

#Disk sensei 1.2 iso#
SOC, ISO 27001 certifications and other audit reports for Microsoft Azure and Microsoft Cloud Infrastructure and Operations (global datacenters) can be found on the Azure Trust Center website ( ) and the website of our external ISO auditor, the BSI Group. Sensei chooses to be a PaaS consumer rather than an IaaS consumer so that the infrastructure is managed exclusively by Microsoft under ISO 27001 and other certified conditions. Provide any applicable internal and/or external (independent) audit reports and evidence of approved remediation plans. These certifications and attestations accurately represent how we obtain and meet our security and compliance objectives and serve as a practical mechanism to validate our promises for customers. Microsoft Azure independent audit reports and certifications are shared with customers in the format native to the type of audit. Provide your auditing plans, including scope and schedules.Īs PaaS customer of Microsoft Azure we acknowledge and endorse the trustworthiness of their security auditing procedures available at the Azure Trust Center website ( ). While we don't currently have any automated VASP remediation examples available to share at this time, we are planning on making this information available in the future. While we don't currently have any automated OWASP test reports available to share at this time, we are planning on making this information available in the future.ĭemonstrate that weaknesses identified through VAPT and any other methods is remediated.
#Disk sensei 1.2 code#
Provide test reports from any automated source code analysis tool(s) used to detect OWASP vulnerabilities. The Microsoft Azure trustworthy foundation concept ensures application security through a process of continuous security improvement with its Security Development Lifecycle (SDL) and Operational Security Assurance (OSA) programs using both Prevent Breach and Assume Breach security postures. As PaaS consumer of Microsoft infrastructure, Sensei defers to Microsoft for infrastructure vulnerability management.
#Disk sensei 1.2 software#
Provide details of methodologies, frameworks and development practices that ensure that the software components of the solution are developed securely and are not vulnerable to the OWASP top 10 vulnerabilities.įor semantic security, all developers who contributed code toward the project have been made aware of the OWASP security vulnerabilities precautions - and while many are not applicable to this type of solution, regular code reviews and continuing education ensures a robust approach to security. A summary is available in this document and the complete documents are available on request. The Reporting Hub and associated applications are security assessed and penetration tested by 3rd party CREST certified tester Sense Of Security. Provide any vulnerability and penetration test (VAPT) reports for externally accessible interfaces (user, administrative and API access) within the solution. Our responses to CSA CCM v.3.0.1 are below: AIS Application & Interface Security Control
