2.1.
Officers: Provider shall appoint Information Security, Data Protection and AI Compliance officers.
2.2.
Security policy: Provider shall maintain an internal security policy that will include the internal controls and policies listed in this Addendum ("Security Policy").
2.3.
Personnel training: All personnel with access to production systems must review and approve the Security Policy and re-review it at least once per annum.
2.4.
Personnel confidentiality: All personnel with access to production systems must be subject to confidentiality undertakings or appropriate statutory obligations of confidentiality.
2.5.
Security ledger: Provider shall document, in a ledger, application or otherwise, critical security information, including production access permissions, security incidents and external reviews.
2.6.
Endpoint security: All computers with access to production resources are required to: (a) run an approved ESS (Endpoint Security Software), (b) comply with Provider password policy, (c) be configured to automatically lock when inactive, (d) be physically locked when not used.
2.7.
Production separation: Separate production and non-production environments.
2.8.
Access management: Access to production systems should comply with the following: (a) Enable MFA, (b) Apply least privilege access principles, so that access is granted only to personnel who need it, with the minimal necessary permissions to perform their job functions, (c) Establish procedures for access revocation.
2.9.
Logging and monitoring: Provider shall collect logs and monitor the Software.
2.10.
Record keeping: Provider shall maintain records as required by applicable law.
2.11.
Business continuity: Provider shall maintain a business continuity plan that shall, at minimum, list key continuity risks and associated mitigations.