance to the organization.
ReadyUncategorizedPOLICY
Cryptography Policy
To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. This policy establishes requirements for the use and protection of cryptographic keys throughout their entire lifecycle.
ReadyUncategorizedPOLICY
Code of Conduct
Develops and maintains a standard of conduct that is acceptable to the company and its employees, customers, and vendors.
ReadyUncategorizedPOLICY
Business Continuity and Disaster Recovery Plan
The purpose of this business continuity plan is to prepare the company in the event of extended service outages caused by factors beyond our control (e.g., natural disasters, man-made events), and to restore services to the widest extent possible in a minimum time frame.
ReadyUncategorizedPOLICY
Asset Management Policy
To identify organizational assets and define appropriate protection responsibilities. To ensure that information receives an appropriate level of protection in accordance with its importance to the organization. To prevent unauthorized disclosure, modification, removal, or destruction of information stored on media.
ReadyUncategorizedPOLICY
Access Control Policy
To limit access to information and information processing systems, networks, and facilities to authorized parties in accordance with business objectives.
ReadyUncategorizedPOLICY
Identity provider linked to Vanta
This test verifies if you have at least one active identity provider (IdP) integration linked and providing data without errors.
ReadyACCOUNT SETUPTEST
AWS accounts reviewed
This test verifies that all AWS accounts have been linked to users within Vanta. Accounts that have open access requests or have not been linked to a Vanta user may cause this test to fail.
ReadyACCOUNT SETUPTEST
CloudTrail enabled
This test verifies that CloudTrail is enabled on all AWS accounts within your organization.
ReadyLOGGINGTEST
Cloud infrastructure linked to Vanta
This test verifies that at least one of the supported cloud infrastructure providers (AWS, GCP, Heroku, Azure, or DigitalOcean) is properly linked to Vanta.
ReadyINFRASTRUCTURETEST
Groups manage employee accounts permissions
Verifies that every AWS group has at least one IAM policy attached.
ReadyACCOUNT SECURITYTEST
Service accounts used
Verifies that every AWS account is assigned a role.
ReadyACCOUNT SECURITYTEST
Root infrastructure account unused
This test checks whether AWS root accounts have been used within the past 30 days.
ReadyACCOUNT SECURITYTEST
Old infrastructure accounts disabled (AWS)
This test checks for AWS IAM users (non-root) that have been inactive for more than 90 days and should be considered for removal.
ReadyACCOUNT SECURITYTEST
No user account has a policy attached directly
This test verifies that no AWS IAM users have policies attached directly to their user accounts, checking that policies are instead applied through user groups.
ReadyACCOUNT SECURITYTEST
Company uses Vanta for continuous security monitoring
Automatically passes.
ReadyINFRASTRUCTURETEST
Password policy configured for infrastructure
This test verifies that all AWS accounts in your organization have an active and properly configured password policy defined.
ReadyACCOUNT SECURITYTEST
Inventory items have descriptions
Verifies that all items on the Vanta inventory page have descriptions.
ReadyINFRASTRUCTURETEST
Inventory items have active owners
This test determines whether each item in the Vanta inventory has an assigned owner who is an active employee.
ReadyINFRASTRUCTURETEST
Inventory list tracks resources that contain user data
This test verifies whether certain resources—such as storage buckets, databases, PaaS apps, queues, data warehouses, or custom items—are marked as containing user data in Vanta.
ReadyINFRASTRUCTURETEST
Jira accounts deprovisioned when personnel leave
This test verifies that Jira accounts are promptly removed or deactivated when the associated user has been marked as terminated or removed from your organization.
ReadyACCOUNT SECURITYTEST
Jira accounts associated with users
This test verifies that each user account in Jira is properly linked to a corresponding user or clearly classified and managed (e.g., external or service account) within Vanta.
ReadyACCOUNT SETUPTEST
LaunchDarkly accounts deprovisioned when personnel leave
Verifies that LaunchDarkly accounts linked to removed users are removed.
ReadyACCOUNT SECURITYTEST
LaunchDarkly accounts associated with users
Verifies that all LaunchDarkly accounts have been linked to users within Vanta.
ReadyACCOUNT SETUPTEST
Load balancer used (AWS)
This test validates that each AWS account in your organization has at least one Application Load Balancer (ALB) configured.
