Alliance BPO - Security Trust Center
Alliance BPO - Trust Center
Compliance and Security Portal for Alliance BPO.
Visit Alliance BPO
Monitored by Comp AI
Request Access
Security Questionnaire
Compliance overview
An overview of the compliance status of Alliance BPO across common frameworks like SOC 2, ISO 27001, ISO 9001, and GDPR.
ISO 27001
Compliant
27
Policies
An up to date list of policies published internally by Alliance BPO.
Remote Access & BYOD
Data Classification & Handling
Incident Response & Breach Notification
Sanctions & Disciplinary
Information Sharing & Transfer
Backup, Business Continuity & Disaster Recovery
Secure Software Development Lifecycle
Privacy & Data-Subject Rights
Encryption & Crypto Controls
Change Management Policy
Security & Privacy Awareness Training
Authentication & Password
Change & Release Management
Third-Party Processors (Vendors)
Physical Security & Environmental
GDPR
Compliant
HIPAA
Compliant
SOC 2 Type 2
Compliant
PCI DSS
Compliant
Vulnerability & Patch Management
Retention & Secure Disposal
Access Control & Least Privilege
Policy Management & Exception Handling
Acceptable Use & Workstation Security
Logging, Monitoring & Audit
Vendor & Third-Party Risk
Background Screening & On/Off-boarding
Compliance & Regulatory Monitoring
Risk Management
Secure Configuration & Hardening
Information Security & Privacy Governance
41
Controls
An up to date list of controls published internally by Alliance BPO.
Public Policies
Secure Devices
Planning
Diagramming
Review Policies
Utility Monitoring
Data Masking
Attestation of Compliance
Appoint or Review Data Protection Officer
Code Changes
Backup Restoration Test
Production Firewall & No-Public-Access Controls
Organisation Chart
Access Review Log
Role-based Access Controls
Encryption at Rest
Employee Performance Evaluations
Infrastructure Inventory
Monitoring & Alerting
Incident Response
Device List
TLS / HTTPS
Secure Code
Contact Information
Employee Descriptions
Sanitized Inputs
Employee Verification
2FA
App Availability
Secure Secrets
Employee Access
Manage Third-party and EU Representative Relationships
Map and Review Data Flow & Inventory
Records of Processing Activities
Maintain a Breach Response Plan & Train Staff
Perform Security Reviews & Audits
Update Privacy Notices & Policies
Conduct Data Protection Impact Assessments
Reassess Legal Basis for Processing
Handle Data Subject Rights Requests
Review International Data Transfers