SlideShare a Scribd company logo
Version 1
1 Acceptable Use
1.1 Do you use Personally Identifiable Information (PII) for any purpose other than Shipping
labels and/or tax purposes? If so, please list additional use cases and explain them (e.g.
customer profiles, marketing, buyer communication).
1.2 Please list any subsidiaries or additional beneficiaries (e.g. additional business units,
customers, vendors, other third-party solutions) that obtain access to Amazon MWS data due to
your use as a Developer (other than application users).
1.3 Do you retrieve Amazon.com data from non-Amazon MWS sources? If yes, please specify
the type of data and its source.
2 Network Protections
2.1 How is your infrastructure hosted (e.g. on-premise, AWS, non-Amazon cloud solution)?
2.2 How do you restrict network-level access to your infrastructure (web servers, database
servers, endpoints, etc)?
2.3 Do you restrict public access to your database/file servers and desktop/developer endpoints?
If so, how?
3 Access Management
3.1 Please describe your access management practices.
3.2 Have you assigned a unique ID (for logging and accountability) to each employee who has
access to Amazon Information?
3.3 How often do you review (and baseline) access to Amazon Information?
3.4 Do you have a lockout mechanism in place when a malicious activity or log-in attempt is
detected?
3.5 Do you keep an inventory of asset hardware and software that stores Amazon information?
3.6 Do you allow employees to store Amazon data on personal devices?
3.7 Do your access controls divide data access between PII and non-PII access?
4 Encryption in Transit
4.1 Are you encrypting all data-in-transit for all internal and external endpoints? Please specify
any data transfers, internal or external, which are not encrypted.
5 Incident Response Plan
5.1 "How does your incident response plan address:
1. What to do in case your servers/databases are hacked?
2. What to do in case an unauthorized access to customer data is detected?
3. Who to contact in case of an incident and what steps to follow?
4. What to do in case your servers leaked Amazon Information?
5. How to reach out to Amazon to inform them of the incident?"
6 Request for Deletion or Return
6.1 In case of Amazon's request for data deletion or return, do you have a mechanism in place
to destroy Amazon-provided data?
6.2 In case of request, how soon will you be able to destroy Amazon-provided data?
7 Data Governance
7.1 Do you have an external Privacy policy? If "Yes," please provide the URL to your external
Privacy policy.
8 Encryption and Storage
8.1 Are you encrypting all data-at-rest, including data backups?
8.2 What protocol are you using to encrypt data-at-rest?
9 Least Privilege Principle
9.1 How does your organization follow the principle of least privilege to ensure that access to
PII is granted on a "need-to-know" basis?
10 Logging and Monitoring
10.1 How are you generating logs?
10.2 Are you logging security-related events (like access and authorization events, intrusion
attempts, configuration changes, etc.)?
10.3 Are you storing PII in logs?
10.4 Do you have mechanisms in place to monitor the logs and trigger alarms in case of
malicious activity?
Version 2
Cyber
General
1. Do you have a defined Organization Chart
2. Do you have a defined Data/ Business Process Flow Diagram
3. Please provide your Merchant ID Log
4. Please share (if available) any previous Assessment Reports (SOC 1/2 Type 2 / other
Certification Reports such as SOC, HIPAA, PCI-DSS etc.)
Cyber - Data Security
C5. Do you have a defined Data/ Business Process Flow Diagram
C55. Please share (if available) any previous Assessment Reports (SOC 1/2 Type 2 /
other Certification Reports such as SOC, HIPAA, PCI-DSS etc.)
Cyber - Information security policies
C9. Do you have an Access Control Policy or Standard
C11. Do you have an Audit & Event Logging Policies or Standards
Data breach is in breach policy below
https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv
hM2OCOmk/edit?usp=sharing - data breach log - here is how we keep breaches.
C13. Do you have an Asset Lifecycle Management Policy
C15. Do you have a Data Encryption Policy or Standard
C17. Do you have a Data Protection and Privacy policy
- https://sellbery.com/legal-docs/privacy-policy - privacy policy;
- https://docs.google.com/document/d/1X6MEUm3Uz5fiNo72V-_h_Zz-yO-u5HZ-al
51r4LhnIk/edit?usp=sharing
C19. Do you have a Data Classification Policy
https://sellbery.com/legal-docs/privacy-policy - Personal data in our privacy policy
Confidential - in information security policy
C21. IDo you have an Information Security Policy and/or Standard
- https://docs.google.com/document/d/1X6MEUm3Uz5fiNo72V-_h_Zz-yO-u5HZ-al
51r4LhnIk/edit?usp=sharing
C23. Do you have a Password Management Policy
C25. Do you have a Anti-Malware Policy or procedures
C27. Do you have a Cloud Security Policy and Associated Standards
C29. Do you have a Configuration Management Policy
C31. Do you have a Data Destruction and Retention Policy
- https://docs.google.com/document/d/1Kdb3pJ1n0fX2d_wimd-G-S6QkSXXT1Ueg
E5hzoic4Uc/edit?usp=sharing - Data retention policy draft
- https://docs.google.com/spreadsheets/d/1_ImqwEfLB2dkzC7TYSGBUZ1KNYNI
MmNiTkuKNp0OrS8/edit#gid=86919022 - data retention matrix draft
C33. Do you have a Security Training and Awareness Policy and Content Information
C35. Do you have a Risk Management Policy and procedure
C37. Do you have a Software Development Policy or Standard
C39. Do you have a Network Security Policy
C41. Do you have a Third Party Risk Management Policy
C43. Do you have a Vulnerability Management Policy
C45. Do you have a Data Backup and Restoration Policy
C47. Do you have a Incident Management Policy
https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv
hM2OCOmk/edit?usp=sharing - data breach policy - how we act
https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv
hM2OCOmk/edit?usp=sharing - data breach log - here is how we keep breaches.
C49. Do you have a Mobile computing and mobile devices including BYOD (Bring Your
Own Device) Policy
C51. Do you have a Remote Access Policy
Cyber - Data Security
C53. Do you have a Data Handling Procedures for Amazon Data
C57. Please provide a description of any security tools utilized (Anti-virus, IDS, Logging
tools etc.)
C59. Do you have a Network Architecture Diagrams
C61. Please describe your IT Change Management Plans or Procedures
C63. Do you have a Baseline Configuration documentation or checklist
C65. Please provide your Data Disposal Procedures and Logs
C67. Do you have a Information Classification Scheme and Information Asset
Classification Procedure
C69. Do you have a Patch Management Procedures
C71. Do you have a Removable Media Handling Procedure
C73. Please provide a list of any additional open source library dependencies or 3rd
party tools
Testings 1 (1)

