GDPR Compliance Gap Analysis for Terra
GDPR Compliance Gap Analysis for Terra
GDPR is a privacy regulation that requires businesses to protect the personal data
and privacy of EU citizens. It affects all companies that do business or have
employees in the EU. This gap analysis maps Terra’s compliance controls to the GDPR
framework. This gap analysis can:
The table to the right presents a summary of the gap analysis; the implemented
controls are shown as such, while the unimplemented controls are broken down by
their severity, which can be used to prioritize fixes.
Chapter 2
Principles
Article 6
Lawfulness of processing
2 CONTROLS
2 DOCUMENTS
about:blank Page 1 of 57
06/06/2022, 18:54
2 DOCUMENTS
Article 7
3 CONTROLS
The company determines and documents when and how consent was obtained.
2 DOCUMENTS
2 DOCUMENTS
1 DOCUMENT
about:blank Page 2 of 57
06/06/2022, 18:54
Chapter 3
Article 12
2 CONTROLS
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
The company determines and documents requirements for notice to data subjects and the
timing of the notice.
1 DOCUMENT
Article 13
3 CONTROLS
about:blank Page 3 of 57
06/06/2022, 18:54
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
The company provides data subjects clear and easily accessible information identifying the
controller and describing the PII processing.
2 DOCUMENTS
Cookie Policy
Publicly available privacy policy
The company determines and documents requirements for notice to data subjects and the
timing of the notice.
1 DOCUMENT
Article 14
2 CONTROLS
about:blank Page 4 of 57
06/06/2022, 18:54
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
The company determines and documents requirements for notice to data subjects and the
timing of the notice.
1 DOCUMENT
Article 15
3 CONTROLS
Defined process and procedure for data subjects to access and correct their PII.
Guidance: This is typically the data subject access request process.
1 DOCUMENT
about:blank Page 5 of 57
06/06/2022, 18:54
Establish a process of providing a copy of PII to data subjects upon verified request.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 16
Right to rectification
2 CONTROLS
Defined process and procedure for data subjects to access and correct their PII.
Guidance: This is typically the data subject access request process.
1 DOCUMENT
about:blank Page 6 of 57
06/06/2022, 18:54
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 17
1 CONTROL
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 18
1 CONTROL
about:blank Page 7 of 57
06/06/2022, 18:54
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 19
2 CONTROLS
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
about:blank Page 8 of 57
06/06/2022, 18:54
Establish a process, policies and procedures for notifying sub processors of corrections,
deletions or withdrawals of PII.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 20
1 CONTROL
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 21
Right to object
2 CONTROLS
about:blank Page 9 of 57
06/06/2022, 18:54
Identify and address obligations to data subjects resulting from decisions made from
automated processing (if applicable).
1 DOCUMENT
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 22
2 CONTROLS
Identify and address obligations to data subjects resulting from decisions made from
automated processing (if applicable).
1 DOCUMENT
about:blank Page 10 of 57
06/06/2022, 18:54
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Article 23
Restrictions
1 CONTROL
Define and document procedures for handling Data Subject Access Requests (DSAR.
Vanta has a partnership with Transcend to assist with Handling DSAR requests at a
discounted pricing for our customers.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Chapter 4
Article 24
about:blank Page 11 of 57
06/06/2022, 18:54
31 CONTROLS
The company ensures that user access to in-scope system components is based on job role
and function or requires a documented access request form and manager approval prior to
access being provisioned.
4 TESTS
Company has an approved Access Control Policy: Verifies that a Access Control
Policy has been created and approved within Vanta.
The company conducts quarterly access reviews for the in-scope system components to
help ensure that access is restricted appropriately. Required changes are tracked to
completion.
1 DOCUMENT
The company completes termination checklists to ensure that access is revoked for
terminated employees within SLAs.
