ABCDEFGHIJKLMNOPQRSTUVWXYZAA
1
Owner2.11 Question ID2.11 QuestionVendor ActionOPTIONS
2
GNRL-01Vendor Name
3
GNRL-02Product Name
4
GNRL-03Product Description
5
GNRL-04Web Link to Product Privacy Notice
6
GNRL-05Vendor Contact Name
7
GNRL-06Vendor Contact Title
8
GNRL-07Vendor Contact Email
9
GNRL-08Vendor Contact Phone Number
10
GNRL-09Vendor Data Zone
11
GNRL-10Institution Data Zone
12
GNRL-11Institution's Security Analyst/Engineer
13
GNRL-12Assessment Contact
14
CharlieQUAL-01Does your product process protected health information (PHI) or any data covered by the Health Insurance Portability and Accountability Act?Update any existing response
15
CharlieQUAL-02Does the vended product host/support a mobile application? (e.g. app)Removed; No longer relevant
16
CharlieQUAL-03Will institution data be shared with or hosted by any third parties? (e.g. any entity not wholly-owned by your company is considered a third-party)Update any existing response; migrated to QUAL-02
17
CharlieQUAL-04Do you have a Business Continuity Plan (BCP)?Update any existing response; migrated to QUAL-03
18
CharlieQUAL-05Do you have a Disaster Recovery Plan (DRP)?Update any existing response; migrated to QUAL-04
19
CharlieQUAL-06Will data regulated by PCI DSS reside in the vended product?Update any existing response; migrated to QUAL-05
20
CharlieQUAL-07Is your company a consulting firm providing only consultation to the Institution?Update any existing response; migrated to QUAL-06
21
CharlieDOCU-01Have you undergone a SSAE 18 audit?Update any existing response
22
CharlieDOCU-02Have you completed the Cloud Security Alliance (CSA) self assessment or CAIQ?Update any existing response
23
CharlieDOCU-03Have you received the Cloud Security Alliance STAR certification?Update any existing response
24
CharlieDOCU-04Do you conform with a specific industry standard security framework? (e.g. NIST Cybersecurity Framework, ISO 27001, etc.)Update any existing response
25
CharlieDOCU-05Are you compliant with FISMA standards?New answer required
26
CharlieDOCU-06Does your organization have a data privacy policy?Update any existing response; migrated to DOCU-07
27
CharlieCOMP-01Describe your organization’s business background and ownership structure, including all parent and subsidiary relationships.Update any existing response
28
CharlieCOMP-02Describe how long your organization has conducted business in this product area.Removed; No longer relevant
29
CharlieCOMP-03Do you have existing higher education customers?Removed; No longer relevant
30
CharlieCOMP-04Have you had a significant breach in the last 5 years?Update any existing response; reworded and migrated to COMP-02
31
CharlieCOMP-05Do you have a dedicated Information Security staff or office?Update any existing response; migrated to COMP-03
32
CharlieCOMP-06Do you have a dedicated Software and System Development team(s)? (e.g. Customer Support, Implementation, Product Management, etc.)Update any existing response; migrated to COMP-04
33
CharlieCOMP-07Use this area to share information about your environment that will assist those who are assessing your company data security program.Update any existing response; migrated to COMP-05
34
CharlieTHRD-01Describe how you perform security assessments of third party companies with which you share data (i.e. hosting providers, cloud services, PaaS, IaaS, SaaS, etc.). Provide a summary of your practices that assures that the third party will be subject to the appropriate standards regarding security, service recoverability, and confidentiality.Update any existing response; question reworded
35
CharlieTHRD-02Provide a brief description for why each of these third parties will have access to institution data.Update any existing response
36
CharlieTHRD-03What legal agreements (i.e. contracts) do you have in place with these third parties that address liability in the event of a data breach?Update any existing response
37
CharlieTHRD-04Describe or provide references to your third party management strategy or provide additional information that may help analysts better understand your environment and how it relates to third-party solutions.Update any existing response; question reworded
38
CharlieCONS-01Will the consulting take place on-premises?Update any existing response
39
CharlieCONS-02Will the consultant require access to Institution's network resources?Update any existing response
40
CharlieCONS-03Will the consultant require access to hardware in the Institution's data centers?Update any existing response
41
CharlieCONS-04Will the consultant require an account within the Institution's domain (@*.edu)?Update any existing response
42
CharlieCONS-05Has the consultant received training on [sensitive, HIPAA, PCI, etc.] data handling?Update any existing response
43
CharlieCONS-06Will any data be transferred to the consultant's possession?Update any existing response
44
CharlieCONS-07Is it encrypted (at rest) while in the consultant's possession?Update any existing response
45
CharlieCONS-08Will the consultant need remote access to the Institution's network or systems?Update any existing response