More Related Content

What's hot

ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ะ’ะฐัะธะปัŒ ะขะตั€ะตั…ะพะฒััŒะบะธะน
ย 
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐัะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ะจะบะพะปะฐ ะ›ะตะดะธ ะธ ะšะฐะดะตั‚ัั‚ะฒะพ
ย 
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ะ›ะตั… ะขะฐั‚ัŒัะฝะฐ
ย 
Desktop virtualization
Desktop virtualizationDesktop virtualization
Desktop virtualization
atadrisi
ย 
Linux - Hedi Magroun - AUF - 2008
Linux -  Hedi Magroun - AUF - 2008Linux -  Hedi Magroun - AUF - 2008
Linux - Hedi Magroun - AUF - 2008Hedi Magroun
ย 
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
VxRail ChampionClub
ย 
Cron
CronCron
Cron
Iryney Baran
ย 
Git vs svn
Git vs svnGit vs svn
Git vs svn
Suman Mukherjee
ย 
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
Changwan Jun
ย 
CI and CD with Jenkins
CI and CD with JenkinsCI and CD with Jenkins
CI and CD with Jenkins
Martin Mรกlek
ย 
Linux Terminal commands for Devops.pdf
Linux Terminal commands for Devops.pdfLinux Terminal commands for Devops.pdf
Linux Terminal commands for Devops.pdf
Nambi Nam
ย 

