Welcome to Ours Privacy's Trust Center
At Ours Privacy, we understand the importance of security, privacy, compliance and transparency. That's why we take a comprehensive approach to Trust.
Whether you are a customer, prospective customer or partner, this self-serve tool enables you to complete your audits and security questionnaires. We are dedicated to consistently enhancing our Trust Center and will regularly update and review it.
Access Control and Authorization
Access granting process used
Implement a formal access granting process that ensures new access privileges are assigned based on the principle of least privilege, and require at least one employee to endorse the granting of new access.
Access management policy established
Establish systematic controls in your access management policy for managing user access rights that ensure appropriate, authorized access to systems and data while maintaining security.
Account inventory maintained
Maintain an inventory of all user accounts, including accounts on high-risk vendors, that have access to in scope systems and services. This inventory must include essential details such as account owners, access privileges, associated roles, and vendor relationships where applicable.
Dormant accounts disabled
Regularly review user accounts and disable or remove accounts that have been inactive for an extended period. Dormant accounts pose security risks as they may become targets for unauthorized access or misuse.
Employee access regularly reviewed
Establish a regular access review process to promptly remove access privileges from employees who no longer require them. This ensures that former employees or users do not retain unauthorized access to organizational resources.
MFA required for critical services
Require multi-factor authentication (MFA) for accessing critical services and infrastructure. MFA adds an extra layer of security by requiring users to provide additional authentication factors beyond their passwords.
Password management policy enforced
Strictly enforce the organization’s password management policy to guarantee compliance with security standards. Enforcing this policy includes implementing technical controls, monitoring adherence, and responding to non-compliance.
Password management policy established
Enforce a password management policy that mandates strong and complex passwords, and prohibits the reuse of previously used passwords. This policy helps protect user accounts from unauthorized access due to weak or compromised passwords.
Data Management and Protection
Data encrypted at rest
Encrypt all sensitive data when it is stored on systems or devices. Encryption of data at rest helps protect sensitive information from unauthorized access.
Data encrypted in-transit
Encrypt all data when it is transmitted over networks, both within the organization's internal network and external connections. Encryption of data in-transit helps protect sensitive information from eavesdropping and unauthorized access.
Data inventory maintained
Establish and maintain an accurate, detailed, and up-to-date inventory of all data assets. This can include data stored in databases, file shares, and cloud storage.
Data management and retention policy established
Establish a data management and retention policy, which outlines the guidelines for how long data should be retained and how it should be managed throughout its lifecycle.
Disaster Recovery
Automated backups enabled
Enable automated backups for all high-risk data and critical systems. Automated backups ensure that important data is regularly and securely backed up, reducing the risk of data loss in the event of a disaster or cyber incident.
Business continuity and disaster recovery policy established
Establish a comprehensive business continuity and disaster recovery policy that outlines the organization's strategies for responding to disruptive incidents and supporting business continuity.
Data recovery process established
Establish a data recovery process that defines procedures for recovering data in case of data loss, corruption, or system failures. A robust data recovery process helps minimize downtime and data loss in critical situations.
Disaster recovery plans tested
Regularly test the organization's disaster recovery plans to ensure their effectiveness and identify areas for improvement. Testing helps validate the ability to recover critical systems and operations in the event of a disaster.
Recovery data isolated
Isolate the recovery data from the production environment to prevent accidental overwriting or corruption of backups. Keeping recovery data separate helps maintain the integrity and availability of backup copies.
Email Security
DMARC policy and verification used
Implement and utilize DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy and verification mechanisms to prevent email spoofing and phishing attacks. DMARC helps protect the organization's email domains from unauthorized use.
Email account access restricted
Access to email accounts is restricted to administrators only, and isn't delegated to other non-admin users within the organization.
Email settings block malicious content
Email settings are configured to block malicious content, including malicious attachments, links, and scripts.
Endpoint Security
Anti-malware deployed on end-user devices
Deploy anti-malware or antivirus solutions on end-user devices, such as laptops and workstations. This provides an additional layer of protection against malware threats that may be introduced through user activities.
Data encrypted on end-user devices
Data stored on end-user devices (e.g., laptops, mobile devices) is encrypted to protect it in case of device loss or theft. Encryption adds an additional layer of security and ensures that even if the device falls into the wrong hands, the data remains inaccessible without the proper decryption key.
Firewall maintained on end-user devices
Ensure that firewalls are installed and properly maintained on end-user devices, such as laptops and workstations. End-user firewalls provide an additional layer of protection against unauthorized network traffic.
Mobile device management (MDM) used
Utilize a mobile device management (MDM) solution to manage and secure end-user devices. This allows for the protection of sensitive data, ensures device compliance, and provides device management capabilities for IT staff.
