This document presents the responses submitted by Trans World Compliance to the information security supplier evaluation form. Each entry below includes the evaluation question, the supplier's reply, and detailed explanations.
Information Security Confidential |
||
SUPPLIER NAME: Trans World Compliance Inc. | ||
Service offered: Software solution for regulatory compliance of the annual FATCA and CRS reporting process, providing the automation capabilities for record upload, remediation, and compliance with the FATCA and CRS reporting requirements. | ||
Service receiving area at the bank: | ||
General Inquiries | ||
General Inquiries | Reply | Detail your answer |
Did you complete the process of getting to know your supplier? | No | We have not received such documentation |
Did you comply with the Confidentiality of Information Agreement documents? | No | We have not received such documentation |
Do you have internal policies and procedures to securely manage the protection of your customers' data? | Yes | We have datailed policies and procedures that are documented in our Operations Manual and Cyber Security Policies documents. |
Do you perform internal audits of your information security control framework? | Yes | Full audits are perfomed two times a year |
Do you perform external audits of your information security control framework? | No | |
Does it have a risk management process? | Yes | TWC follows the FAIR (Factor Analysis of Information Risk) methodology to determine risk in regard to ourIT operations and to identify those areas in need of mitigation. |
Does it have a comprehensive evaluation process, including physical security aspects and security principles? information, for candidates to be hired? | Yes | TWC has an evaluation process detailed on our internal Operations manual including on all candidates before hiring. |
Do you have processes and procedures to manage security incidents? | Yes | The processes documented to manage incidents are detailed in our internal Cyber Security Policies |
Does the application have role access according to the segregation of duties? | Yes | The application uses the Spring Security Framework to ensure role based security in the format of Roles and Privileges. |
Do you perform code analysis test, if the answer is yes, share it with us? | Yes | To ensure the quality of the code, TWC uses the Sonaqube and also does Pententing of its application during the whole development process and also after the release of offical versions |
How do you ensure business continuity? | Yes | TWC has a complete Business continuity and Disaster Recovery Plan, that is based on the RTO and RPO periods, the Run Time Objective (RPO) is within a four-hour window. This may require a rebuild of the server andreinstallation of the database. Since we have offsite image backups, this should be much quicker for AWS servers. The Recovery Point Objectives (RPO) with database logs, we should be able to recover up to the minute. If the outage is not just a machine crash, but due to a complete outage of the facility, we should be able to recover up to the previous night’s backup. This makes the maximum loss of data updates done in the last 24 hours. |
Do you have a change management process? | Yes | The change management is done by the development, security and bussiness teams during Bi Weekly sprints |
Policies and Procedures | ||
Indicate what policies and/or procedures you have in place in your organization. | Reply | Detail your answer |
Classification and protection of information | Yes | Data is classified in to 4 levels of clearance, all employees and contractors are obliged to protect company data and information according to the data classification. |
Safety in human resources | Yes | TWC ensures security to its employees providing training on privacy and data security. |
Acceptable use of technology and information resources | Yes | Access to technology and resources are separated based on roles, developers do not have access to out production systems and operations teams does not have access to the code. |
Access controls | Yes | Identity and access management (IAM) is used to make sure that only the right people can access an organization's data and resources. |
Authorized and unauthorized use/access to the data | Yes | Internal Data is separated by roles following the IAM method, TWC does not have direct access to any personnally identifiable client data in our cloud or installed applications. CRS/FATCA One includes complete access and data change audit logging. |
Security in software development | Yes | The code is reviewed and tested multiple times during the development process, Sonarqube is used to ensure code quality together with penetration testing to find possible vulnerabilities within the application. |
Incident management | Yes | Incidents are managed our Cyber Security Policies, incidents are identified, the vulnerability is classified and dealt with in the time period specified for the risk level. |