What's hot (11)

ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ะฃั€ะพะบ 15. ะžะฟั€ะฐั†ัŽะฒะฐะฝะฝั ะพะฑโ€™ั”ะบั‚ั–ะฒ ะผัƒะปัŒั‚ะธะผะตะดั–ะฐ
ย 
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐัะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ะ’ัะตัะฒั–ั‚ะฝั ั–ัั‚ะพั€ั–ั 7 ะบะปะฐั
ย 
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ะŸะพั€ั‚ั„ะพะปั–ะพ ะฒั‡ะธั‚ะตะปั ั–ะฝั„ะพั€ะผะฐั‚ะธะบะธ
ย 
Desktop virtualization
Desktop virtualizationDesktop virtualization
Desktop virtualization
ย 
Linux - Hedi Magroun - AUF - 2008
Linux -  Hedi Magroun - AUF - 2008Linux -  Hedi Magroun - AUF - 2008
Linux - Hedi Magroun - AUF - 2008
ย 
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
20180222_VxRailccใƒˆใƒฉใƒ–ใƒซใ‚ทใƒฅใƒผใƒ†ใ‚ฃใƒณใ‚ฐใ‚ปใƒŸใƒŠใƒผ_vSANๆ€ง่ƒฝ่ฉฆ้จ“ใƒ™ใ‚นใƒˆใƒ—ใƒฉใ‚ฏใƒ†ใ‚ฃใ‚น_VM็Ÿฅไน…ๆง˜
ย 
Cron
CronCron
Cron
ย 
Git vs svn
Git vs svnGit vs svn
Git vs svn
ย 
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
PHP์—์„œ GCM ํ‘ธ์‹œ ๋น ๋ฅด๊ฒŒ ๋ณด๋‚ด๊ธฐ (feat. Async / Generator)
ย 
CI and CD with Jenkins
CI and CD with JenkinsCI and CD with Jenkins
CI and CD with Jenkins
ย 
Linux Terminal commands for Devops.pdf
Linux Terminal commands for Devops.pdfLinux Terminal commands for Devops.pdf
Linux Terminal commands for Devops.pdf
ย 

Similar to Testings 1 (1)

Testings 1
Testings 1Testings 1
Testings 1
AndreyZatserklaniy
ย 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
hashnees
ย 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
ย 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
BizTalk360
ย 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
ย 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
Agusto Sipahutar
ย 
Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
at MicroFocus Italy โ–โœ”
ย 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal
ย 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
Don Daubert
ย 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
ย 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
Mark Stokes
ย 
Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021
Albert Hoitingh
ย 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
ย 
How to Maximize Data Governance in Snowflake Test Environment
How to Maximize Data Governance in Snowflake Test EnvironmentHow to Maximize Data Governance in Snowflake Test Environment
How to Maximize Data Governance in Snowflake Test Environment
Jade Global
ย 
iDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons LearnediDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons Learned
Michael King
ย 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
Secure Islands - Data Security Policy
ย 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
shyamuopuop
ย 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
ย 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
Drew Madelung
ย 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
ย 

Similar to Testings 1 (1) (20)

Testings 1
Testings 1Testings 1
Testings 1
ย 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
ย 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
ย 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
ย 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
ย 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
ย 
Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
ย 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
ย 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
ย 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
ย 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
ย 
Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021Global Security and Compliance Community conference 2021
Global Security and Compliance Community conference 2021
ย 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
ย 
How to Maximize Data Governance in Snowflake Test Environment
How to Maximize Data Governance in Snowflake Test EnvironmentHow to Maximize Data Governance in Snowflake Test Environment
How to Maximize Data Governance in Snowflake Test Environment
ย 
iDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons LearnediDEAFest Enteprise InfoSec Program Lessons Learned
iDEAFest Enteprise InfoSec Program Lessons Learned
ย 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
ย 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
ย 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
ย 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
ย 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
ย 