Infrastructure Security
Active discovery tools used
Utilize an active discovery tool to identify assets connected to the enterprise's network. Configure the active discovery tool to execute daily, or more frequently.
Automated security scanning performed on infrastructure
Deploy automated security scanning software (such as anti-malware or antivirus solutions, intrusion detection systems, or data breach protection) on all infrastructure components including servers and network devices. This helps detect and prevent malware infections and other malicious activities targeting critical systems.
Buckets not exposed publicly
Ensure that cloud storage buckets are not exposed to the public internet. Misconfigured public access settings can lead to unauthorized access or data exposure.
Configuration management system established
Implement a configuration management system to manage and control the configuration of systems, applications, and infrastructure. Configuration management helps maintain consistency and security across the IT environment.
Firewall restricts public access to infrastructure
Configure firewalls to restrict public access to the organization's infrastructure components. Proper firewall rules help minimize the exposure of critical systems to the public internet.
Infrastructure changes logged
Maintain a log of all infrastructure changes to track and document modifications made to critical systems and services. Logging infrastructure changes aids in audit trails, incident investigations, and accountability.
Infrastructure changes require review
Implement a review process for all proposed infrastructure changes before implementation. Reviews ensure that changes comply with security policies, do not introduce vulnerabilities, and align with the organization's requirements.
Infrastructure deployed using an infrastructure-as-code tool
Adopt an infrastructure-as-code (IaC) approach to deploy and manage the organization's infrastructure components. IaC tools enable consistent and version-controlled infrastructure deployment, reducing the risk of configuration errors.
Production deployment access restricted
Limit access to production deployment environments to authorized personnel only. This control helps prevent unauthorized changes or deployments that may disrupt critical services.
Unauthorized assets addressed and removed
Ensure that a process exists to address unauthorized assets on a periodic basis. This process should include regular audits of all assets and a procedure for handling unauthorized assets when they are discovered.
Unique production database authentication enforced
Enforce unique authentication mechanisms for accessing production databases, such as a unique username and password or SSH key.
Web Application Firewall (WAF) used
Implement a Web Application Firewall (WAF) to protect web applications from various cyber threats, such as SQL injection, cross-site scripting, and other application-layer attacks.
Monitoring and Incident Response
Audit log management process maintained
Maintain a robust and up-to-date audit log management process. This process should include guidelines for capturing, storing, and monitoring audit logs, ensuring the availability and integrity of essential security event data.
Audit logs collected
Enable the collection of audit logs from critical systems and applications. Audit logs capture essential security events and activities, providing valuable information for incident detection, investigation, and compliance purposes.
Incident response policy established
Establish an incident response policy that outlines the organization's approach and procedures for detecting, responding, and recovering from cybersecurity incidents.
Infrastructure performance monitored
Monitor the performance of the organization's infrastructure components to ensure optimal operation and detect potential issues or anomalies that may impact security or reliability.
Log management used
Implement a centralized log management solution to collect, store, and analyze logs from various systems and applications. Centralized log management simplifies log review, correlation, and monitoring for potential security incidents.
Network infrastructure monitored
Implement monitoring mechanisms for the network infrastructure to detect and respond to suspicious or unauthorized activities. Network monitoring helps ensure the integrity and availability of network resources.
Organizational Security
Acceptable use policy established
Establish and maintain an acceptable use policy that outlines permissible activities, systems, and data access for all users, contractors, and third parties interacting with the organization's information assets and technologies.
Asset inventory maintained
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data. This can include end-user devices, network devices, IoT devices, and servers.
Asset management policy established
Establish an asset management policy that outlines the guidelines for managing the organization's assets throughout their lifecycle.
Code of conduct established
Establish a code of conduct that outlines the expected behavior and ethical standards for all employees. A code of conduct helps promote a positive work environment and fosters a culture of integrity.
Company commitments externally communicated
Externally communicate key company commitments and policies, including the Master Service Agreement (MSA), Security Information page, and Terms of Service. External communication provides customers with important contractual and security information.
Confidentiality Agreement acknowledged by employees
All employees have acknowledged and signed a confidentiality agreement. This agreement reinforces the commitment to safeguarding sensitive information and trade secrets.
Data-flow diagrams maintained
Create and maintain up-to-date data-flow diagram(s) that show all account data flows across systems and networks, updating them as needed when changes occur in the environment. Begin by creating a diagram that captures all systems and networks handling data in your environment. Map out data flows, including entry and exit points, processing steps, storage locations, and transmission paths. To note, one single diagram can be enough depending on your context. Once your initial diagrams are complete, establish a maintenance process. Assign responsibility for updates, create a straightforward procedure for incorporating changes, and set a regular review schedule (e.g., quarterly). When updating the diagram, document the changes, including dates and approvers. Finally, make sure your team is trained in using and maintaining the diagram to maximize its effectiveness as a security tool.
