Subprocessors
Resources
Acceptable Use Policy
GENERATED
Private
Asset Management Policy
GENERATED
Private
ONLY TESTING POLICY
ONLY TESTING POLICY
CUSTOM
Private
In Progress Compliance
This score is determined through an assessment performed by our FEHAGRC Consultant tes.
CSA Cyber Essentials
0 of 9 controls implemented
CSA Cyber Trust
0 of 131 controls implemented
ISO 27001:2022
10 of 123 controls implemented
NIS 2
0 of 41 controls implemented
SOC 2
0 of 125 controls implemented
UAE PDPL
2 of 31 controls implemented
18 Controls
AI Security / Application Security
Penetration Testing Report
Source Code Access Control Policy or Procedure
Secure Coding Guidelines
35 Controls
Data Protection and Privacy
Privacy Policy
Data Retention and Disposal policies
Data Transfer Policy
28 Controls
Procedures and Policy
Mobile Device Management Policy
Incident Response Plan
Acceptable Use Policy
16 Controls
Internal Organization Security
Service Level Agreement Template
Information Security Management System (ISMS) Plan
Internal Audit Report
37 Controls
Infrastructure Security
Physical Security Policy
Network Security Policy
Network Diagram
22 Controls
Organizational Security
Security Awareness Training Programme
Information Security Policy
List of contact authorities