Recently uploaded

The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
ย 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
ย 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
โž‘โžŒโž‹โž‘โž’โžŽโž‘โž‘โžŠโž
ย 
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
Stone Art Hub
ย 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
ย 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
ย 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
ย 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
ย 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
ย 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
ย 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
my Pandit
ย 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Lviv Startup Club
ย 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
ย 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
ย 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
ย 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
ย 
Top 10 Free Accounting and Bookkeeping Apps for Small Businesses
Top 10 Free Accounting and Bookkeeping Apps for Small BusinessesTop 10 Free Accounting and Bookkeeping Apps for Small Businesses
Top 10 Free Accounting and Bookkeeping Apps for Small Businesses
YourLegal Accounting
ย 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
TTop Threads
ย 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
dazzjoker
ย 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka

Recently uploaded (20)

The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
ย 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
ย 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
ย 
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
Best Competitive Marble Pricing in Dubai - โ˜Ž 9928909666
ย 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
ย 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ย 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
ย 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
ย 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
ย 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
ย 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
ย 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
ย 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
ย 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
ย 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
ย 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
ย 
Top 10 Free Accounting and Bookkeeping Apps for Small Businesses
Top 10 Free Accounting and Bookkeeping Apps for Small BusinessesTop 10 Free Accounting and Bookkeeping Apps for Small Businesses
Top 10 Free Accounting and Bookkeeping Apps for Small Businesses
ย 
Profiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdfProfiles of Iconic Fashion Personalities.pdf
Profiles of Iconic Fashion Personalities.pdf
ย 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
ย 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
ย 

Testings 1 (1)

