Security Assessment Questionnaire

Cloud Security Alliance - Consensus Assessment Initiative Questionnaire

This document contains Forged Apps’ responses to the Cloud Security Alliance (CSA) Consensus Assessment Initiative Questionnaire (CAIQ) Lite version 4.0.3. This assessment demonstrates our commitment to security and transparency in our cloud service offerings.

Assessment Details

CategoryDetails
VersionCAIQ Lite v4.0.3
Last UpdatedMarch 25, 2024
Assessment TypeSelf-Assessment

Questionnaire Responses

Control DomainQuestion IDQuestionAnswerControl Ownership
Audit & AssuranceA&A-02.1Are independent audit and assurance assessments conducted according to relevant standards at least annually?YesCSP-owned
Audit & AssuranceA&A-03.1Are independent audit and assurance assessments performed according to risk-based plans and policies?YesCSP-owned
Audit & AssuranceA&A-04.1Is compliance verified regarding all relevant standards, regulations, legal/contractual, and statutory requirements applicable to the audit?YesCSP-owned
Audit & AssuranceA&A-06.1Is a risk-based corrective action plan to remediate audit findings established, documented, approved, communicated, applied, evaluated, and maintained?YesCSP-owned
Application & Interface SecurityAIS-02.1Are baseline requirements to secure different applications established, documented, and maintained?YesShared CSP and CSC
Application & Interface SecurityAIS-04.1Is an SDLC process defined and implemented for application design, development, deployment, and operation per organizationally designed security requirements?YesShared CSP and CSC
Application & Interface SecurityAIS-06.1Are strategies and capabilities established and implemented to deploy application code in a secure, standardized, and compliant manner?YesCSP-owned
Application & Interface SecurityAIS-07.1Are application security vulnerabilities remediated following defined processes?YesShared CSP and CSC
Business Continuity ManagementBCR-01.1Are business continuity management and operational resilience policies and procedures established, documented, approved, communicated, applied, evaluated, and maintained?YesCSP-owned
Business Continuity ManagementBCR-02.1Are criteria for developing business continuity and operational resiliency strategies and capabilities established based on business disruption and risk impacts?YesCSP-owned
Business Continuity ManagementBCR-03.1Are strategies developed to reduce the impact of, withstand, and recover from business disruptions in accordance with risk appetite?YesCSP-owned
Business Continuity ManagementBCR-08.1Is cloud data periodically backed up?YesCSP-owned
Cryptography, Encryption & Key ManagementCEK-01.1Are cryptography, encryption, and key management policies and procedures established, documented, approved, communicated, applied, evaluated, and maintained?YesCSP-owned
Cryptography, Encryption & Key ManagementCEK-03.1Are data at-rest and in-transit cryptographically protected using cryptographic libraries certified to approved standards?YesCSP-owned
Data Security & PrivacyDSP-01.1Are policies and procedures established for the classification, protection, and handling of data throughout its lifecycle?YesShared CSP and CSC
Data Security & PrivacyDSP-07.1Are systems, products, and business practices based on security principles by design and per industry best practices?YesShared CSP and CSC
Identity & Access ManagementIAM-01.1Are identity and access management policies and procedures established, documented, approved, communicated, implemented, applied, evaluated, and maintained?YesCSP-owned
Identity & Access ManagementIAM-04.1Is the separation of duties principle employed when implementing information system access?YesCSP-owned
Identity & Access ManagementIAM-05.1Is the least privilege principle employed when implementing information system access?YesCSP-owned
Infrastructure & Virtualization SecurityIVS-03.1Are communications between environments monitored?YesCSP-owned
Infrastructure & Virtualization SecurityIVS-04.1Is every host and guest OS, hypervisor, or infrastructure control plane hardened according to their respective best practices?YesCSP-owned
Security Incident ManagementSEF-03.1Is a security incident response plan established, documented, approved, communicated, applied, evaluated, and maintained?YesCSP-owned
Threat & Vulnerability ManagementTVM-02.1Are policies and procedures to protect against malware on managed assets established?YesCSP-owned
Threat & Vulnerability ManagementTVM-03.1Are processes, procedures, and technical measures defined for vulnerability identifications?YesCSP-owned

Note: This is a subset of the full questionnaire, highlighting key security controls. CSP = Cloud Service Provider, CSC = Cloud Service Customer.


© Copyright 2024 Cloud Security Alliance - All rights reserved. Used under Fair Use provisions of the United States Copyright Act.