46
CharlieCONS-09Can we restrict that access based on source IP address?Update any existing response
47
CharlieAPPL-01Do you support role-based access control (RBAC) for end-users?New answer required; question context and wording changed
48
CharlieAPPL-02Do you support role-based access control (RBAC) for system administrators?New answer required; question context and wording changed
49
CharlieAPPL-03Can employees access customer data remotely?New answer required; part of DATA-24
50
CharlieAPPL-04Can you provide overall system and/or application architecture diagrams including a full description of the data communications architecture for all components of the system?Update any existing response; migrated to DOCU-06
51
CharlieAPPL-05Does the system provide data input validation and error messages?Update any existing response; migrated to APPL-03
52
CharlieAPPL-06Do you employ a single-tenant environment?Update any existing response; migrated to DATA-01
53
CharlieAPPL-07What operating system(s) is/are leveraged by the system(s)/application(s) that will have access to institution's data?New answer required; question context and wording changed
54
CharlieAPPL-08Have you or any third party you contract with that may have access or allow access to the institution's data experienced a breach?Update any existing response; migrated to THRD-03
55
CharlieAPPL-09Describe or provide a reference to additional software/products necessary to implement a functional system on either the backend or user-interface side of the system.New answer required; question context and wording migrated to APPL-06
56
CharlieAPPL-10Describe or provide a reference to the overall system and/or application architecture(s), including appropriate diagrams. Include a full description of the data communications architecture for all components of the system.Update any existing response; migrated to DOCU-06
57
CharlieAPPL-11Are databases used in the system segregated from front-end systems? (e.g. web and application servers)New answer required; question context and wording migrated to DATA-04
58
CharlieAPPL-12Describe or provide a reference to all web-enabled features and functionality of the system (i.e. accessed via a web-based interface).Removed; assessment needs represented within other questions and/or guidance
59
CharlieAPPL-13Are there any OS and/or web-browser combinations that are not currently supported?New answer required; question context and wording migrated to APPL-07
60
CharlieAPPL-14Can your system take advantage of mobile and/or GPS enabled mobile devices?Removed; assessment needs represented within other questions and/or guidance
61
CharlieAPPL-15Describe or provide a reference to the facilities available in the system to provide separation of duties between security administration and system administration functions.Update any existing response; migrated to APPL-10
62
CharlieAPPL-16Describe or provide a reference that details how administrator access is handled (e.g. provisioning, principle of least privilege, deprovisioning, etc.)Update any existing response; migrated to APPL-11
63
CharlieAPPL-17Describe or provide references explaining how tertiary services are redundant (i.e. DNS, ISP, etc.).New answer required; question context and wording migrated to BCPL-10 and DCTR-14
64
CharlieAAAI-01Can you enforce password/passphrase aging requirements?Update any existing response; migrated to AAAI-03
65
CharlieAAAI-02Can you enforce password/passphrase complexity requirements [provided by the institution]?Update any existing response; migrated to AAAI-04
66
CharlieAAAI-03Does the system have password complexity or length limitations and/or restrictions?Update any existing response; migrated to AAAI-05
67
CharlieAAAI-04Do you have documented password/passphrase reset procedures that are currently implemented in the system and/or customer support?Update any existing response; migrated to AAAI-06
68
CharlieAAAI-05Does your web-based interface support authentication, including standards-based single-sign-on? (e.g. InCommon)New answer required; question context and wording migrated to AAAI-01
69
CharlieAAAI-06Are there any passwords/passphrases hard coded into your systems or products?Update any existing response; migrated to AAAI-14
70
CharlieAAAI-07Are user account passwords/passphrases visible in administration modules?New answer required; question context and wording migrated to AAAI-15
71
CharlieAAAI-08Are user account passwords/passphrases stored encrypted?New answer required; question context and wording migrated to AAAI-15
72
CharlieAAAI-09Does your application and/or user-frontend/portal support multi-factor authentication? (e.g. Duo, Google Authenticator, OTP, etc.)New answer required; question context and wording migrated to AAAI-12
73
CharlieAAAI-10Does your application support integration with other authentication and authorization systems? List which ones (such as Active Directory, Kerberos and what version) in Additional Info?New answer required; question context and wording migrated to AAAI-16