  • 1. Version 1 1 Acceptable Use 1.1 Do you use Personally Identifiable Information (PII) for any purpose other than Shipping labels and/or tax purposes? If so, please list additional use cases and explain them (e.g. customer profiles, marketing, buyer communication). 1.2 Please list any subsidiaries or additional beneficiaries (e.g. additional business units, customers, vendors, other third-party solutions) that obtain access to Amazon MWS data due to your use as a Developer (other than application users). 1.3 Do you retrieve Amazon.com data from non-Amazon MWS sources? If yes, please specify the type of data and its source. 2 Network Protections 2.1 How is your infrastructure hosted (e.g. on-premise, AWS, non-Amazon cloud solution)? 2.2 How do you restrict network-level access to your infrastructure (web servers, database servers, endpoints, etc)? 2.3 Do you restrict public access to your database/file servers and desktop/developer endpoints? If so, how? 3 Access Management 3.1 Please describe your access management practices. 3.2 Have you assigned a unique ID (for logging and accountability) to each employee who has access to Amazon Information? 3.3 How often do you review (and baseline) access to Amazon Information?
  • 2. 3.4 Do you have a lockout mechanism in place when a malicious activity or log-in attempt is detected? 3.5 Do you keep an inventory of asset hardware and software that stores Amazon information? 3.6 Do you allow employees to store Amazon data on personal devices? 3.7 Do your access controls divide data access between PII and non-PII access? 4 Encryption in Transit 4.1 Are you encrypting all data-in-transit for all internal and external endpoints? Please specify any data transfers, internal or external, which are not encrypted. 5 Incident Response Plan 5.1 "How does your incident response plan address: 1. What to do in case your servers/databases are hacked? 2. What to do in case an unauthorized access to customer data is detected? 3. Who to contact in case of an incident and what steps to follow? 4. What to do in case your servers leaked Amazon Information? 5. How to reach out to Amazon to inform them of the incident?" 6 Request for Deletion or Return 6.1 In case of Amazon's request for data deletion or return, do you have a mechanism in place to destroy Amazon-provided data? 6.2 In case of request, how soon will you be able to destroy Amazon-provided data? 7 Data Governance
  • 3. 7.1 Do you have an external Privacy policy? If "Yes," please provide the URL to your external Privacy policy. 8 Encryption and Storage 8.1 Are you encrypting all data-at-rest, including data backups? 8.2 What protocol are you using to encrypt data-at-rest? 9 Least Privilege Principle 9.1 How does your organization follow the principle of least privilege to ensure that access to PII is granted on a "need-to-know" basis? 10 Logging and Monitoring 10.1 How are you generating logs? 10.2 Are you logging security-related events (like access and authorization events, intrusion attempts, configuration changes, etc.)? 10.3 Are you storing PII in logs? 10.4 Do you have mechanisms in place to monitor the logs and trigger alarms in case of malicious activity?
  • 4. Version 2 Cyber General 1. Do you have a defined Organization Chart 2. Do you have a defined Data/ Business Process Flow Diagram 3. Please provide your Merchant ID Log 4. Please share (if available) any previous Assessment Reports (SOC 1/2 Type 2 / other Certification Reports such as SOC, HIPAA, PCI-DSS etc.) Cyber - Data Security C5. Do you have a defined Data/ Business Process Flow Diagram C55. Please share (if available) any previous Assessment Reports (SOC 1/2 Type 2 / other Certification Reports such as SOC, HIPAA, PCI-DSS etc.) Cyber - Information security policies C9. Do you have an Access Control Policy or Standard C11. Do you have an Audit & Event Logging Policies or Standards Data breach is in breach policy below https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv hM2OCOmk/edit?usp=sharing - data breach log - here is how we keep breaches. C13. Do you have an Asset Lifecycle Management Policy C15. Do you have a Data Encryption Policy or Standard C17. Do you have a Data Protection and Privacy policy - https://sellbery.com/legal-docs/privacy-policy - privacy policy; - https://docs.google.com/document/d/1X6MEUm3Uz5fiNo72V-_h_Zz-yO-u5HZ-al 51r4LhnIk/edit?usp=sharing C19. Do you have a Data Classification Policy https://sellbery.com/legal-docs/privacy-policy - Personal data in our privacy policy Confidential - in information security policy C21. IDo you have an Information Security Policy and/or Standard - https://docs.google.com/document/d/1X6MEUm3Uz5fiNo72V-_h_Zz-yO-u5HZ-al 51r4LhnIk/edit?usp=sharing C23. Do you have a Password Management Policy
  • 5. C25. Do you have a Anti-Malware Policy or procedures C27. Do you have a Cloud Security Policy and Associated Standards C29. Do you have a Configuration Management Policy C31. Do you have a Data Destruction and Retention Policy - https://docs.google.com/document/d/1Kdb3pJ1n0fX2d_wimd-G-S6QkSXXT1Ueg E5hzoic4Uc/edit?usp=sharing - Data retention policy draft - https://docs.google.com/spreadsheets/d/1_ImqwEfLB2dkzC7TYSGBUZ1KNYNI MmNiTkuKNp0OrS8/edit#gid=86919022 - data retention matrix draft C33. Do you have a Security Training and Awareness Policy and Content Information C35. Do you have a Risk Management Policy and procedure C37. Do you have a Software Development Policy or Standard C39. Do you have a Network Security Policy C41. Do you have a Third Party Risk Management Policy C43. Do you have a Vulnerability Management Policy C45. Do you have a Data Backup and Restoration Policy C47. Do you have a Incident Management Policy https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv hM2OCOmk/edit?usp=sharing - data breach policy - how we act https://docs.google.com/document/d/1EgO-GijbuSwp-j_r0yEi3TNK-Y-60MqwYHv hM2OCOmk/edit?usp=sharing - data breach log - here is how we keep breaches. C49. Do you have a Mobile computing and mobile devices including BYOD (Bring Your Own Device) Policy C51. Do you have a Remote Access Policy Cyber - Data Security C53. Do you have a Data Handling Procedures for Amazon Data C57. Please provide a description of any security tools utilized (Anti-virus, IDS, Logging tools etc.) C59. Do you have a Network Architecture Diagrams C61. Please describe your IT Change Management Plans or Procedures C63. Do you have a Baseline Configuration documentation or checklist C65. Please provide your Data Disposal Procedures and Logs C67. Do you have a Information Classification Scheme and Information Asset Classification Procedure C69. Do you have a Patch Management Procedures C71. Do you have a Removable Media Handling Procedure C73. Please provide a list of any additional open source library dependencies or 3rd party tools