2 DOCUMENTS
about:blank Page 12 of 57
06/06/2022, 18:54
The company has a process to ensure that PII is complete, accurate, and up-to-date.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
1 TEST
The company has electronic media containing confidential information purged or destroyed in
accordance with best practices, and certificates of destruction are issued for each device
destroyed.
1 DOCUMENT
The company has Business Continuity and Disaster Recovery Plans in place that outline
communication plans in order to maintain information security continuity in the event of the
unavailability of key personnel.
1 DOCUMENT
about:blank Page 13 of 57
06/06/2022, 18:54
The company has a documented business continuity/disaster recovery (BC/DR plan and
tests it annually.
1 DOCUMENT
The company has a data classification policy in place to help ensure that confidential data is
properly secured and restricted to authorized personnel.
2 TESTS
The company's datastores housing sensitive customer data are encrypted at rest.
2 TESTS
User data is encrypted at rest: Verifies that all Amazon RDS instances are
encrypted.
User data in S3 is encrypted at rest (AWS: Verifies that all AWS S3 buckets marked
as containing user data are encrypted.
The company uses secure data transmission protocols to encrypt confidential and sensitive
data when transmitted over public networks.
4 TESTS
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
about:blank Page 14 of 57
06/06/2022, 18:54
The company requires employees to complete GDPR awareness training within thirty days of
hire and annually thereafter.
2 TESTS
The company has security and privacy incident response policies and procedures that are
documented and communicated to authorized users.
2 DOCUMENTS
The company uses an intrusion detection system to provide continuous monitoring of the
company's network and early detection of potential security breaches.
1 TEST
CloudTrail enabled: Verifies that all linked AWS accounts have CloudTrail enabled.
The company has a mobile device management (MDM system in place to centrally manage
mobile devices supporting the service.
1 TEST
about:blank Page 15 of 57
06/06/2022, 18:54
The company's network and system hardening standards are documented, based on industry
best practices, and reviewed at least annually.
5 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
The company reviews its firewall rulesets at least annually. Required changes are tracked to
completion.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
The company uses firewalls and configures them to prevent unauthorized access.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
1 DOCUMENT
Network segregation
about:blank Page 16 of 57
06/06/2022, 18:54
1 TEST
Password policy configured for infrastructure: Verifies that all AWS accounts have
password policies enabled.
The company implements technical controls to ensure data transmitted to third parties
reaches its destination.
4 TESTS
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
4 TESTS
about:blank Page 17 of 57
06/06/2022, 18:54
The company encrypts portable and removable media devices when used.
1 TEST
1 DOCUMENT
4 TESTS
3 TESTS
Inventory items have descriptions: Verifies that all items on the Vanta inventory
page have descriptions.
Inventory items have owners: Verifies that all items on the Vanta inventory page
have been assigned owners.
Inventory list tracks resources that contain user data: Verifies that these resource
types - storage buckets, databases, PaaS apps, queues, data warehouses, or
custom items - are marked as containing user data in Vanta.
about:blank Page 18 of 57
06/06/2022, 18:54
The company restricts privileged access to the production network to authorized users with a
business need.
1 TEST
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
The company's production systems can only be remotely accessed by authorized employees
via an approved encrypted connection.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
The company's production systems can only be remotely accessed by authorized employees
possessing a valid multi-factor authentication (MFA method.
3 TESTS
MFA on GitHub: Verifies that MFA is enabled on all GitHub accounts that aren't
marked as external or non-human.
MFA on infrastructure provider: Verifies that all AWS accounts have MFA enabled.
MFA on infrastructure root accounts (AWS: Verifies that all AWS root accounts
have MFA enabled.
about:blank Page 19 of 57
06/06/2022, 18:54
The company has infrastructure supporting the service patched as a part of routine
maintenance and as a result of identified vulnerabilities to help ensure that servers
supporting the service are hardened against security threats.
4 TESTS
Records of security issues being assigned to owners: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag have an owner assigned
within the task tracker.
Security issues assigned priorities: Verifies that all tasks in the linked task tracker
that are labeled with a `security` have a priority assigned within the task tracker.
