![]() ![]() Informationĭo you perform annual penetration testing on the app?ĭoes the app have a documented disaster recovery plan, including a backup and restore strategy?ĭoes your environment use traditional anti-malware protection or application controls?ĭo you have an established process for indentifying and risk ranking security vulnerabilities?ĭo you have a policy that governs your service level agreement (SLA) for applying patches?ĭo you carry out patch management activities according to your patching policy SLAs?ĭoes your enviroment have any unsupported operating systems or software?ĭo you conduct quarterly vulnerability scanning on your app and the infastructure that supports it?ĭo you have a firewall installed on your external network boundary?ĭo you have an established change management process used to review and approve change requests before they are deployed to production? Information from the Microsoft Cloud App Security catalog appears below. Questions or updates to any of the information you see here? Contact us! How long is data retained after account termination?ĭo you have an established data access management process?ĭo you transfer customer data or customer content to third parties or sub-processors?ĭo you have data sharing agreements in place with any third party service you share Microsoft customer data with? If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored?ĭo you have an established data rentention and disposal process? OneDrive file metadata (filename, item id, drive id). ![]() OneDrive files and metadata.ĭoes the app or underlying infrastructure store any Microsoft customer data? Informationĭoes the app or underlying infrastructure process any data relating to a Microsoft customer or their device? This information has been provided by Kami about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.
0 Comments
Leave a Reply. |