Here are the controls implemented at WebEngage to ensure compliance, as a part of our security program.
Situational Awareness For Incidents
Role Based Access Controls
Audit Logging
Data Security
Encrypting Data At Rest
Testing for Reliability and Integrity
Transfer of PII
Encryption in Transit
Encryption at Rest
Limit Network Connections
Transmission Confidentiality
Anomalous Behavior
Cloud Provider Requirements
Centralized Collection of Security Event Logs
Conspicuous Link To Privacy Notice
Secure system modification
Mobile Device Management
All WebEngage laptops are centrally managed and inventoried using ABM Controls such as:
Automatic screen lock Strong passwords Patch management Remote Wipe
Disk Encryption
Threat Detection
User laptops are running a centralized EDR client (Jamf). Loki is utilized as SIEM solution which aggregates and ingests all production-related logs.
WebEngage platform is protected by AWS for WAF and zero trust environment services.
Organizational Structure
Roles & Responsibilities
Competency Screening
Security & Privacy Awareness
Performance Review
Automated Reporting
Incident Reporting Assistance
Third-Party Criticality Assessments
Assigned Cybersecurity & Privacy Responsibilities
Internal Audit using Sprinto
Periodic Review & Update of Cybersecurity & Privacy Program
Management Review of Org Chart
Management Review of Risks
Management Review of Third-Party Risks
Subservice organization evaluation
Segregates Roles and Responsibilities
Subprocessor Requirements
Data Protection Officer (DPO)
Testing
Customer Obligations
Retention of Policies
Chief Privacy Officer (CPO)
Privacy Act Statements
Asset Ownership Assignment
Validate Security Controls
Review of Third-Party Services
Updates During Installations / Removals