logo

SIG Core


Summary

The Standardized Information Gathering (Questionnaire) (SIG) is a repository of third-party information security and privacy questions, indexed to multiple regulations and control frameworks, curated by Shared Assessments. The SIG gathers pertinent information to determine how security risks are managed across a spectrum of 18 risk control areas, or domains, within a service provider's environment. It was developed to enable a service provider to compile complete information about these risk domains in one document. As a core questionnaire, its objective is to provide a risk assessment for businesses in all industries. The version used in this section is SIG 2019.


Definitions

DefinitionRequirements
SIG-A_4_1_8. Risk assessment and treatment
SIG-B_1. Security policy
SIG-B_1_1. Security policy
SIG-D_1_1_2. Asset and information management
SIG-D_4_4. Asset and information management
SIG-D_4_4_1. Asset and information management
SIG-D_4_4_2. Asset and information management
SIG-D_4_4_4. Asset and information management
SIG-D_6_1. Asset and information management
SIG-D_6_5. Asset and information management
SIG-D_6_6. Asset and information management
SIG-D_6_7. Asset and information management
SIG-D_6_9_1. Asset and information management
SIG-D_6_11. Asset and information management
SIG-D_6_11_1. Asset and information management
SIG-D_6_11_2. Asset and information management
SIG-D_6_13. Asset and information management
SIG-D_6_13_1. Asset and information management
SIG-D_9_2. Asset and information management
SIG-F_1_4_2. Physical and environmental security
SIG-G_2_10_2. Operations management
SIG-G_3_4. Operations management
SIG-G_4. Operations management
SIG-H_1_2. Access control
SIG-H_2. Access control
SIG-H_2_1. Access control
SIG-H_2_3. Access control
SIG-H_2_11. Access control
SIG-H_2_12. Access control
SIG-H_2_14. Access control
SIG-H_2_15. Access control
SIG-H_3. Access control
SIG-H_3_1_5. Access control
SIG-H_3_1_6. Access control
SIG-H_3_1_8. Access control
SIG-H_3_1_9. Access control
SIG-H_3_1_14. Access control
SIG-H_3_1_15. Access control
SIG-H_3_1_16. Access control
SIG-H_3_1_17. Access control
SIG-H_3_1_19. Access control
SIG-H_3_2. Access control
SIG-H_3_3. Access control
SIG-H_3_3_1. Access control
SIG-H_3_4. Access control
SIG-H_3_7. Access control
SIG-H_4. Access control
SIG-H_4_1. Access control
SIG-H_4_2. Access control
SIG-H_4_6_1. Access control
SIG-H_4_6_3. Access control
SIG-H_6_1. Access control
SIG-I_1_3_1. Application security
SIG-I_1_3_2. Application security
SIG-I_1_6. Application security
SIG-I_1_9. Application security
SIG-I_1_11. Application security
SIG-I_1_14. Application security
SIG-I_1_16. Application security
SIG-I_1_18_3. Application security
SIG-I_1_19_2. Application security
SIG-I_1_19_3. Application security
SIG-I_1_20. Application security
SIG-I_2_1. Application security
SIG-I_2_6. Application security
SIG-I_2_7_1. Application security
SIG-I_2_9_4. Application security
SIG-I_3_2_1. Application security
SIG-I_3_2_4. Application security
SIG-I_3_2_4_1. Application security
SIG-I_3_2_4_2. Application security
SIG-I_3_2_5. Application security
SIG-I_3_2_5_1. Application security
SIG-I_3_2_7. Application security
SIG-I_3_2_10. Application security
SIG-I_3_4_6. Application security
SIG-L_1. Compliance
SIG-L_2_1. Compliance
SIG-L_11_1. Compliance
SIG-M_1_2. End user device security
SIG-M_1_5. End user device security
SIG-M_1_10. End user device security
SIG-M_1_14. End user device security
SIG-M_1_25. End user device security
SIG-N_1_3. Network security
SIG-N_1_4. Network security
SIG-N_1_7. Network security
SIG-N_1_9. Network security
SIG-N_1_11. Network security
SIG-N_1_12. Network security
SIG-N_1_13. Network security
SIG-N_1_15_4. Network security
SIG-N_1_15_5. Network security
SIG-P_1_3_1. Privacy
SIG-P_1_5_3. Privacy
SIG-P_2. Privacy
SIG-P_2_1. Privacy
SIG-P_2_4. Privacy
SIG-P_3_1. Privacy
SIG-P_3_3. Privacy
SIG-P_4_1. Privacy
SIG-P_5_1. Privacy
SIG-P_5_3. Privacy
SIG-P_6. Privacy
SIG-P_7_1. Privacy
SIG-P_8_2. Privacy
SIG-P_8_5. Privacy
SIG-U_1_2. Server security
SIG-U_1_2_1. Server security
SIG-U_1_2_2. Server security
SIG-U_1_2_4. Server security
SIG-U_1_2_5. Server security
SIG-U_1_4. Server security
SIG-U_1_4_2. Server security
SIG-U_1_6_1. Server security
SIG-U_1_6_2. Server security
SIG-U_1_8_1. Server security
SIG-U_1_9_8. Server security
SIG-U_1_9_9. Server security
SIG-U_1_9_11. Server security
SIG-U_1_9_12. Server security
SIG-U_1_9_13. Server security
SIG-U_1_9_15. Server security
SIG-U_1_9_16. Server security
SIG-U_1_9_18. Server security
SIG-U_1_9_20. Server security
SIG-U_1_9_27. Server security
SIG-U_1_10_5. Server security

Last updated

2024/02/09