Records of security issues being tracked: Verifies that at least one task in the
linked task tracker is labeled with a `security` tag.
Records of security issues being closed within SLA: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag are resolved within the SLA
set in Vanta.
2 DOCUMENTS
The company requires authentication to systems and applications to use unique username
and password or authorized Secure Socket Shell (SSH keys.
7 TESTS
Groups manage employee accounts permissions: Verifies that every AWS group
has at least one IAM policy attached.
Employees have unique email accounts: Verifies that every linked identity provider
has more than one user.
Employees have unique infrastructure accounts: Verifies that every linked AWS and
Heroku account have at least one user.
Employees have unique version control accounts: Verifies that every linked version
control account has more than one user.
Service accounts used: Verifies that every AWS account is assigned a role.
Old infrastructure accounts disabled (AWS: Verifies that all AWS IAM users have
performed at least one action in the past 90 days.
No user account has a policy attached directly: Verifies that no AWS IAM policies
are attached directly to users.
about:blank Page 20 of 57
06/06/2022, 18:54
The company requires authentication to the "production network" to use unique usernames
and passwords or authorized Secure Socket Shell (SSH keys.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
Article 25
8 CONTROLS
The company purges or removes customer data containing confidential information from the
application environment, in accordance with best practices, when customers leave the
service.
1 TEST
1 DOCUMENT
The company has a data classification policy in place to help ensure that confidential data is
properly secured and restricted to authorized personnel.
2 TESTS
about:blank Page 21 of 57
06/06/2022, 18:54
The company documents policies, procedures and mechanism for disposal of PII.
2 TESTS
Employees agree to Data Management Policy: Verifies that all relevant employees
have agreed to the Data Management Policy.
The company limits collection of PII to the minimum that is necessary for it's purposes.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
2 TESTS
1 DOCUMENT
The company ensures that it only collects and processes data which it needs for its
purposes.
1 DOCUMENT
about:blank Page 22 of 57
06/06/2022, 18:54
The company does not retain PII longer than necessary for its purposes.
2 TESTS
Employees agree to Data Management Policy: Verifies that all relevant employees
have agreed to the Data Management Policy.
1 DOCUMENT
The company returns, transfers, disposes PII in accordance to its policies and commitments.
SCC 8.5
2 TESTS
2 DOCUMENTS
Article 27
1 CONTROL
about:blank Page 23 of 57
06/06/2022, 18:54
1 DOCUMENT
EU representative appointed
Article 28
Processor
38 CONTROLS
The company ensures that user access to in-scope system components is based on job role
and function or requires a documented access request form and manager approval prior to
access being provisioned.
4 TESTS
Company has an approved Access Control Policy: Verifies that a Access Control
Policy has been created and approved within Vanta.
The company conducts quarterly access reviews for the in-scope system components to
help ensure that access is restricted appropriately. Required changes are tracked to
completion.
1 DOCUMENT
about:blank Page 24 of 57
06/06/2022, 18:54
The company completes termination checklists to ensure that access is revoked for
terminated employees within SLAs.
2 DOCUMENTS
1 TEST
The company has electronic media containing confidential information purged or destroyed in
accordance with best practices, and certificates of destruction are issued for each device
destroyed.
1 DOCUMENT
The company's Data Processing Agreements (DPA with the customers (controllers) commit
to assisting them with privacy obligations.
1 DOCUMENT
The company's Master Services Agreement (MSA informs the customer of the legal basis for
transfers between jurisdictions and allows customers to object to changes or terminate
service.
1 DOCUMENT
about:blank Page 25 of 57
06/06/2022, 18:54
The company has Business Continuity and Disaster Recovery Plans in place that outline
communication plans in order to maintain information security continuity in the event of the
unavailability of key personnel.
1 DOCUMENT
The company has a documented business continuity/disaster recovery (BC/DR plan and
tests it annually.
