Cyber Security
- User Access Management
- How is data encrypted?
- Where is our data stored?
- Data Breach Response Procedure
- How is individual client data isolated/segregated?
- Security Event Logging
- Handling of Personal Data
- Which region is the solution hosted in?
- How often are backups scheduled?
- System & Application Patch/Vulnerability Management
- What is the Service Level Agreement (SLA) for the Robot Platform?
- Platform Scalability
- Delegated User Administration
- Data Deletion & Eradication
- Development Environment Information
- Security Incident Management
- Security of APIs & Integration Interfaces
- Authentication and Federation Standards
- Change Management Logging
- Role-Based Access Control (RBAC)