Compliance
SOC 2
Controls
Product security
- Production System User Review
- Situational Awareness For Incidents
- Vulnerability Remediation Process
- View 1 more control
Data security
- Identity Validation
- Termination of Employment
- Production Databases Access Restriction
- View 6 more controls
Network security
- Impact analysis
- Limit Network Connections
- External System Connections
- View 5 more controls
App security
- Conspicuous Link To Privacy Notice
- Secure system modification
- Approval of Changes
- View 1 more control
Endpoint security
- Malicious Code Protection (Anti-Malware)
- Full Device or Container-based Encryption
- Endpoint Security Validation
- View 2 more controls
Corporate security
- Code of Business Conduct
- Organizational Structure
- Roles & Responsibilities
- View 26 more controls
Resources
Policy
Policy
Policy
Policy
Policy
Policy
Subprocessors
IAM providers
Design
Finance
Development Software
IT infrastructure
Compliances (1)
Here are the compliance frameworks that UnBound X follows which showcases our adherence to industry-standard security guidelines and practices.
SOC 2
SOC 2 is a voluntary compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. The standard is based on the following Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.
Controls (59)
Here are the controls implemented at UnBound X to ensure compliance, as a part of our security program.
Product security (4)
Production System User Review
Entity’s Infosec officer reviews and approves the list of people with access to production console annually
Situational Awareness For Incidents
Entity maintains a record of information security incidents, its investigation, and the response plan that was executed in accordance with the policy and procedure defined to report and manage incidents.
Vulnerability Remediation Process
Entity identifies vulnerabilities on the Company platform through the execution of regular vulnerability scans.
Centralized Management of Flaw Remediation Processes
Entity tracks all vulnerabilities and remediates them as per the policy and procedure defined to manage vulnerabilities.
Data security (9)
Identity Validation
Entity ensures that logical access provisioning to critical systems requires approval from authorized personnel on an individual need or for a predefined role.
Termination of Employment
Entity ensures logical access that is no longer required in the event of termination is made inaccessible in a timely manner.
Production Databases Access Restriction
Entity ensures that access to the production databases is restricted to only those individuals who require such access to perform their job functions.
User Privileges Reviews
Entity’s Senior Management or the Information Security Officer periodically reviews and ensures that access to the critical systems is restricted to only those individuals who require such access to perform their job functions.
User Access Reviews
Entity’s Senior Management or the Information Security Officer periodically reviews and ensures that administrative access to the critical systems is restricted to only those individuals who require such access to perform their job functions.
Encrypting Data At Rest
Entity has set up cryptographic mechanisms to encrypt all production database[s] that store customer data at rest.
Inventory of Infrastructure Assets
Entity develops, documents, and maintains an inventory of organizational infrastructure systems, including all necessary information to achieve accountability.
Data Backups
Entity backs up relevant user and system data regularly to meet recovery time and recovery point objectives and verifies the integrity of these backups.
Testing for Reliability and Integrity
Entity tests backup information periodically to verify media reliability and information integrity.
Network security (8)
Impact Analysis
Entity systems generate information that is reviewed and evaluated to determine impacts on the functioning of internal controls.
Limit Network Connections
Entity ensures that the production databases access and Secure Shell access to infrastructure entities are protected from public internet access.
External System Connections
Every Production host is protected by a firewall with a deny-by-default rule. Deny by default rule set is a default on the Entity’s cloud provider.
Transmission Confidentiality
Entity has set up processes to utilize standard encryption methods, including HTTPS with the TLS algorithm, to keep transmitted data confidential.
Anomalous Behavior
Entity’s infrastructure is configured to review and analyze audit events to detect anomalous or suspicious activity and threats.
Capacity & Performance Management
Entity has set up methods to continuously monitor critical assets to generate capacity alerts to ensure optimal performance, meet future capacity requirements, and protect against denial-of-service attacks.
Data Used in Testing
Entity ensures that customer data used in non-Production environments requires the same level of protection as the production environment.
Centralized Collection of Security Event Logs
Entity’s infrastructure is configured to generate audit events for actions of interest related to security for all critical systems.
App security (4)
Conspicuous Link To Privacy Notice
Entity displays the most current information about its services on its website, which is accessible to its customers.
Secure System Modification
Entity has procedures to govern changes to its operating environment.
Approval of Changes
Entity has established procedures for approval when implementing changes to the operating environment.
Unauthorized Activities
Entity uses Sprinto, a continuous monitoring system, to alert the security team to update the access levels of team members whose roles have changed.
Endpoint security (5)
Malicious Code Protection (Anti-Malware)
Where applicable, Entity ensures that endpoints with access to critical servers or data must be protected by malware-protection software.
