Controls

Continuously monitored

Security controls and measures implemented to protect data and systems.

Production data encrypted at rest
Datastores that hold sensitive customer data are encrypted at rest, and encryption keys are managed and accessible only to authorized personnel with a legitimate need.
Network segmentation and firewalls
The production network is segmented from public networks and protected by firewalls and hardened configurations that are reviewed periodically to prevent unauthorized access.
Vulnerability scanning and patch management
Host-based vulnerability scans run at least quarterly on external-facing systems, annual penetration testing is performed, and identified issues drive patching of infrastructure supporting the service.
Code of conduct and ethics
Employees acknowledge a code of conduct during onboarding, contractor agreements reference the same expectations, and violations are subject to disciplinary procedures.
Contractor confidentiality agreements
Contractors sign confidentiality commitments in their agreements at the start of engagement.
Employee confidentiality agreements
Employees sign confidentiality obligations as part of their employment agreements and human resources security documentation.
Secure software development lifecycle
A formal secure development lifecycle governs design, development, acquisition, testing, and maintenance of the platform, supported by secure development policies.
Change management for application and infrastructure
Changes to application code and infrastructure are tracked in tickets and version control and must be documented, tested, reviewed, and approved before deployment to production.
Production deployment controls
Only authorized personnel can promote changes to production, and deployment tooling enforces appropriate separation of duties.
Risk management program
A risk management program and risk register identify threats to service commitments, rate likelihood and impact including fraud risk, and capture mitigation plans in an annual assessment cycle.
Control self-assessments
Internal control self-assessments are conducted at least annually, with identified issues driving corrective actions.
Vendor management
A vendor management program maintains an inventory of critical third parties, defines security and privacy requirements, and reviews key vendors and their assurance reports at least annually.
Data classification and handling
A data management policy defines classification levels for public, internal, and customer data and sets handling rules so confidential information is restricted to authorized personnel.
Data retention and disposal
Formal retention and disposal procedures govern how company and customer data is stored, archived, and securely destroyed when no longer needed.
Secure media destruction
Electronic media containing confidential information is wiped or destroyed following industry best practices, with destruction records maintained.
Customer contractual compliance
Customers are responsible for understanding and complying with their contractual obligations to Adaline.
Maintain current contact information
Customers must keep administrative and technical contact information up to date with Adaline.
Maintain customer system of record
Customers remain responsible for their own systems of record and authoritative data sources.