1 DOCUMENT
The company provides their customer with information sufficient for them to demonstrate
their privacy compliance. SCC 8.9(b))
1 DOCUMENT
The company has a data classification policy in place to help ensure that confidential data is
properly secured and restricted to authorized personnel.
2 TESTS
Employees agree to Data Management Policy: Verifies that all relevant employees
have agreed to the Data Management Policy.
about:blank Page 26 of 57
06/06/2022, 18:54
The company's datastores housing sensitive customer data are encrypted at rest.
2 TESTS
User data is encrypted at rest: Verifies that all Amazon RDS instances are
encrypted.
User data in S3 is encrypted at rest (AWS: Verifies that all AWS S3 buckets marked
as containing user data are encrypted.
The company uses secure data transmission protocols to encrypt confidential and sensitive
data when transmitted over public networks.
4 TESTS
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
1 TEST
Vendors list maintained: Verifies that at least one external vendor has been added
to the vendors list.
1 DOCUMENT
about:blank Page 27 of 57
06/06/2022, 18:54
The company requires employees to complete GDPR awareness training within thirty days of
hire and annually thereafter.
2 TESTS
GDPR security awareness training records tracked: Verifies that all relevant
employees have uploaded documentation indicating that they have completed GDPR
security training.
The company has security and privacy incident response policies and procedures that are
documented and communicated to authorized users.
2 DOCUMENTS
The company informs the customer if processing instructions are illegal. SCC 8.1(b))
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
The company uses an intrusion detection system to provide continuous monitoring of the
company's network and early detection of potential security breaches.
1 TEST
CloudTrail enabled: Verifies that all linked AWS accounts have CloudTrail enabled.
about:blank Page 28 of 57
06/06/2022, 18:54
The company does not use the PII collected for services for marketing and advertising
without consent.
Consent for marketing is not required for using services.
1 DOCUMENT
The company has a mobile device management (MDM system in place to centrally manage
mobile devices supporting the service.
1 TEST
The company's network and system hardening standards are documented, based on industry
best practices, and reviewed at least annually.
5 TESTS
Employees agree to Operations Security Policy: Verifies that all relevant employees
have agreed to the Operations Security Policy.
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
about:blank Page 29 of 57
06/06/2022, 18:54
The company reviews its firewall rulesets at least annually. Required changes are tracked to
completion.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
The company uses firewalls and configures them to prevent unauthorized access.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
1 DOCUMENT
Network segregation
1 TEST
Password policy configured for infrastructure: Verifies that all AWS accounts have
password policies enabled.
about:blank Page 30 of 57
06/06/2022, 18:54
The company implements technical controls to ensure data transmitted to third parties
reaches its destination.
4 TESTS
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
4 TESTS
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
The company encrypts portable and removable media devices when used.
1 TEST
1 DOCUMENT
about:blank Page 31 of 57
06/06/2022, 18:54
The company only processes PII for the purposes expressed in contract (SCCs 8.1 and 8.2.
2 DOCUMENTS
4 TESTS
Company has a version control system: Verifies that at least one repository in the
linked version control system has been updated in the last 30 days.
3 TESTS
Inventory items have descriptions: Verifies that all items on the Vanta inventory
page have descriptions.
Inventory items have owners: Verifies that all items on the Vanta inventory page
have been assigned owners.
Inventory list tracks resources that contain user data: Verifies that these resource
types - storage buckets, databases, PaaS apps, queues, data warehouses, or
custom items - are marked as containing user data in Vanta.
about:blank Page 32 of 57
06/06/2022, 18:54
The company restricts privileged access to the production network to authorized users with a
business need.
1 TEST
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
The company's production systems can only be remotely accessed by authorized employees
via an approved encrypted connection.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
The company's production systems can only be remotely accessed by authorized employees
possessing a valid multi-factor authentication (MFA method.
3 TESTS
MFA on GitHub: Verifies that MFA is enabled on all GitHub accounts that aren't
marked as external or non-human.
MFA on infrastructure provider: Verifies that all AWS accounts have MFA enabled.
