
HECVAT is a standardized questionnaire used by colleges and universities to evaluate the security and privacy of third-party vendors and their solutions.
Controls related to the foundational structure and governance of the information security program.
Is a formally documented and approved information security program in place?
Is mandatory security awareness training provided to all personnel annually?
Are security roles and responsibilities defined and formally assigned to personnel?
Is an acceptable use policy established and enforced for all systems and data?
Are background checks or equivalent vetting performed for all personnel with access to sensitive data?
Are physical access controls implemented to secure facilities and areas where systems and data are located?
Is a data classification scheme defined; documented; and applied to all information assets?
Are compliance monitoring measures implemented to ensure adherence to internal policies and external regulations?
Is a formal review and approval process required for contracts involving information technology and data handling?
Are information security performance metrics and reporting procedures defined and regularly reviewed by management?
Is a documented process for continuous improvement of the security program; including remediation of audit findings?
Is a change management process implemented for all production system changes that includes security review?
Is an accurate and up-to-date inventory maintained for all hardware and software assets?
Is remote access to internal networks and systems secured using documented protocols and controls?
Is a formal vulnerability disclosure or bug reporting program in place for external researchers?
Controls related to the design principles and overall structure of IT systems and security capabilities.
Is a defined security architecture used to guide the design and implementation of new systems and services?
Are network environments logically segmented to separate critical systems and limit unauthorized communication?
Are data flow maps created and maintained to identify the storage; transmission; and processing of sensitive data?
Is security integrated into the system development lifecycle (SDLC) from the initial design phase?
Are cryptographic standards and protocols defined for protecting data and communications?
Are system and application logs centralized; protected; and regularly reviewed for security events?
Are measures in place to ensure high availability and redundancy for critical systems and infrastructure?
Are infrastructure configurations managed as immutable; utilizing automation to prevent unauthorized or manual changes?
Is a formal process used to securely dispose of systems; media; and data when they are no longer needed?
Are security testing (e;g; penetration testing; vulnerability scanning) procedures defined and executed against production systems?
Controls related to securing software applications; APIs; and the development process.
Are secure coding practices enforced and required for all application development activities?
Is static application security testing (SAST) performed on application source code prior to deployment?
Is dynamic application security testing (DAST) or equivalent runtime analysis performed on web applications?
Are controls implemented to validate and sanitize all user input to prevent injection attacks and other flaws?
Are measures implemented to prevent Cross-Site Scripting (XSS) in all web applications?
Are controls implemented to prevent SQL Injection and other command injection attacks in the application layer?
Is a secure mechanism implemented for application error handling to prevent the disclosure of sensitive system information?
Is a policy in place governing the use of open-source and third-party software components; including vulnerability monitoring?
Are APIs secured using robust authentication; authorization; and rate limiting controls?
Are containers and container images hardened and scanned for vulnerabilities and misconfigurations prior to deployment?
Are security controls tailored and applied to serverless functions; including strict access controls and execution monitoring?
Are mobile applications secured through specific testing; code review; and secure storage practices?
Controls for verifying user identity and managing authorized access to resources.
Is a formal access control policy based on the principle of least privilege defined and enforced?
Is multi-factor authentication (MFA) required for remote access and for privileged administrative accounts?
Is a documented process in place for managing the full lifecycle of user accounts; including timely deprovisioning?
Are user privileges regularly reviewed and restricted to the minimum required for job function?
Are privileged accounts and their access strongly controlled and monitored using a dedicated management solution (PAM)?
Is a centralized authentication and authorization mechanism (e;g; SSO; IAM) used across applications where feasible?
Is logging and monitoring of all user access and authentication events performed and retained?
Controls for securing the network perimeter; internal network traffic; and data in transit.
Is network access controlled and protected by firewalls and other boundary protection devices?
Are Intrusion Detection/Prevention Systems (IDPS) deployed and actively monitored to detect and prevent malicious network activity?
Are security measures implemented for all wireless networks; including strong encryption and authentication?
Is a secure Virtual Private Network (VPN) required for remote administrative access to internal resources?
Is encryption (e;g; TLS/SSL) used to protect sensitive data transmitted over public networks?
Are high-risk or publicly accessible services isolated within a DMZ or similar network segment?
Is a strategy implemented to protect public-facing services from Distributed Denial of Service (DDoS) attacks?
Controls for securing operating systems; applications; and endpoints.
Are security configuration baselines applied to all operating systems; applications; and network devices?
Is a formal and timely patch management program enforced for operating systems and applications?
Is anti-malware and endpoint detection and response (EDR) software deployed and actively managed on all relevant systems?
Are system-level logging and audit trails enabled; configured to capture security-relevant events; and reviewed regularly?
Is sensitive data protected by encryption when stored on systems (data-at-rest)?
Is a configuration management system or tool used to maintain and enforce security baselines across the infrastructure?
Controls for detecting; responding to; and recovering from security incidents.
Is a formally documented Incident Response Plan (IRP) in place and communicated to relevant personnel?
Is there a defined procedure for conducting forensic investigations that ensures the preservation of evidence and chain of custody?
Are security events continuously monitored and analyzed using a centralized system (e;g; SIEM)?
Are incident response capabilities regularly tested via drills; simulations; or tabletop exercises?
Is a proactive vulnerability management program in place that includes scanning; prioritization; and remediation tracking?