ReadyINFRASTRUCTURETEST
Only authorized users can access logging buckets
Verifies that no AWS S3 logging buckets grant access to the built-in AWS groups AllUsers or AuthenticatedUsers
ReadyLOGGINGTEST
S3 server access logs enabled
This test verifies that there is at least one AWS S3 bucket configured as a central storage destination for CloudTrail event logging or S3 server access logging.
ReadyLOGGINGTEST
Server logs retained for 365 days (AWS)
This test verifies that AWS CloudWatch Log Groups are configured to retain logs for at least 365 days or are set to unlimited retention.
ReadyLOGGINGTEST
MFA on Google Workspace
This test verifies that all members of a Google Workspace organization have multi-factor authentication (MFA) enabled, except for users who were recently added within the configured SLA.
ReadyACCOUNT SECURITYTEST
MFA on infrastructure provider
This test checks whether all AWS accounts with a password have multi-factor authentication (MFA) enabled.
ReadyACCOUNT SECURITYTEST
MFA on infrastructure root accounts (AWS)
This test verifies that Multi-Factor Authentication (MFA) is enabled on AWS root accounts that have console password access enabled, excluding AWS GovCloud accounts.
ReadyACCOUNT SECURITYTEST
SQL database CPU monitored
Checks that all Amazon RDS database instances have CloudWatch alarms configured to monitor CPU utilization.
ReadyMONITORING ALERTSTEST
SQL database freeable memory monitored (AWS)
Verifies that all Amazon RDS instances have associated AWS CloudWatch alarms configured to monitor the `FreeableMemory` metric.
ReadyMONITORING ALERTSTEST
Database IO monitored (AWS)
This test verifies that Amazon RDS databases have CloudWatch alarms configured for at least one key Input/Output (IO) performance metrics (such as `DiskQueueDepth`, `WriteIOPS`, `ReadIOPS`, `VolumeWriteIOPs`, `VolumeReadIOPs`).
ReadyMONITORING ALERTSTEST
RDS instance IP restricted (AWS)
This test verifies that your AWS RDS (MySQL-compatible) instances are not publicly accessible. Specifically, it ensures that the security groups attached to each RDS instance do not allow unrestricted inbound access from any IP address (e.g., `0.0.0.0/0` or `::/0`).
ReadyINFRASTRUCTURETEST
NoSQL database read capacity monitored (AWS)
This test verifies whether each AWS DynamoDB table has a configured CloudWatch alarm for monitoring the `ConsumedReadCapacityUnits` metric.
ReadyMONITORING ALERTSTEST
NoSQL database write capacity monitored (AWS)
This test verifies whether each AWS DynamoDB table has a configured CloudWatch alarm for monitoring the `ConsumedWriteCapacityUnits` metric.
ReadyMONITORING ALERTSTEST
Cluster control plane endpoint private access is enabled (AWS EKS)
This test checks whether AWS Elastic Kubernetes Service (EKS) clusters have private endpoint access enabled for their control plane endpoints.
ReadyINFRASTRUCTURETEST
Cluster has a security group (AWS EKS)
Verifies that all AWS EKS Kubernetes clusters have a security group.
ReadyINFRASTRUCTURETEST
Application changes reviewed
This test verifies the branch protection settings to ensure that at least one approval is required to merge code changes into the default or specified production branch of all linked version control repositories.
ReadySOFTWARE DEVELOPMENTTEST
User data is encrypted at rest
This test checks that all Amazon RDS instances storing user data are encrypted at rest. Encryption at rest helps ensure sensitive data remains secure even if storage is compromised.
ReadyDATA STORAGETEST
Personnel have computers monitored by Vanta Device Monitor or an MDM
This test verifies that all relevant personnel have a computer tracked in Vanta that is monitored by Vanta Device Monitor or an MDM.
ReadyCOMPUTERSTEST
Unwanted traffic filtered
Verifies that all AWS EC2 instances have network ACLs or security groups attached.
ReadyINFRASTRUCTURETEST
Firewall default disallows traffic
This test verifies that AWS firewall configurations (Security Groups and Network ACLs) default to denying inbound traffic, a behavior inherent to AWS infrastructure. It ensures that unless traffic is explicitly permitted, it will be blocked by default.
ReadyINFRASTRUCTURETEST
Public SSH denied (AWS)
This test verifies whether AWS EC2 instances have security groups configured to restrict inbound SSH (TCP port 22) traffic from the public internet (0.0.0.0/0).
ReadyINFRASTRUCTURETEST
VPC Flow Logs enabled
This test checks whether your AWS Virtual Private Clouds (VPCs) have VPC Flow Logs enabled for network traffic monitoring.