Employee background checks performed
Conduct thorough background checks on potential employees to verify their identity, employment history, education, and criminal record. Background checks help ensure the suitability and integrity of candidates.
External support resources available (i.e., documentation)
Provide external support resources, such as documentation, user guides, and knowledge bases, to assist users in utilizing the organization's services effectively. Accessible support resources promote self-service and reduce support requests.
Offboarding process established
Establish an offboarding process for departing employees to ensure that they return all company assets and are removed from relevant systems and accounts.
Onboarding process established
Establish an onboarding process for new employees to ensure that they are properly trained and equipped to perform their job responsibilities. Onboarding helps new employees integrate into the organization and become productive quickly.
Performance evaluations conducted
Conduct regular performance evaluations for employees to assess their job performance, identify areas for improvement, and recognize exceptional contributions. Performance evaluations support talent development and performance management.
Physical access restricted
Restrict physical access to the organization's facilities, equipment, and systems to authorized personnel only.
Policies signed by relevant personnel
This control ensures everyone formally acknowledges and understands security policies, creating a clear record of their commitment to protect organizational assets and establishing accountability for security responsibilities.
Reference checks performed for employees
Conduct reference checks when hiring new employees to verify their qualifications, experience, and suitability for the role. Reference checks help ensure that candidates have a track record of honesty and reliability.
Roles and responsibilities specified
Clearly define roles and responsibilities for all employees within the organization. Specifying roles helps establish accountability and ensures that employees understand their duties and expectations.
Security awareness training conducted
Provide regular security awareness training to all employees to educate them about various cybersecurity threats and best practices. Security awareness training promotes a security-conscious culture within the organization. Security awareness training should include training on recognizing and mitigating social engineering attacks, authentication best practices, such as password hygiene and multi-factor authentication (MFA), and best practices for handling and protecting sensitive data.
Service description communicated
Communicate clear and detailed service descriptions to customers or users, outlining the scope, features, and limitations of the services provided. Service descriptions set appropriate expectations and promote transparency.
Software development lifecycle established
Implement a well-defined and documented development lifecycle for software and applications. A structured development lifecycle supports secure coding practices, quality assurance, and timely software releases.
System changes externally communicated
Communicate relevant system changes, updates, or maintenance activities to external users or customers who may be impacted. External communication helps manage expectations and maintain transparency.
System changes internally communicated
Ensure that system changes, updates, and maintenance activities are communicated internally to relevant teams and stakeholders. Internal communication helps coordinate efforts and minimize potential disruptions.
Risk Management
Risk assessments performed
Conduct regular risk assessments to identify and evaluate potential threats and vulnerabilities that could impact the organization's assets. Risk assessments help prioritize security efforts and inform risk mitigation strategies.
Risk management policy established
Develop and implement a risk management policy that outlines the organization's approach to identifying, assessing, and mitigating information security risks.
Vendor inventory maintained
Maintain an accurate and up-to-date inventory of all Vendors that the organization engages with. The inventory should include details such as the services provided, contract details, and the scope of access they have.
Vendor management program established
Implement a vendor management program to assess, monitor, and manage the risks associated with third-party vendors. The program ensures that external partners meet security and compliance standards.
Vulnerability Management
Automated software patch management performed
Automate the process of deploying software patches and updates to systems and applications. Automated patch management helps ensure that critical security patches are applied promptly to address known vulnerabilities.
Penetration testing findings remediated
Remediate vulnerabilities identified during penetration testing. Prompt remediation helps address security gaps and prevent potential exploitation.
Penetration testing performed
Conduct regular penetration testing to identify potential vulnerabilities in the organization's systems, applications, and infrastructure. Penetration testing simulates real-world attacks to evaluate the effectiveness of existing security measures.
Vulnerabilities remediated
Detected vulnerabilities are promptly remediated to minimize the risk of exploitation. This includes establishing clear protocols for prioritizing vulnerabilities based on severity and ensuring timely resolution of critical security issues.
Vulnerabilities scanned
Regular vulnerability scans are conducted on systems and applications to identify potential security flaws. This includes automated scanning tools that systematically examine infrastructure, applications, and code repositories for known vulnerabilities.
Vulnerability management policy acknowledged by employees
All employees have acknowledged and agreed to the vulnerability management policy. This policy outlines the procedures for identifying, assessing, and remediating vulnerabilities in the organization's systems and applications.
Vulnerability management policy established
Establish a vulnerability management policy that outlines the procedures for identifying, assessing, and remediating vulnerabilities in the organization's systems and applications.