MFA on infrastructure root accounts (AWS: Verifies that all AWS root accounts
have MFA enabled.
about:blank Page 33 of 57
06/06/2022, 18:54
The company has infrastructure supporting the service patched as a part of routine
maintenance and as a result of identified vulnerabilities to help ensure that servers
supporting the service are hardened against security threats.
4 TESTS
Records of security issues being assigned to owners: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag have an owner assigned
within the task tracker.
Security issues assigned priorities: Verifies that all tasks in the linked task tracker
that are labeled with a `security` have a priority assigned within the task tracker.
Records of security issues being tracked: Verifies that at least one task in the
linked task tracker is labeled with a `security` tag.
Records of security issues being closed within SLA: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag are resolved within the SLA
set in Vanta.
2 DOCUMENTS
The company communicates the changes to sub-processors to the customer in writing with
the opportunity to object.
3 DOCUMENTS
about:blank Page 34 of 57
06/06/2022, 18:54
The company requires authentication to systems and applications to use unique username
and password or authorized Secure Socket Shell (SSH keys.
7 TESTS
Groups manage employee accounts permissions: Verifies that every AWS group
has at least one IAM policy attached.
Employees have unique email accounts: Verifies that every linked identity provider
has more than one user.
Employees have unique infrastructure accounts: Verifies that every linked AWS and
Heroku account have at least one user.
Employees have unique version control accounts: Verifies that every linked version
control account has more than one user.
Service accounts used: Verifies that every AWS account is assigned a role.
Old infrastructure accounts disabled (AWS: Verifies that all AWS IAM users have
performed at least one action in the past 90 days.
No user account has a policy attached directly: Verifies that no AWS IAM policies
are attached directly to users.
The company requires authentication to the "production network" to use unique usernames
and passwords or authorized Secure Socket Shell (SSH keys.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
Article 30
8 CONTROLS
about:blank Page 35 of 57
06/06/2022, 18:54
1 DOCUMENT
2 DOCUMENTS
For controllers:
For processors:
the name and contact details of the processor or processors and of each controller on
behalf of which the processor is acting, and, where applicable, of the controller’s or the
processor’s representative, and the data protection officer
the categories of processing carried out on behalf of each controller
documentation of suitable safeguards for data transfers to a third country or an
international organization
a general description of the technical and organizational security measures
1 DOCUMENT
about:blank Page 36 of 57
06/06/2022, 18:54
The company identifies and documents its legal basis for transferring between jurisdictions.
2 DOCUMENTS
The company communicates legally binding disclosures for PII to the customer before
disclosure where possible. SCC 15.12
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
1 DOCUMENT
The company should record disclosure of PII to third parties including what has been
disclosed and what time.
1 DOCUMENT
The company documents transfers of PII to or from third parties and ensures cooperation
with the requests from data subjects.
2 DOCUMENTS
about:blank Page 37 of 57
06/06/2022, 18:54
1 DOCUMENT
Article 32
Security of processing
31 CONTROLS
The company ensures that user access to in-scope system components is based on job role
and function or requires a documented access request form and manager approval prior to
access being provisioned.
4 TESTS
Company has an approved Access Control Policy: Verifies that a Access Control
Policy has been created and approved within Vanta.
The company conducts quarterly access reviews for the in-scope system components to
help ensure that access is restricted appropriately. Required changes are tracked to
completion.
1 DOCUMENT
about:blank Page 38 of 57
06/06/2022, 18:54
The company completes termination checklists to ensure that access is revoked for
terminated employees within SLAs.
2 DOCUMENTS
The company has a process to ensure that PII is complete, accurate, and up-to-date.
2 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
1 TEST
The company has electronic media containing confidential information purged or destroyed in
accordance with best practices, and certificates of destruction are issued for each device
destroyed.
1 DOCUMENT
about:blank Page 39 of 57
06/06/2022, 18:54
The company has Business Continuity and Disaster Recovery Plans in place that outline
communication plans in order to maintain information security continuity in the event of the
unavailability of key personnel.
