Here are the controls implemented at Horizons to ensure compliance, as a part of our security program.
Vulnerability Remediation Process
Centralized Management of Flaw Remediation Processes
Multi-factor Authentication
Encrypting Data At Rest
Inventory of Infrastructure Assets
Data Backups
Backup Testing
Impact analysis
Limit Network Connections
External System Connections
Transmission Confidentiality
Anomalous Behavior
Capacity & Performance Management
Data used in Testing
Centralized Collection of Security Event Logs
Approval of Changes
Malicious Code Protection (Anti-Malware)
Endpoint Security Validation
Code of Business Conduct
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Performance Review
Periodic Policy Acknowledgement
Incident Reporting by Employees
Incident Reporting by Customers
Risk Framing
Risk Assessment
Fraud
Third-Party Criticality Assessments
Information Security Officer
Internal Audit
Periodic Review & Update of Cybersecurity & Privacy Program
Management Review of Org Chart
Management Review of Risks
Management Review of Third-Party Risks
Subservice organization evaluation
Contingency Plan Testing
Asset Ownership Assignment
Data Governance
Updates During Installations / Removals