How do I ensure that a tool, application or system meets the security requirements?
If you intend to purchase a new tool, application, system, or service, you are required to check if it meets our security requirements.
These requirements include network security, access controls, backup, and encryption of data and rules about the way data are handled. For example, who can view and edit what data, what is the password policy, and are employees trained in the field of security?
Procedure Security Check (Coming soon)