Join Tech Prescient at Dine with AlphaSec III | 17 April 2026, Mumbai.

DPDP Readiness Assessment

Digital Personal Data Protection Act, 2023 · ISO 27001 · RBI IT Framework

0%READINESS
🔴 High Risk – Non-Compliant

0 / 53 answered

0 high-risk gaps

⚠️ Top Gaps (Prioritize)

Unanswered
Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
Governance & Accountability

Are responsibilities for access governance formally assigned?

🔍
Showing 53 of 53
S1-Q1⚖️ Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
S1-Q2⚖️ Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
S1-Q3⚖️ Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
S1-Q4⚖️ Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
S1-Q5⚖️ Governance & Accountability

Are responsibilities for access governance formally assigned?

Unanswered
S1-Q6⚖️ Governance & Accountability

Is risk-based identity governance adopted (policy + risk ownership)?

Unanswered
S1-Q7⚖️ Governance & Accountability

Are employees trained on privacy / data handling at least annually?

Unanswered
S2-Q1🔐 Identity & Access Governance

Is RBAC implemented across critical systems handling personal data?

Unanswered
S2-Q2🔐 Identity & Access Governance

Are access requests formally approved through workflow?

Unanswered
S2-Q3🔐 Identity & Access Governance

Is periodic User Access Review (UAR) conducted for key applications?

Unanswered
S2-Q4🔐 Identity & Access Governance

Is access certification automated and tracked to completion?

Unanswered
S2-Q5🔐 Identity & Access Governance

Are privileged users separately governed with stricter controls?

Unanswered
S2-Q6🔐 Identity & Access Governance

Are Segregation of Duties (SoD) rules defined and enforced?

Unanswered
S2-Q7🔐 Identity & Access Governance

Are temporary access grants time-bound with automatic expiry?

Unanswered
S2-Q8🔐 Identity & Access Governance

Is access granted based on least privilege by default?

Unanswered
S3-Q1🔄 Identity Lifecycle Management

Is joiner-mover-leaver automation implemented (core apps)?

Unanswered
S3-Q2🔄 Identity Lifecycle Management

Is deprovisioning automated upon exit/termination?

Unanswered
S3-Q3🔄 Identity Lifecycle Management

Is deprovisioning SLA monitored and reported?

Unanswered
S3-Q4🔄 Identity Lifecycle Management

Are dormant accounts automatically detected (incl. admins)?

Unanswered
S3-Q5🔄 Identity Lifecycle Management

Are orphan accounts identified and remediated?

Unanswered
S3-Q6🔄 Identity Lifecycle Management

Are non-human identities (service accounts, bots, API keys) governed?

Unanswered
S3-Q7🔄 Identity Lifecycle Management

Are periodic cleanup campaigns executed for unused entitlements?

Unanswered
S4-Q1👁️ Monitoring & Audit Readiness

Are identity-linked access logs retained centrally for critical systems?

Unanswered
S4-Q2👁️ Monitoring & Audit Readiness

Is privileged activity monitored with alerts for high-risk actions?

Unanswered
S4-Q3👁️ Monitoring & Audit Readiness

Can audit evidence be generated within 24 hours for regulator requests?

Unanswered
S4-Q4👁️ Monitoring & Audit Readiness

Are certification logs preserved with approvals and timestamps?

Unanswered
S4-Q5👁️ Monitoring & Audit Readiness

Is SIEM integrated with identity/access context (user, role, entitlement)?

Unanswered
S4-Q6👁️ Monitoring & Audit Readiness

Is identity risk scoring implemented (privilege + behavior + anomalies)?

Unanswered
S4-Q7👁️ Monitoring & Audit Readiness

Are logs protected against tampering (immutability / WORM / controls)?

Unanswered
S5-Q1🧾 Data Principal Rights Enablement

Can the organization map an individual across all systems processing their personal data?

Unanswered
S5-Q2🧾 Data Principal Rights Enablement

Is identity-to-application traceability available (who has access where)?

Unanswered
S5-Q3🧾 Data Principal Rights Enablement

Can access history be generated per individual (who/what/when)?

Unanswered
S5-Q4🧾 Data Principal Rights Enablement

Is there a process to revoke access upon data erasure requests?

Unanswered
S5-Q5🧾 Data Principal Rights Enablement

Are third-party/outsourced systems included in traceability mapping?

Unanswered
S5-Q6🧾 Data Principal Rights Enablement

Is there a defined SLA and workflow for handling data principal requests?