1 DOCUMENT
The company has a documented business continuity/disaster recovery (BC/DR plan and
tests it annually.
1 DOCUMENT
The company has a data classification policy in place to help ensure that confidential data is
properly secured and restricted to authorized personnel.
2 TESTS
The company's datastores housing sensitive customer data are encrypted at rest.
2 TESTS
User data is encrypted at rest: Verifies that all Amazon RDS instances are
encrypted.
User data in S3 is encrypted at rest (AWS: Verifies that all AWS S3 buckets marked
as containing user data are encrypted.
about:blank Page 40 of 57
06/06/2022, 18:54
The company uses secure data transmission protocols to encrypt confidential and sensitive
data when transmitted over public networks.
4 TESTS
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
The company has security and privacy incident response policies and procedures that are
documented and communicated to authorized users.
2 DOCUMENTS
The company uses an intrusion detection system to provide continuous monitoring of the
company's network and early detection of potential security breaches.
1 TEST
CloudTrail enabled: Verifies that all linked AWS accounts have CloudTrail enabled.
The company has a mobile device management (MDM system in place to centrally manage
mobile devices supporting the service.
1 TEST
about:blank Page 41 of 57
06/06/2022, 18:54
The company's network and system hardening standards are documented, based on industry
best practices, and reviewed at least annually.
5 TESTS
Employees agree to Operations Security Policy: Verifies that all relevant employees
have agreed to the Operations Security Policy.
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
The company reviews its firewall rulesets at least annually. Required changes are tracked to
completion.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
Firewall default disallows traffic: This feature is built into AWS.
The company uses firewalls and configures them to prevent unauthorized access.
2 TESTS
Unwanted traffic filtered: Verifies that all AWS EC2 instances have network ACLs or
security groups attached.
1 DOCUMENT
Network segregation
about:blank Page 42 of 57
06/06/2022, 18:54
1 TEST
Password policy configured for infrastructure: Verifies that all AWS accounts have
password policies enabled.
The company implements technical controls to ensure data transmitted to third parties
reaches its destination.
4 TESTS
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
4 TESTS
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
SSL certificate has not expired: Verifies that the company website (as specified on
the business info page) has an unexpired certificate.
SSL enforced on company website: Verifies that the company website (as specified
on the business info page) redirects HTTP to HTTPS via a 3XX status code.
about:blank Page 43 of 57
06/06/2022, 18:54
The company encrypts portable and removable media devices when used.
1 TEST
1 DOCUMENT
4 TESTS
3 TESTS
Inventory items have descriptions: Verifies that all items on the Vanta inventory
page have descriptions.
Inventory items have owners: Verifies that all items on the Vanta inventory page
have been assigned owners.
Inventory list tracks resources that contain user data: Verifies that these resource
types - storage buckets, databases, PaaS apps, queues, data warehouses, or
custom items - are marked as containing user data in Vanta.
about:blank Page 44 of 57
06/06/2022, 18:54
The company restricts privileged access to the production network to authorized users with a
business need.
1 TEST
AWS accounts reviewed: Verifies that all AWS accounts have been linked to users
within Vanta.
Pseudonymization COMPLETE
The company determines any need for pseudonymization and implement it as needed.
2 DOCUMENTS
The company's production systems can only be remotely accessed by authorized employees
via an approved encrypted connection.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
The company's production systems can only be remotely accessed by authorized employees
possessing a valid multi-factor authentication (MFA method.
3 TESTS
MFA on GitHub: Verifies that MFA is enabled on all GitHub accounts that aren't
marked as external or non-human.
MFA on infrastructure provider: Verifies that all AWS accounts have MFA enabled.
MFA on infrastructure root accounts (AWS: Verifies that all AWS root accounts
have MFA enabled.
about:blank Page 45 of 57
06/06/2022, 18:54
The company has infrastructure supporting the service patched as a part of routine
maintenance and as a result of identified vulnerabilities to help ensure that servers
supporting the service are hardened against security threats.
