Actions Taken by TechSec Team
For Applications with PI / SPI / Sensitive Data
- High Level Risk Assessment
- Perform Device / Server VAPT & Application WAPT
- Provide Sign-Off
For Other Applications --> TIM will directly provision the environment based on details provided in the Service Request
Pre-Requisites from Requestor
- Details of Application, Purpose, Data Processed / Handled, Data Protection, HLD, Network / Deployment Diagram, Data Flow Diagram, Authentication and Authorisation Mechanism, Roles & Responsibilities, Users of the Application (TechM / External) to be provided
- Details of Environment / Server where the POC is to be provisioned.
- Duration of POC / Testing, Approival from Service Line / IBU Head.
- Details on who all have access to POC Environment, how access is limited / restricted, how access is made secure (E.g. VPN, 2FA).
- 5. Evidence of Environment, Server Hardening / Patching