live-oak-it-partners.secureframetrust.com
Open in
urlscan Pro
172.67.187.40
Public Scan
URL:
https://live-oak-it-partners.secureframetrust.com/
Submission: On December 23 via automatic, source certstream-suspicious — Scanned from IT
Submission: On December 23 via automatic, source certstream-suspicious — Scanned from IT
Form analysis
0 forms found in the DOMText Content
Live Oak IT Partners | Trust Center LIVE OAK IT PARTNERS * Monitoring Trust Center Header Trust Center Subheader See section RESOURCES Request all documents FAQS SUBPROCESSORS MONITORING Continuously monitored by Secureframe CHANGE MANAGEMENT AVAILABILITY * Testing the Business Continuity and Disaster Recovery Plan * Backup Restoration Testing ORGANIZATIONAL MANAGEMENT * Information Security Program Review CONFIDENTIALITY VULNERABILITY MANAGEMENT INCIDENT RESPONSE * Incident Response Plan Testing * Lessons Learned RISK ASSESSMENT * Risk Register NETWORK SECURITY ACCESS SECURITY * User Access Reviews * Unique Access IDs PHYSICAL SECURITY View all COMPLIANCE Powered by MONITORING AVAILABILITY Testing the Business Continuity and Disaster Recovery Plan The Business Continuity and Disaster Recovery Plan is periodically tested via tabletop exercises or equivalents. When necessary, Management makes changes to the Business Continuity and Disaster Recovery Plan based on the test results. Backup Restoration Testing Backed-up data is restored to a non-production environment at least annually to validate the integrity of backups. ORGANIZATIONAL MANAGEMENT Information Security Program Review Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually. INCIDENT RESPONSE Incident Response Plan Testing The Incident Response Plan is periodically tested via tabletop exercises or equivalents. When necessary, Management makes changes to the Incident Response Plan based on the test results. Lessons Learned After any identified security incident has been resolved, management provides a "Lessons Learned" document to the team in order to continually improve security and operations. RISK ASSESSMENT Risk Register A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy. ACCESS SECURITY User Access Reviews System owners conduct scheduled user access reviews of production servers, databases, and applications to validate internal user access is commensurate with job responsibilities. Unique Access IDs Personnel are assigned unique IDs to access sensitive systems, networks, and information COMMUNICATIONS Communication of Security Commitments Security commitments and expectations are communicated to both internal personnel and external users via the company's website.