74
CharlieAAAI-11Will any external authentication or authorization system be utilized by an application with access to the institution's data?New answer required; question context and wording migrated to AAAI-16
75
CharlieAAAI-12Does the system (servers/infrastructure) support external authentication services (e.g. Active Directory, LDAP) in place of local authentication?New answer required; question context and wording migrated to AAAI-02
76
CharlieAAAI-13Does the system operate in a mixed authentication mode (i.e. external and local authentication)?Removed; assessment needs represented within other questions and/or guidance
77
CharlieAAAI-14Will any external authentication or authorization system be utilized by a system with access to institution data?Removed; assessment needs represented within other questions and/or guidance
78
CharlieAAAI-15Are audit logs available that include AT LEAST all of the following; login, logout, actions performed, and source IP address?Update any existing response; migrated to AAAI-17
79
CharlieAAAI-16Describe or provide a reference to the a) system capability to logsecurity/authorization changes as well as user and administrator security events(i.e. physical or electronic)(e.g. login failures, access denied, changes accepted), and b) all requirements necessary to implement logging and monitoring on the system. Include c) information about SIEM/log collector usage.Update any existing response; migrated to AAAI-18
80
CharlieAAAI-17Describe or provide a reference to the retention period for those logs, how logs are protected, and whether they are accessible to the customer (and if so, how).Update any existing response; migrated to AAAI-19
81
JoshBCPL-01Describe or provide a reference to your Business Continuity Plan (BCP).Removed; no longer relevant
82
JoshBCPL-02May the Institution review your BCP and supporting documentation?Removed; no longer relevant
83
JoshBCPL-03Is an owner assigned who is responsible for the maintenance and review of the Business Continuity Plan?Now BCPL-01 Update as necessary
84
JoshBCPL-04Is there a defined problem/issue escalation plan in your BCP for impacted clients?Now BCPL-02 Update as necessary
85
JoshBCPL-05Is there a documented communication plan in your BCP for impacted clients?Now BCPL-03 Update as necessary
86
JoshBCPL-06Are all components of the BCP reviewed at least annually and updated as needed to reflect change?Now BCPL-04 Update as necessary
87
JoshBCPL-07Has your BCP been tested in the last year?Now BCPL-08 Update as necessary
88
JoshBCPL-08Does your organization conduct training and awareness activities to validate its employees understanding of their roles and responsibilities during a crisis?Now BCPL-06 Update as necessary
89
JoshBCPL-09Are specific crisis management roles and responsibilities defined and documented?Now BCPL-05 Update as necessary
90
JoshBCPL-10Does your organization have an alternative business site or a contracted Business Recovery provider?Now BCPL-07 Update as necessary
91
JoshBCPL-11Does your organization conduct an annual test of relocating to an alternate site for business recovery purposes?Now BCPL-08 Update as necessary
92
JoshBCPL-12Is this product a core service of your organization, and as such, the top priority during business continuity planning?Now BCPL-09 Update as necessary
93
JoshCHNG-01Do you have a documented and currently followed change management process (CMP)?New wording: Update as necessary
94
JoshCHNG-02Indicate all procedures that are implemented in your CMP. a.) An impact analysis of the upgrade is performed. b.) The change is appropriately authorized. c.) Changes are made first in a test environment. d.) The ability to implement the upgrades/changes in the production environment is limited to appropriate IT personnel.New wording: Update as necessary
95
JoshCHNG-03Will the Institution be notified of major changes to your environment that could impact the Institution's security posture?Update any existing response
96
JoshCHNG-04Do clients have the option to not participate in or postpone an upgrade to a new release?Update any existing response
97
JoshCHNG-05Describe or provide a reference to your solution support strategy in relation to maintaining software currency. (i.e. how many concurrent versions are you willing to run and support?)New wording: Update as necessary
98
JoshCHNG-06Identify the most current version of the software. Detail the percentage of live customers that are utilizing the proposed version of the software as well as each version of the software currently in use.Removed; no longer relevant
99
JoshCHNG-07Does the system support client customizations from one release to another?Now CHNG-06 Update as necessary
100
JoshCHNG-08Does your organization ensure through policy and procedure (that is currently implemented) that only application software verifiable as authorized, tested, and approved for production, and having met all other requirements and reviews necessary for commissioning, is placed into production?Removed; no longer relevant