Unanswered
S6-Q1🏦 RBI / BFSI Expectations

Is access review conducted at least quarterly for critical systems?

Unanswered
S6-Q2🏦 RBI / BFSI Expectations

Is privileged access reviewed more frequently (monthly/bi-weekly) for Tier-0 systems?

Unanswered
S6-Q3🏦 RBI / BFSI Expectations

Are vendor identities tagged, controlled, and monitored separately?

Unanswered
S6-Q4🏦 RBI / BFSI Expectations

Is outsourced access governed centrally with approvals and logging?

Unanswered
S6-Q5🏦 RBI / BFSI Expectations

Is risk-based authentication adopted for sensitive access paths?

Unanswered
S6-Q6🏦 RBI / BFSI Expectations

Are audit logs retained per RBI expectations and readily retrievable?

Unanswered
S7-Q1🤝 Third-Party & Vendor Risk

Are third-party user accounts centrally tracked and owned?

Unanswered
S7-Q2🤝 Third-Party & Vendor Risk

Is third-party access time-bound and automatically revoked?

Unanswered
S7-Q3🤝 Third-Party & Vendor Risk

Are vendor accounts included in periodic certifications?

Unanswered
S7-Q4🤝 Third-Party & Vendor Risk

Is third-party activity monitored and reviewed?

Unanswered
S7-Q5🤝 Third-Party & Vendor Risk

Are security clauses / NDAs tied to provisioning and access recertification?

Unanswered
S7-Q6🤝 Third-Party & Vendor Risk

Is least privilege enforced for vendor support access (break-glass where needed)?

Unanswered
S8-Q1⚠️ Risk & Incident Preparedness

Are anomalous access patterns detected (impossible travel, unusual time, unknown device)?

Unanswered
S8-Q2⚠️ Risk & Incident Preparedness

Are privilege escalations flagged and reviewed quickly?

Unanswered
S8-Q3⚠️ Risk & Incident Preparedness

Is geo-velocity or risky location monitoring implemented for key apps?

Unanswered
S8-Q4⚠️ Risk & Incident Preparedness

Is breach containment linked to rapid identity revocation (kill switch)?

Unanswered
S8-Q5⚠️ Risk & Incident Preparedness

Are privileged access reviews performed post-incident?

Unanswered
S8-Q6⚠️ Risk & Incident Preparedness

Is there a documented incident response playbook that includes identity controls?

Unanswered

Overall Notes

Included in JSON export.

Tech Prescient
We unleash growth by helping our customers become data driven and secured with our Data and Identity solutions.
Social - Linkedin IconSocial - Linkedin Icon
Social - RSS Feed IconSocial - RSS Feed Icon
Social - Instagram IconSocial - Instagram Icon
Social - Youtube IconSocial - Youtube Icon
Social - Facebook IconSocial - Facebook Icon
Glassdoor
Become a part of our big family to inspire and get
inspired by professional experts.

OUR PARTNERS

AWS Partner
Azure Partner
Okta Partner
Databricks Partner

© 2017 - 2026 | Tech Prescient | All rights reserved.

Tech Prescient
Social - Linkedin IconSocial - Linkedin Icon
Social - RSS Feed IconSocial - RSS Feed Icon
Social - Instagram IconSocial - Instagram Icon
Social - Youtube IconSocial - Youtube Icon
Social - Facebook IconSocial - Facebook Icon
We unleash growth by helping our customers become data driven and secured with our Data and Identity solutions.
OUR PARTNERS
AWS Partner
Okta Partner
Azure Partner
Databricks Partner
Glassdoor
Become a part of our big family to inspire and get
inspired by professional experts.

© 2017 - 2026 | Tech Prescient | All rights reserved.
Tech Prescient
Social - Linkedin IconSocial - Linkedin Icon
Social - RSS Feed IconSocial - RSS Feed Icon
Social - Instagram IconSocial - Instagram Icon
Social - Youtube IconSocial - Youtube Icon
Social - Facebook IconSocial - Facebook Icon
We unleash growth by helping our customers become data driven and secured with our Data and Identity solutions.
OUR PARTNERS
AWS Partner
Azure Partner
Databricks Partner
Okta Partner
Glassdoor
Become a part of our big family to inspire and get
inspired by professional experts.

© 2017 - 2026 | Tech Prescient | All rights reserved.