4 TESTS
Records of security issues being assigned to owners: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag have an owner assigned
within the task tracker.
Security issues assigned priorities: Verifies that all tasks in the linked task tracker
that are labeled with a `security` have a priority assigned within the task tracker.
Records of security issues being tracked: Verifies that at least one task in the
linked task tracker is labeled with a `security` tag.
Records of security issues being closed within SLA: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag are resolved within the SLA
set in Vanta.
2 DOCUMENTS
The company requires authentication to systems and applications to use unique username
and password or authorized Secure Socket Shell (SSH keys.
7 TESTS
Groups manage employee accounts permissions: Verifies that every AWS group
has at least one IAM policy attached.
Employees have unique email accounts: Verifies that every linked identity provider
has more than one user.
Employees have unique infrastructure accounts: Verifies that every linked AWS and
Heroku account have at least one user.
Employees have unique version control accounts: Verifies that every linked version
control account has more than one user.
Service accounts used: Verifies that every AWS account is assigned a role.
Old infrastructure accounts disabled (AWS: Verifies that all AWS IAM users have
performed at least one action in the past 90 days.
No user account has a policy attached directly: Verifies that no AWS IAM policies
are attached directly to users.
about:blank Page 46 of 57
06/06/2022, 18:54
The company requires authentication to the "production network" to use unique usernames
and passwords or authorized Secure Socket Shell (SSH keys.
1 TEST
SSL/TLS on admin page of infrastructure console: This feature is built into AWS.
Article 33
3 CONTROLS
The company establish policies and procedures to respond to data breaches including
notification procedures.
6 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Company has an approved Incident Response Plan with GDPR Addendum and
Breach Notification Procedures: Verifies that an Incident Response Plan with GDPR
Addendum and Breach Notification Procedures has been created and approved
within Vanta.
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Employees agree to Incident Response Plan: Verifies that all relevant employees
have agreed to the Incident Response Plan.
Employees agree to Incident Response Plan with GDPR Addendum and Breach
Notification Procedures: Verifies that all relevant employees have agreed to the
Incident Response Plan with GDPR Addendum and Breach Notification Procedures.
2 DOCUMENTS
about:blank Page 47 of 57
06/06/2022, 18:54
The company's security and privacy incidents are logged, tracked, resolved, and
communicated to affected or relevant parties by management according to the company's
security incident response policy and procedures.
5 TESTS
Employees agree to Incident Response Plan: Verifies that all relevant employees
have agreed to the Incident Response Plan.
Employees agree to Operations Security Policy: Verifies that all relevant employees
have agreed to the Operations Security Policy.
Records of security issues being closed within SLA: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag are resolved within the SLA
set in Vanta.
The company has security and privacy incident response policies and procedures that are
documented and communicated to authorized users.
2 DOCUMENTS
Article 34
3 CONTROLS
about:blank Page 48 of 57
06/06/2022, 18:54
The company establish policies and procedures to respond to data breaches including
notification procedures.
6 TESTS
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
Company has an approved Incident Response Plan with GDPR Addendum and
Breach Notification Procedures: Verifies that an Incident Response Plan with GDPR
Addendum and Breach Notification Procedures has been created and approved
within Vanta.
Employees agree to GDPR Compliance Policy: Verifies that all relevant employees
have agreed to the GDPR Compliance Policy
Employees agree to Incident Response Plan: Verifies that all relevant employees
have agreed to the Incident Response Plan.
Employees agree to Incident Response Plan with GDPR Addendum and Breach
Notification Procedures: Verifies that all relevant employees have agreed to the
Incident Response Plan with GDPR Addendum and Breach Notification Procedures.
2 DOCUMENTS
about:blank Page 49 of 57
06/06/2022, 18:54
The company's security and privacy incidents are logged, tracked, resolved, and
communicated to affected or relevant parties by management according to the company's
security incident response policy and procedures.