ReadyLOGGINGTEST
Personnel computer hard disk encryption
This test verifies that all of the employees' workstations with Vanta Device Monitor installed have encrypted hard drives across macOS, Windows, and Linux platforms.
ReadyCOMPUTERSTEST
GitHub accounts deprovisioned when personnel leave
This test verifies that GitHub accounts associated with terminated or inactive users have been promptly deprovisioned.
ReadyACCOUNT SECURITYTEST
GitHub accounts associated with users
This test verifies that all GitHub accounts have been linked to users within Vanta.
ReadyACCOUNT SETUPTEST
MFA on GitHub
This test verifies that multi-factor authentication (MFA) is enabled on all GitHub accounts that are not marked as external or non-human.
ReadyACCOUNT SECURITYTEST
Author is not the reviewer of pull requests
This test ensures that pull requests in GitHub are not self-approved by their authors. GitHub enforces this automatically—authors cannot approve their own pull requests.
ReadySOFTWARE DEVELOPMENTTEST
Ensure branch protection rules are enforced for administrators (GitHub)
This test verifies that all GitHub repositories linked to Vanta have branch protection rules enforced for administrators on the default branch or the explicitly specified production branch.
ReadySOFTWARE DEVELOPMENTTEST
GitHub repository visibility has been set to private
This test verifies that all GitHub repositories in your organization, excluding those explicitly forked from external repositories, have their visibility set to private.
ReadySOFTWARE DEVELOPMENTTEST
Vulnerability scanning is enabled (GitHub)
This test verifies that vulnerability scanning (via Dependabot) is enabled for your GitHub repositories, allowing you to identify and manage software vulnerabilities effectively.
ReadyVULNERABILITY MANAGEMENTTEST
Company completes security reviews for relevant vendors
This test verifies whether vendors requiring security reviews have current and up-to-date reviews according to their risk levels.
ReadyVENDORSTEST
HR accounts associated with users
This test verifies whether all active HR accounts have been properly linked to user profiles within Vanta.
ReadyACCOUNT SETUPTEST
Company has an approved Access Control Policy
This test verifies whether your company has an approved Access Control Policy (BSI).
ReadyPOLICIESTEST
Company has an approved Asset Management Policy
This test checks whether your company has an approved Asset Management Policy (BSI).
ReadyPOLICIESTEST
Company has an approved Business Continuity and Disaster Recovery Plan
This test verifies that your company has an approved Business Continuity and Disaster Recovery Plan (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Code of Conduct
This test verifies that your company has an approved Code of Conduct (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Cryptography Policy
This test verifies that your company has an approved Cryptography Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Data Management Policy
This test verifies that your company has an approved Data Management Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Human Resource Security Policy
This test verifies that your company has an approved Human Resource Security Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Incident Response Plan
This test verifies that your company has an approved Incident Response Plan (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Risk Management Policy
This test verifies that your company has an approved Risk Management Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Secure Development Policy
This test verifies that your company has an approved Secure Development Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Company has an approved Third-Party Management Policy
This test verifies that your company has an approved Third-Party Management Policy (BSI) in Vanta.
ReadyPOLICIESTEST
Personnel agree to Access Control Policy
Verifies that all relevant personnel have agreed to the [Access Control Policy](/policies/access-control-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Asset Management Policy
Verifies that all relevant personnel have agreed to the [Asset Management Policy](/policies/asset-management-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Business Continuity and Disaster Recovery Plan
Verifies that all relevant personnel have agreed to the [Business Continuity and Disaster Recovery Plan](/policies/business-continuity-and-disaster-recovery-plan-bsi).
ReadyPOLICIESTEST
Personnel agree to Code of Conduct
Verifies that all relevant personnel have agreed to the [Code of Conduct](/policies/code-of-conduct-bsi).
ReadyPOLICIESTEST
Personnel agree to Cryptography Policy
Verifies that all relevant personnel have agreed to the [Cryptography Policy](/policies/cryptography-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Data Management Policy
Verifies that all relevant personnel have agreed to the [Data Management Policy](/policies/data-management-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Human Resource Security Policy
Verifies that all relevant personnel have agreed to the [Human Resource Security Policy](/policies/human-resource-security-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Incident Response Plan
Verifies that all relevant personnel have agreed to the [Incident Response Plan](/policies/incident-response-plan-bsi).