Compliance and regulations | Yes | TWC is compliant and commited to your privacy and support the EU’s General Data Protection Regulation (“GDPR”) and the EU-U.S. Privacy Shield Framework (“Privacy Shield”). |
Policies relating to the transmission, storage and processing of confidential data, as well as data of customers | Yes | Trans World Compliance (“TWC”) is committed to your privacy and support the EU’s General Data Protection Regulation (“GDPR”) and the EU-U.S. Privacy Shield Framework (“Privacy Shield”). |
Vulnerability Remediation Management Policies and Procedures | Yes | Our company cyber security policy outlines our guidelines and provisions for preserving the security of our data and technology infrastructure, vulnerabilities that are identifed are entered into our JIRA issue tracking system, classified, and prioritized. |
Data retention and destruction | Yes | TWC does not have direct access to any personnally identifiable client data in our cloud or installed applications. In the case a client transmits personally identifiable client information to an employee for the purposes of support, loading, or otherwise, the employee should delete this after use or within 30 days, which ever is sooner. All data transmission must be secured with (at a minimum) password level encryption. |
Update security policies on a regular basis | Yes | The security policies are updated on a regular basis, the periodicity varies depending on the policy. All policies and procedures a reviewed at least annually. |
Audits | ||
Information on your organization's audit process | Reply | Detail your answer |
Based on what standard or framework are internal audits performed? | Yes | Our Datacenter has different security frameworks that are audited, some of them are ISSO 27001, SOC 1, SOC 2 and SOC 3 |
Do you perform internal audits of your systems? Indicate periodicity | Yes | Full audits are perfomed two times a year, Disaster Recovery simulations are also done two times a year, Pentesting of the systems are done monthly |
Do you perform external audits of your systems? Indicate periodicity | No | |
How often does the external audit company change? | N/A | |
Risk Management | ||
Information regarding the information risk management process in your organization. | Reply | Detail your answer |
Do you have a formal risk management process? | Yes | TWC follows the FAIR (Factor Analysis of Information Risk) methodology to determine risk in regard to ourIT operations and to identify those areas in need of mitigation. |
Are service providers and subcontractors evaluated and monitored to determine whether they protect safety and privacy of sensitive information and systems? | Yes | All providers and subcontractors are evaluated and monitored periodcally to ensure client and internal security. |
Have you had a security breach involving customer data? | No | |
Do contracts with third parties provide for clauses to adequately protect the privacy and confidentiality of the information to which they may have access during the relationship? | Yes | All contracts with third parties provide for clauses to adequately protect the privacy and confidentiality of the information to which they may have access during the relationship |
Change Management | ||
Information regarding your organization's change management process that may affect the privacy of your customers and your organization's evaluation of its impact |
Reply | Detail your answer |
Is there a formalized change management process? | Yes | The change management is done by the development, security and bussiness teams during Bi Weekly sprints |
Do you have an exchange control committee? | Yes | The Security Committee is headed by the DPO and includes representatives from the Operations Group, the Development Group, and the Support Group. Other individuals may be invited. |
Are representatives from the areas responsible for security and privacy part of the committee? | Yes | The Security Committee is headed by the DPO and includes representatives from the Operations Group, the Development Group, and the Support Group. Other individuals may be invited. |
Do you keep records and documentation of the changes that go through this process? | Yes | Our JIRA system tracks all issues throughout the software development process and stores this in an auditable log. |
Security and Incident Response | ||
The level of protection of the information and the measures in case of an incident, where the information of the company is exposed, are evaluated. your customers |
Reply | Detail your answer |
Do you have a perimeter firewall to protect your internal network? | Yes | We use AWS firewall services, VPC and security groups to ensure the network security and continuity |
Do you have IDS as part of your infrastructure? | Yes | The IDS Suricata is a high performance, network analysis and threat detection, that works together with our firewall to provice Threat Detection |
