live-oak-it-partners.secureframetrust.com Open in urlscan Pro
172.67.187.40  Public Scan

URL: https://live-oak-it-partners.secureframetrust.com/
Submission: On December 23 via automatic, source certstream-suspicious — Scanned from IT

Form analysis 0 forms found in the DOM

Text Content

Live Oak IT Partners | Trust Center


LIVE OAK IT PARTNERS

 * Monitoring


Trust Center Header
Trust Center Subheader
See section


RESOURCES

Request all documents



FAQS




SUBPROCESSORS




MONITORING

Continuously monitored by Secureframe


CHANGE MANAGEMENT


AVAILABILITY

 * Testing the Business Continuity and Disaster Recovery Plan
 * Backup Restoration Testing


ORGANIZATIONAL MANAGEMENT

 * Information Security Program Review


CONFIDENTIALITY


VULNERABILITY MANAGEMENT


INCIDENT RESPONSE

 * Incident Response Plan Testing
 * Lessons Learned


RISK ASSESSMENT

 * Risk Register


NETWORK SECURITY


ACCESS SECURITY

 * User Access Reviews
 * Unique Access IDs


PHYSICAL SECURITY

View all


COMPLIANCE


Powered by


MONITORING




AVAILABILITY

Testing the Business Continuity and Disaster Recovery Plan
The Business Continuity and Disaster Recovery Plan is periodically tested via
tabletop exercises or equivalents. When necessary, Management makes changes to
the Business Continuity and Disaster Recovery Plan based on the test results.
Backup Restoration Testing
Backed-up data is restored to a non-production environment at least annually to
validate the integrity of backups.


ORGANIZATIONAL MANAGEMENT

Information Security Program Review
Management is responsible for the design, implementation, and management of the
organization’s security policies and procedures. The policies and procedures are
reviewed by management at least annually.


INCIDENT RESPONSE

Incident Response Plan Testing
The Incident Response Plan is periodically tested via tabletop exercises or
equivalents. When necessary, Management makes changes to the Incident Response
Plan based on the test results.
Lessons Learned
After any identified security incident has been resolved, management provides a
"Lessons Learned" document to the team in order to continually improve security
and operations.


RISK ASSESSMENT

Risk Register
A risk register is maintained, which records the risk mitigation strategies for
identified risks, and the development or modification of controls consistent
with the risk mitigation strategy.


ACCESS SECURITY

User Access Reviews
System owners conduct scheduled user access reviews of production servers,
databases, and applications to validate internal user access is commensurate
with job responsibilities.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and
information


COMMUNICATIONS

Communication of Security Commitments
Security commitments and expectations are communicated to both internal
personnel and external users via the company's website.