Are threat intelligence feeds or services used to inform and improve security monitoring and incident response processes?
Controls for identifying; assessing; treating; and overseeing information security risks.
Is a formal; documented risk management framework used to identify; analyze; and treat information security risks?
Is there an established governance structure (e;g; steering committee; executive oversight) for information security?
Is a formal process defined for requesting; reviewing; and approving exceptions to security policies?
Are internal and/or external audits and assessments of the security program conducted on a periodic basis?
Are processes in place to ensure compliance with relevant legal; statutory; and regulatory requirements?
Is security due diligence conducted for all major organizational changes; such as mergers; acquisitions; or divestitures?
Controls for planning and managing the continuation of business functions during and after a disruption.
Is a Business Impact Analysis (BIA) performed to determine critical business processes and their recovery requirements?
Is a documented Disaster Recovery Plan (DRP) in place to restore critical IT infrastructure and systems?
Is a data backup strategy defined; and are backups performed; secured; and regularly tested for restorability?
Are the Business Continuity and Disaster Recovery plans regularly tested; reviewed; and updated?
Is a comprehensive Business Continuity Plan (BCP) in place to maintain essential business functions during an extended disruption?
Controls for protecting personal data and ensuring compliance with privacy regulations.
Is a formal privacy policy defined and implemented that addresses the collection; use; and disclosure of personal data?
Is a detailed inventory and mapping of all personal data maintained; including where it is stored and processed?
Are Data Protection Impact Assessments (DPIAs) conducted for new projects involving the processing of personal data?
Is a data retention and secure disposal policy enforced for all forms of data; including personal information?
Are data minimization techniques employed to limit the collection and retention of personal data to what is strictly necessary?
Are controls and contractual obligations in place for the secure sharing of personal data with third parties?
Is a data breach notification policy and procedure in place that complies with applicable regulations?
Is privacy-specific training provided to employees who handle personal data?
Is a mechanism implemented for managing and recording user consent where required for data processing activities?
Controls specific to securing cloud computing environments and services.
Is a Cloud Security Policy in place that defines responsibilities and controls for cloud service usage?
Is a formal process used for managing identities; access; and permissions within the cloud environment (IAM)?
Are cloud service configurations continuously monitored and enforced against security baselines (CSPM)?
Are cloud-hosted data stores (e;g; databases; object storage) encrypted and securely configured?
Are cloud provider logs and activity records (e;g; API calls; resource changes) centralized and monitored for security events?
Controls for managing the security risks associated with third-party service providers.
Is a formal vendor risk management (VRM) program established for assessing and managing third-party risks?
Is a security assessment (e;g; HECVAT; SOC 2) performed for all vendors who handle or access sensitive data?
Are contractual agreements in place that clearly define the third-party's security and data protection responsibilities?
Is a secure offboarding process followed to terminate third-party access and ensure data return/destruction upon contract end?
Are key third-party security controls and compliance postures monitored on an ongoing or periodic basis?
Controls for securing the underlying IT infrastructure; including servers and virtualization.
Is a defined security baseline applied to all core infrastructure components (e;g; servers; databases; middleware)?
Is Network Access Control (NAC) or equivalent technology used to verify the security state of devices connecting to the network?
Are security configurations and segmentation applied to virtualization technologies and hypervisors?
Are remote management interfaces (e;g; SSH; RDP) secured; monitored; and restricted to necessary personnel and systems?
Are environmental controls (e;g; power; cooling; fire suppression) monitored and maintained for physical infrastructure locations?
Controls for ensuring IT resources are accessible to people with disabilities.
Is there a formally documented IT Accessibility Policy that includes adherence to WCAG or similar standards?
Are formal procedures in place for testing the accessibility of new and existing IT resources?
Are accessibility requirements included in the procurement process for new IT systems and services?
Is a clear and accessible process provided for users to report accessibility issues or request accommodations?
Controls for managing the unique risks related to Artificial Intelligence and Machine Learning systems.
Is a documented AI/ML governance framework established to manage risks associated with AI development and deployment?
Is a risk assessment conducted for each AI/ML model to identify potential biases; fairness issues; and societal impacts?
Is a Data Provenance and Quality Standard established for training data used by AI/ML models?
Are mechanisms implemented to ensure the explainability and interpretability of AI/ML model decisions where necessary?
Are security testing procedures (e;g; adversarial attacks) conducted to assess the robustness and security of AI/ML models?
Controls only applicable when specific types of regulated data or activities are involved.
Are controls implemented to comply with specific regulatory requirements; such as HIPAA for protected health information?
Are controls implemented to comply with specific regulatory requirements; such as PCI DSS for cardholder data?
Are controls implemented to comply with specific regulatory requirements; such as FERPA for student educational records?
Are controls implemented to comply with specific regulatory requirements; such as GDPR for personal data of EU residents?
Additional controls required for high-risk systems; high-value assets; or highly sensitive data environments.
Are specialized monitoring controls implemented to detect and prevent unauthorized data exfiltration or transfer of sensitive data?
Is a Zero Trust Architecture (ZTA) or similar network/access control model actively being implemented or in use?
Are advanced threat simulations (e;g; Red Team exercises) conducted to test the organization's defense and response capabilities?
Is a formal threat modeling methodology used to identify and mitigate risks to high-value assets and critical processes?
Is there a dedicated; fully staffed Security Operations Center (SOC) or equivalent 24/7 security monitoring function?