Full Device or Container-based Encryption
Where applicable, Entity ensures that endpoints with access to critical servers or data must be encrypted to protect from unauthorized access.
Endpoint Security Validation
Entity has set up measures to perform security and privacy compliance checks on the software versions and patches of remote devices prior to the establishment of the internal connection.
Session Lock
Entity ensures that endpoints with access to critical servers or data are configured to auto-screen-lock after 15 minutes of inactivity.
Endpoints Encryption
Entity requires that all critical endpoints are encrypted to protect them from unauthorized access.
Corporate security (29)
Code of Business Conduct
Entity has a documented policy to define behavioral standards and acceptable business conduct.
Organizational Structure
Entity maintains an organizational structure to define authorities, facilitate information flow, and establish responsibilities.
Roles & Responsibilities
Entity has established procedures to communicate with staff about their roles and responsibilities.
Competency Screening
Entity has procedures to ensure that all security-related positions are staffed by qualified individuals who have the necessary skill set.
Personnel Screening
Entity has established procedures to perform security risk screening of individuals before authorizing access.
New Hire Policy Acknowledgement
Entity has established procedures for new staff to acknowledge applicable company policies as part of their onboarding.
Security & Privacy Awareness
Entity provides information security and privacy training to staff that is relevant to their job function.
Performance Review
Entity requires that all employees in client serving, IT, Engineering, and Information Security roles are periodically evaluated regarding their job responsibilities.
Periodic Policy Acknowledgement
Entity has established procedures for staff to acknowledge applicable company policies periodically.
Automated Reporting
Entity has provided information to employees, via various Information Security Policies and procedures, on how to report failures, incidents, concerns, or other complaints related to the services or systems provided by the entity.
Incident Reporting Assistance
Entity has provided information to customers on how to report failures, incidents, concerns, or other complaints related to the services or systems provided by the Entity in the event there are problems.
Risk Framing
Entity performs a formal risk assessment exercise annually, as per documented guidelines and procedures, to identify threats that could impair systems’ security commitments and requirements.
Risk Assessment
Each risk is assessed and given a risk score based on the likelihood of occurrence and potential impact on the security, availability, and confidentiality of the Company platform. Risks are mapped to mitigating factors.
Fraud
Entity considers the potential for fraud when assessing risks. This is recorded as an entry in the risk matrix.
Third-Party Criticality Assessments
Entity performs a formal vendor risk assessment exercise annually to identify vendors that are critical to the systems’ security commitments and requirements.
Assigned Cybersecurity & Privacy Responsibilities
Entity’s Senior Management assigns the role of Information Security Officer to centrally manage, coordinate, develop, implement, and maintain an enterprise-wide cybersecurity and privacy program.
Internal Audit using Sprinto
Entity uses Sprinto, a continuous monitoring system, to track and report the health of the information security program to the Information Security Officer and other stakeholders.
Periodic Review & Update of Cybersecurity & Privacy Program
Entity’s Senior Management reviews and approves the Information Security program, including policies, standards, and procedures, at planned intervals or when significant changes occur.
Management Review of Org Chart
Entity’s Senior Management reviews and approves the Organizational Chart for all employees annually.
Management Review of Risks
Entity’s Senior Management reviews and approves the Risk Assessment Report annually.
Management Review of Third-Party Risks
Entity’s Senior Management reviews and approves the Vendor Risk Assessment Report annually.
Subservice Organization Evaluation
Entity reviews and evaluates all subservice organizations periodically to ensure commitments to customers can be met.
Segregation of Roles and Responsibilities
Entity’s Senior Management segregates responsibilities and duties across the organization to mitigate risks to the services provided to customers.
Testing
Entity has procedures to conduct regular tests and exercises to determine the effectiveness and readiness of the contingency plan.
Asset Ownership Assignment
Entity has mechanisms to assign and manage asset ownership responsibilities and establish asset protection requirements.
New Hire Security & Privacy Training Records
Entity requires new staff to complete security and privacy literacy training as part of onboarding.
Periodic Security & Privacy Training Records
Entity documents, monitors, and retains individual security and privacy training records.
Updates During Installations / Removals
Entity periodically updates and reviews the system inventory during installations, removals, and updates.
Inventory of Endpoint Assets
Entity develops, documents, and maintains an inventory of organizational endpoint systems to ensure accountability.
Resources (36)
Here are the important security policies and documents which are a part of UnBound X’s compliance program.
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Policy
Subprocessors (5)
Here are the subprocessors that UnBound X uses to process data in its infrastructure and business operations.
IAM providers
Design
Finance
Development Software
IT infrastructure