logo

SIG Lite


Summary

The Standardized Information Gathering (Questionnaire) (SIG) Lite is a repository of third-party information security and privacy questions, indexed to multiple regulations, and control frameworks, curated by Shared Assessments. SIG Lite takes the high-level concepts and questions from the larger SIG assessments, distilling them down to a few questions. The version used in this section is SIG Lite 2019.


Definitions

DefinitionRequirements
SIGLITE-SL_18. Are there regular privacy risk assessments conducted?
SIGLITE-SL_23. Is there an information security policy that has been approved by management and an owner to maintain and review the policy?
SIGLITE-SL_30. Are encryption tools managed and maintained for Scoped Data?
SIGLITE-SL_31. Are clients provided with the ability to generate a unique encryption key?
SIGLITE-SL_34. Are clients provided with the ability to rotate their encryption key on a scheduled basis?
SIGLITE-SL_33. Are staff able to access client Scoped Data in an unencrypted state?
SIGLITE-SL_45. Termination or change of status process?
SIGLITE-SL_46. Are background checks performed for Service Provider Contractors and Subcontractors?
SIGLITE-SL_65. Is there a process to ensure clients are notified prior to changes being made which may impact their service?
SIGLITE-SL_70. Are individual IDs required for user authentication to applications, operating systems, databases and network devices?
SIGLITE-SL_71. Are passwords used?
SIGLITE-SL_72. Is there a password policy for systems that transmit, process or store data that has been approved by management on all platforms?
SIGLITE-SL_73. Is remote access permitted?
SIGLITE-SL_75. Is two factor authentication required to access the production environment containing scoped data?
SIGLITE-SL_76. Are staff able to access client scoped data?
SIGLITE-SL_78. Are applications used to transmit, process or store scoped data?
SIGLITE-SL_79. Is a web site supported, hosted or maintained that has access to scoped systems and data?
SIGLITE-SL_81. Is HTTPS enabled for all web pages used as part of the scoped service?
SIGLITE-SL_85. Operating system and application logs relevant to supporting incident investigation protected against modification, deletion, and/or inappropriate access?
SIGLITE-SL_88. Is development, test, and staging environment separate from the production environment?
SIGLITE-SL_89. Is there a formal Software Development Life Cycle (SDLC) process?
SIGLITE-SL_90. Are change control procedures required for all changes to the production environment?
SIGLITE-SL_98. Are mobile applications that access scoped systems and data developed?
SIGLITE-SL_110. Are there any dependencies on critical third party service providers?
SIGLITE-SL_131. Are end user devices used for transmitting, processing or storing scoped data?
SIGLITE-SL_142. Is there a mobile device management solution in place?
SIGLITE-SL_148. Is there a process that requires security approval to allow external networks to connect to the company network, and enforces the least privilege necessary?
SIGLITE-SL_151. Are wireless networking devices connected to networks containing scoped systems and data?
SIGLITE-SL_154. Do agreements with third parties who have access or potential access to scoped data, address confidentiality, audit, security, and privacy, including but not limited to incident response, monitoring, data sharing and secure disposal of scoped data?
SIGLITE-SL_160. Do agreements with third parties who have access or potential access to scoped data, address confidentiality, audit, security, and privacy, including but not limited to incident response, monitoring, data sharing and secure disposal of scoped data?
SIGLITE-SL_162. Is there an anti-malware program that has been approved by management, communicated to appropriate constituents and an owner to maintain?

Last updated

2025/07/23