5 TESTS
Employees agree to Incident Response Plan: Verifies that all relevant employees
have agreed to the Incident Response Plan.
Employees agree to Operations Security Policy: Verifies that all relevant employees
have agreed to the Operations Security Policy.
Records of security issues being closed within SLA: Verifies that all tasks in the
linked task tracker that are labeled with a `security` tag are resolved within the SLA
set in Vanta.
The company has security and privacy incident response policies and procedures that are
documented and communicated to authorized users.
2 DOCUMENTS
Article 35
2 CONTROLS
about:blank Page 50 of 57
06/06/2022, 18:54
If processing includes:
1 DOCUMENT
1 DOCUMENT
Article 37
1 CONTROL
about:blank Page 51 of 57
06/06/2022, 18:54
If processing meets one of these conditions then appoint a Data Protection Officer
2 DOCUMENTS
Article 38
1 CONTROL
If processing meets one of these conditions then appoint a Data Protection Officer
2 DOCUMENTS
Article 39
about:blank Page 52 of 57
06/06/2022, 18:54
1 CONTROL
If processing meets one of these conditions then appoint a Data Protection Officer
2 DOCUMENTS
Chapter 5
Article 44
1 CONTROL
The company identifies and documents its legal basis for transferring between jurisdictions.
2 DOCUMENTS
about:blank Page 53 of 57
06/06/2022, 18:54
Article 45
1 CONTROL
The company identifies and documents its legal basis for transferring between jurisdictions.
2 DOCUMENTS
Article 46
2 CONTROLS
The company's Master Services Agreement (MSA informs the customer of the legal basis for
transfers between jurisdictions and allows customers to object to changes or terminate
service.
1 DOCUMENT
The company identifies and documents its legal basis for transferring between jurisdictions.
2 DOCUMENTS
Article 48
about:blank Page 54 of 57
06/06/2022, 18:54
1 CONTROL
1 TEST
Company has an approved GDPR compliance policy: Verifies that GDPR compliance
policy exists and approved in Vanta
1 DOCUMENT
Chapter 6
Article 51
Supervisory authority
1 CONTROL
If the company is operating in more than one EU state then identify a lead Data Protection
Authority.
1 DOCUMENT
Appendix A Definitions
about:blank Page 55 of 57
06/06/2022, 18:54
Appendix A Definitions
Bug bounty program A crowdsourcing initiative that rewards individuals for
discovering and reporting software bugs, especially those that could cause security
vulnerabilities or breaches.
DDoS Distributed denial of service. A DDoS attack is attack in which multiple
compromised computer systems flood a target—such as a server, website, or other
network resource—with messages or requests to cause a denial of service for users
of the targeted resource.
Multifactor authentication (MFA A security system that requires multiple methods
of authentication using different types of credentials to verify users’ identities before
they can access a service.
Penetration test The practice of testing a computer system, network, or web
application to find vulnerabilities that an attacker might exploit.
Principle of least privilege The principle of giving a user or account only the
privileges that are required to perform a job or necessary function.
Protected data Data that is protected from public view or use; includes personally
identifiable information, sensitive data, HIPAA data, or financial data.
Sensitive data Any information a reasonable person considers private or would
choose not to share with the public.
SSH Secure shell. A cryptographic network protocol for operating network services
securely over an unsecured network.
SSL Secure sockets layer. The standard security technology for establishing an
encrypted link between a web server and a browser.
About Vanta
about:blank Page 56 of 57
06/06/2022, 18:54
About Vanta
Vanta provides a set of security and compliance tools that scan, verify, and secure a
company’s IT systems and processes. Our cloud-based technology identifies security
flaws and privacy gaps in a company’s security posture, providing a comprehensive
view across cloud infrastructure, endpoints, corporate procedures, enterprise risk,
and employee accounts.
Vanta is based in San Francisco, California.
about:blank Page 57 of 57