IC

DPDP Readiness Assessment

Digital Personal Data Protection Act, 2023 ยท ISO 27001 ยท RBI IT Framework

TECH PRESCIENT ยท IDENTITY CONFLUENCE

0%READINESS
๐Ÿ”ด High Risk โ€“ Non-Compliant

0 / 53 answered

0 high-risk gaps

โš ๏ธ Top Gaps (Prioritize)
Unanswered
Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
Governance & Accountability

Are responsibilities for access governance formally assigned?

๐Ÿ”
Showing 53 of 53
S1-Q1โš–๏ธ Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
S1-Q2โš–๏ธ Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
S1-Q3โš–๏ธ Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
S1-Q4โš–๏ธ Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
S1-Q5โš–๏ธ Governance & Accountability

Are responsibilities for access governance formally assigned?

Unanswered
S1-Q6โš–๏ธ Governance & Accountability

Is risk-based identity governance adopted (policy + risk ownership)?

Unanswered
S1-Q7โš–๏ธ Governance & Accountability

Are employees trained on privacy / data handling at least annually?

Unanswered
S2-Q1๐Ÿ” Identity & Access Governance

Is RBAC implemented across critical systems handling personal data?

Unanswered
S2-Q2๐Ÿ” Identity & Access Governance

Are access requests formally approved through workflow?

Unanswered
S2-Q3๐Ÿ” Identity & Access Governance

Is periodic User Access Review (UAR) conducted for key applications?

Unanswered
S2-Q4๐Ÿ” Identity & Access Governance

Is access certification automated and tracked to completion?

Unanswered
S2-Q5๐Ÿ” Identity & Access Governance

Are privileged users separately governed with stricter controls?

Unanswered
S2-Q6๐Ÿ” Identity & Access Governance

Are Segregation of Duties (SoD) rules defined and enforced?

Unanswered
S2-Q7๐Ÿ” Identity & Access Governance

Are temporary access grants time-bound with automatic expiry?

Unanswered
S2-Q8๐Ÿ” Identity & Access Governance

Is access granted based on least privilege by default?

Unanswered
S3-Q1๐Ÿ”„ Identity Lifecycle Management

Is joiner-mover-leaver automation implemented (core apps)?

Unanswered
S3-Q2๐Ÿ”„ Identity Lifecycle Management

Is deprovisioning automated upon exit/termination?

Unanswered
S3-Q3๐Ÿ”„ Identity Lifecycle Management

Is deprovisioning SLA monitored and reported?

Unanswered
S3-Q4๐Ÿ”„ Identity Lifecycle Management

Are dormant accounts automatically detected (incl. admins)?

Unanswered
S3-Q5๐Ÿ”„ Identity Lifecycle Management

Are orphan accounts identified and remediated?

Unanswered
S3-Q6๐Ÿ”„ Identity Lifecycle Management

Are non-human identities (service accounts, bots, API keys) governed?

Unanswered
S3-Q7๐Ÿ”„ Identity Lifecycle Management

Are periodic cleanup campaigns executed for unused entitlements?

Unanswered
S4-Q1๐Ÿ‘๏ธ Monitoring & Audit Readiness

Are identity-linked access logs retained centrally for critical systems?

Unanswered
S4-Q2๐Ÿ‘๏ธ Monitoring & Audit Readiness

Is privileged activity monitored with alerts for high-risk actions?

Unanswered
S4-Q3๐Ÿ‘๏ธ Monitoring & Audit Readiness

Can audit evidence be generated within 24 hours for regulator requests?

Unanswered
S4-Q4๐Ÿ‘๏ธ Monitoring & Audit Readiness

Are certification logs preserved with approvals and timestamps?

Unanswered
S4-Q5๐Ÿ‘๏ธ Monitoring & Audit Readiness

Is SIEM integrated with identity/access context (user, role, entitlement)?

