Controls
Monitor and manage security controls
Total Controls
19
Failing
18
Passing
1
Avg Health Score
6%
Critical
Application Deployment Health Production application deployments must succeed. Failed depl… | Application Security | SOC 2 CC8.1 | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
AWS Config Continuous Compliance AWS Config must be enabled with conformance packs to continu… | Configuration Management | CIS AWS Benchmark 3.5 | Not tested | Failing | Automated | Ashish Mathur | Mar 16, 2026 | ||
Data Protection Officer Appointment A DPO/Privacy Lead must be appointed as the internal owner f… | Privacy Governance | DPDP Act 2023 — Immediate | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Consent Management & Purpose Limitation Implement DPDP-compliant granular consent flows with freely-… | Privacy Governance | DPDP Act 2023 — 12 Month | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Data Subject Rights (Data Principal Rights) Provide mechanisms for verified individuals to exercise acce… | Privacy Governance | DPDP Act 2023 — 18 Month | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Breach Notification (72-Hour) Data Fiduciaries must notify the Data Protection Board withi… | Incident Response | DPDP Act 2023 — DPDP Rules 2025 | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Mandatory Encryption & Data Security Encryption, masking, pseudonymization, and tokenization are … | Data Protection | DPDP Act 2023 — DPDP Rules 2025 | Not tested | Failing | Automated | Ashish Mathur | Mar 16, 2026 | ||
Data Retention & Automated Deletion Define retention timelines and implement automated deletion/… | Data Lifecycle | DPDP Act 2023 — 18 Month | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Vendor & Third-Party Processor Compliance Create RoPA-style inventory of all data processors. Update M… | Third-Party Risk | DPDP Act 2023 — 12 Month | Not tested | Failing | Manual | Ashish Mathur | Mar 16, 2026 | ||
Encryption Key Management Customer-managed KMS keys must be provisioned with automatic… | Data Protection | CIS AWS Benchmark 2.8 | Not tested | Failing | Automated | Ashish Mathur | Mar 16, 2026 |