Scope, accountability, and business context for security and privacy.
Knowing what systems and data you have, where they live, and who uses them.
Accounts, authentication, and access to systems and data.
Operating system hardening, patching, and malware protection.
Firewalls, wireless networks, and remote connectivity.
Public facing services, web applications, and email protections.
Protecting confidential data at rest and in transit, plus reliable backups.
Capturing and reviewing signals that indicate possible attacks or misuse.
How you prepare for, respond to, and recover from security incidents.
How you choose, review, and manage partners who handle your data or systems.
Only answer these if you accept card payments. If not, mark not applicable.