Unanswered
S4-Q6๐Ÿ‘๏ธ Monitoring & Audit Readiness

Is identity risk scoring implemented (privilege + behavior + anomalies)?

Unanswered
S4-Q7๐Ÿ‘๏ธ Monitoring & Audit Readiness

Are logs protected against tampering (immutability / WORM / controls)?

Unanswered
S5-Q1๐Ÿงพ Data Principal Rights Enablement

Can the organization map an individual across all systems processing their personal data?

Unanswered
S5-Q2๐Ÿงพ Data Principal Rights Enablement

Is identity-to-application traceability available (who has access where)?

Unanswered
S5-Q3๐Ÿงพ Data Principal Rights Enablement

Can access history be generated per individual (who/what/when)?

Unanswered
S5-Q4๐Ÿงพ Data Principal Rights Enablement

Is there a process to revoke access upon data erasure requests?

Unanswered
S5-Q5๐Ÿงพ Data Principal Rights Enablement

Are third-party/outsourced systems included in traceability mapping?

Unanswered
S5-Q6๐Ÿงพ Data Principal Rights Enablement

Is there a defined SLA and workflow for handling data principal requests?

Unanswered
S6-Q1๐Ÿฆ RBI / BFSI Expectations

Is access review conducted at least quarterly for critical systems?

Unanswered
S6-Q2๐Ÿฆ RBI / BFSI Expectations

Is privileged access reviewed more frequently (monthly/bi-weekly) for Tier-0 systems?

Unanswered
S6-Q3๐Ÿฆ RBI / BFSI Expectations

Are vendor identities tagged, controlled, and monitored separately?

Unanswered
S6-Q4๐Ÿฆ RBI / BFSI Expectations

Is outsourced access governed centrally with approvals and logging?

Unanswered
S6-Q5๐Ÿฆ RBI / BFSI Expectations

Is risk-based authentication adopted for sensitive access paths?

Unanswered
S6-Q6๐Ÿฆ RBI / BFSI Expectations

Are audit logs retained per RBI expectations and readily retrievable?

Unanswered
S7-Q1๐Ÿค Third-Party & Vendor Risk

Are third-party user accounts centrally tracked and owned?

Unanswered
S7-Q2๐Ÿค Third-Party & Vendor Risk

Is third-party access time-bound and automatically revoked?

Unanswered
S7-Q3๐Ÿค Third-Party & Vendor Risk

Are vendor accounts included in periodic certifications?

Unanswered
S7-Q4๐Ÿค Third-Party & Vendor Risk

Is third-party activity monitored and reviewed?

Unanswered
S7-Q5๐Ÿค Third-Party & Vendor Risk

Are security clauses / NDAs tied to provisioning and access recertification?

Unanswered
S7-Q6๐Ÿค Third-Party & Vendor Risk

Is least privilege enforced for vendor support access (break-glass where needed)?

Unanswered
S8-Q1โš ๏ธ Risk & Incident Preparedness

Are anomalous access patterns detected (impossible travel, unusual time, unknown device)?

Unanswered
S8-Q2โš ๏ธ Risk & Incident Preparedness

Are privilege escalations flagged and reviewed quickly?

Unanswered
S8-Q3โš ๏ธ Risk & Incident Preparedness

Is geo-velocity or risky location monitoring implemented for key apps?

Unanswered
S8-Q4โš ๏ธ Risk & Incident Preparedness

Is breach containment linked to rapid identity revocation (kill switch)?

Unanswered
S8-Q5โš ๏ธ Risk & Incident Preparedness

Are privileged access reviews performed post-incident?

Unanswered
S8-Q6โš ๏ธ Risk & Incident Preparedness

Is there a documented incident response playbook that includes identity controls?

Unanswered
Overall Notes

Included in JSON export.

Powered by Identity Confluence โ€” DPDP-Ready Identity Governance Platform by Tech Prescient

Pune, India ยท Frisco, TX ยท techprescient.com