Do you have intrusion prevention systems as part of your security infrastructure? | Yes | The IPS responsible for threat prevention is AWS Guard Duty, that monitors the environment |
Do you perform periodic vulnerability scans and penetration tests on assets, applications, and systems that contain customer data? | Yes | Penetration testing is done on a monthly basis with multiple tools on all of our systems including out systems that contain customer data? |
Do you formally assess and re-evaluate your information security threats and risks at regular intervals, based on of the frequency of emerging threats to your systems and processes? | Yes | The penetration testing is done monthly and repeated if a vulnerabilty is discovered to ensure it was fixed |
Do you perform periodic secure code analysis on applications containing customer data? | Yes | All code is peer reviewed, goes through an automated testing process, and manual testing. Code quality and penetration testing is done monthly to ensure the security of the application. Monitoring of CISA notifications protects against zero day exploits and other threats. |
Do you have documented incident response procedures? | Yes | The company has specific response procedures documented on our operations manual detailing the classification and SLA period to resolve said vulnerabilities. |
In case of a security incident, how do you handle it? | Yes | Incidents are handled following our Cyber Security Policies, incidents are identified, the vulnerability is classified and dealt with in the time period specified for the risk level. |
Do you inform your customers about security incidents? | Yes | In the unlikely event of a security breach, within 24 hours of discovery, Trans World Compliance will notify the owners of any affected data and, where applicable by law, relevant Data Protection Authorities. |
Personnel Security | ||
Process carried out for the selection of internal personnel who have access to sensitive customer information. | Reply | Detail your answer |
Do you have job descriptions for employees accessing confidential or sensitive information? | Yes | The company has datailed job descriptions and roles for every position. |
Do you have controls in place to ensure that data is only accessed on a need-to-know basis. i.e. By roles or job description? | Yes | TWC controls data access using Identity and access management (IAM), for making sure that only the right people can access an organization's data and resources. |
Do you have disciplinary processes to handle policy violations? | Yes | The disciplinary actions are specified in our internal Code of Conduct that is agreed and followed by all employees, penalties are based on damage or potential damage and can include everything up to and including termination and/or legal action for violations of the non-disclosure clause in employment contracts |
Are controls in place to ensure that access to a user or supplier is removed when he orsheleaves the company or terminate the contract? | Yes | That access to any company data or resources is blocked or removed imediatly after the contract termination |
Is training of internal users on data security issues conducted on a regular basis? | Yes | Security training to all employees is done every year to make sure everyone ones has a good understanding of privacy and security |
Physical Security | ||
Information on prevention and detection mechanisms to physically protect the information. | Reply | Detail your answer |
Is there a physical security program in place at the locations where systems or services are provided to provide? | Yes | The data centers have monitoring, triaging, and executing security programs and controlled physical access management and intrusion detection response. |
Compliance/certification/audit reports | ||
Indicate which reports, certifications or other documents do you have? | Reply | Detail your answer |
ISO 27001 | Yes | Our Datacenters comply with the ISO 27001 internationally-recognized standard for security management best practices and comprehensive security controls |
SOX | No | Sarbanes-Oxley Act (SOX) is not relavant to Trans World Compliance. |
SSAE16 | Yes | The Datacenters have the SSAE SOC 1 Type 2 report that evaluates the effectiveness of its controls that might affect your internal controls over financial reporting (ICFR). The audit is performed according to the SSAE 18 and ISAE 3402 standards |
SOC 2 | Yes | Our Datacenters have the SOC 2 Type 2 certification report evaluates the controls that meet the criteria for security, availability, confidentiality, and privacy in the American Institute of Certified Public Accountants (AICPA) TSP section 100, Trust Services Criteria. |
SOC3 | Yes | The Datacenters also have the SOC 3 which is a summary of the SOC 2 report. it outlines that the Datacenter meets the AICPA Trust Services Criteria in its SOC 2 audit report and includes the external auditor’s opinion of the operation of controls |
PCI | No | CRS/FATCA One does not deal with credit card processing. |
Others | No |