ReadyPOLICIESTEST
Personnel agree to Information Security Policy (AUP)
This test verifies that all required personnel have accepted your company's `Information Security Policy (AUP)`, ensuring they acknowledge and comply with your organization's information security practices.
ReadyPOLICIESTEST
Personnel agree to Information Security Roles and Responsibilities
Verifies that all relevant personnel have agreed to the [Information Security Roles and Responsibilities](/policies/information-security-roles-and-responsibilities-bsi).
ReadyPOLICIESTEST
Personnel agree to Operations Security Policy
Verifies that all relevant personnel have agreed to the [Operations Security Policy](/policies/operations-security-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Physical Security Policy
Verifies that all relevant personnel have agreed to the [Physical Security Policy](/policies/physical-security-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Risk Management Policy
Verifies that all relevant personnel have agreed to the [Risk Management Policy](/policies/risk-management-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Secure Development Policy
Verifies that all relevant personnel have agreed to the [Secure Development Policy](/policies/secure-development-policy-bsi).
ReadyPOLICIESTEST
Personnel agree to Third-Party Management Policy
Verifies that all relevant personnel have agreed to the [Third-Party Management Policy](/policies/third-party-management-policy-bsi).
ReadyPOLICIESTEST
Third-Party Management Policy
To ensure protection of the organization's data and assets that are shared with, accessible to, or managed by suppliers, including external parties or third-party organizations such as service providers, vendors, and customers, and to maintain an agreed level of information security and service delivery in line with supplier agreements.
ReadyUncategorizedPOLICY
Cloud provider service agreement
Provide the most recent signed service agreement with your cloud provider (e.g., AWS, Azure, GCP).
ReadyVENDORSEVIDENCE_REQUEST
AWS accounts deprovisioned when personnel leave
This test verifies AWS accounts are promptly deprovisioned once the associated user has been removed or terminated from your organization.
ReadyACCOUNT SECURITYTEST
DynamoDB Tables encrypted (AWS)
Verifies that AWS provides encryption at rest of all data stored within DynamoDB by default.
ReadyDATA STORAGETEST
EC2 instance public ports restricted (AWS)
This test verifies that AWS EC2 instances do not have any unapproved TCP/UDP ports exposed publicly through their security groups. Instances should only expose explicitly permitted ports defined in your configuration.
ReadyINFRASTRUCTURETEST
EKS Clusters have audit logs enabled
This test verifies that all audit log types (API server, audit, authenticator, controller manager, scheduler) are enabled for your AWS EKS clusters, ensuring comprehensive audit logging for security and compliance purposes.
ReadyLOGGINGTEST
Intrusion detection system enabled (AWS)
This test verifies whether AWS GuardDuty is correctly enabled in every AWS account and region connected to your environment.
ReadyINFRASTRUCTURETEST
Intrusion detection system notifications configured (AWS)
This test verifies that notifications for AWS GuardDuty threat detections are configured correctly, ensuring each AWS account and region is receiving GuardDuty notifications.
ReadyINFRASTRUCTURETEST
AWS IAM Identity Center users deprovisioned when personnel leave
Verifies that AWS Identity Center users linked to removed Vanta users are removed.
ReadyACCOUNT SECURITYTEST
Cluster control plane endpoint public access is restricted (AWS EKS)
This test verifies if AWS EKS clusters with public endpoint access enabled restrict access by setting specific CIDR blocks and do not allow traffic from all IP addresses (`0.0.0.0/0` or `::0/0`).
ReadyINFRASTRUCTURETEST
Customer support site or email alias
Provide a link to your publicly available customer support site (e.g., https://help.vanta.com/hc/en-us) or a screenshot of a recent customer support request (e.g., Jira ticket or email) being resolved.
ReadySOFTWARE DEVELOPMENTEVIDENCE_REQUEST
Product documentation site
Provide a public link, documentation of how-to guides, or reference materials for your product or service.
ReadySOFTWARE DEVELOPMENTEVIDENCE_REQUEST
Intrusion detection system installation
Screenshots or configuration showing that an Intrusion Detection System (IDS) is set up to monitor traffic for abnormal activity.
ReadyINFRASTRUCTUREEVIDENCE_REQUEST
CI/CD system in use
Provide screenshots from your CI/CD (e.g., Jenkins, Gitlab, Travis CI) dashboard showing recent successful production code deployments. The dashboard may include name, environment, release version, relevant tags, and the state of the deploy.
ReadySOFTWARE DEVELOPMENTEVIDENCE_REQUEST