🔴 High Risk – Non-Compliant0 / 53 answered
0 high-risk gaps
⚠️ Top Gaps (Prioritize)
UnansweredGovernance & AccountabilityIs a Data Protection Officer (or equivalent role) formally appointed?
UnansweredGovernance & AccountabilityIs there a documented personal data governance policy?
UnansweredGovernance & AccountabilityIs DPDP compliance reviewed at board / executive level?
UnansweredGovernance & AccountabilityIs a personal data inventory (systems & data types) maintained centrally?
UnansweredGovernance & AccountabilityAre responsibilities for access governance formally assigned?
S1-Q1⚖️ Governance & Accountability
Is a Data Protection Officer (or equivalent role) formally appointed?
UnansweredS1-Q2⚖️ Governance & Accountability
Is there a documented personal data governance policy?
UnansweredS1-Q3⚖️ Governance & Accountability
Is DPDP compliance reviewed at board / executive level?
UnansweredS1-Q4⚖️ Governance & Accountability
Is a personal data inventory (systems & data types) maintained centrally?
UnansweredS1-Q5⚖️ Governance & Accountability
Are responsibilities for access governance formally assigned?
UnansweredS1-Q6⚖️ Governance & Accountability
Is risk-based identity governance adopted (policy + risk ownership)?
UnansweredS1-Q7⚖️ Governance & Accountability
Are employees trained on privacy / data handling at least annually?
UnansweredS2-Q1🔐 Identity & Access Governance
Is RBAC implemented across critical systems handling personal data?
UnansweredS2-Q2🔐 Identity & Access Governance
Are access requests formally approved through workflow?
UnansweredS2-Q3🔐 Identity & Access Governance
Is periodic User Access Review (UAR) conducted for key applications?
UnansweredS2-Q4🔐 Identity & Access Governance
Is access certification automated and tracked to completion?
UnansweredS2-Q5🔐 Identity & Access Governance
Are privileged users separately governed with stricter controls?
UnansweredS2-Q6🔐 Identity & Access Governance
Are Segregation of Duties (SoD) rules defined and enforced?
UnansweredS2-Q7🔐 Identity & Access Governance
Are temporary access grants time-bound with automatic expiry?
UnansweredS2-Q8🔐 Identity & Access Governance
Is access granted based on least privilege by default?
UnansweredS3-Q1🔄 Identity Lifecycle Management
Is joiner-mover-leaver automation implemented (core apps)?
UnansweredS3-Q2🔄 Identity Lifecycle Management
Is deprovisioning automated upon exit/termination?
UnansweredS3-Q3🔄 Identity Lifecycle Management
Is deprovisioning SLA monitored and reported?
UnansweredS3-Q4🔄 Identity Lifecycle Management
Are dormant accounts automatically detected (incl. admins)?
UnansweredS3-Q5🔄 Identity Lifecycle Management
Are orphan accounts identified and remediated?
UnansweredS3-Q6🔄 Identity Lifecycle Management
Are non-human identities (service accounts, bots, API keys) governed?
UnansweredS3-Q7🔄 Identity Lifecycle Management
Are periodic cleanup campaigns executed for unused entitlements?
UnansweredS4-Q1👁️ Monitoring & Audit Readiness
Are identity-linked access logs retained centrally for critical systems?
UnansweredS4-Q2👁️ Monitoring & Audit Readiness
Is privileged activity monitored with alerts for high-risk actions?
UnansweredS4-Q3👁️ Monitoring & Audit Readiness
Can audit evidence be generated within 24 hours for regulator requests?
UnansweredS4-Q4👁️ Monitoring & Audit Readiness
Are certification logs preserved with approvals and timestamps?
UnansweredS4-Q5👁️ Monitoring & Audit Readiness
Is SIEM integrated with identity/access context (user, role, entitlement)?
UnansweredS4-Q6👁️ Monitoring & Audit Readiness
Is identity risk scoring implemented (privilege + behavior + anomalies)?
UnansweredS4-Q7👁️ Monitoring & Audit Readiness
Are logs protected against tampering (immutability / WORM / controls)?
UnansweredS5-Q1🧾 Data Principal Rights Enablement
Can the organization map an individual across all systems processing their personal data?
UnansweredS5-Q2🧾 Data Principal Rights Enablement
Is identity-to-application traceability available (who has access where)?
UnansweredS5-Q3🧾 Data Principal Rights Enablement
Can access history be generated per individual (who/what/when)?
UnansweredS5-Q4🧾 Data Principal Rights Enablement
Is there a process to revoke access upon data erasure requests?
UnansweredS5-Q5🧾 Data Principal Rights Enablement
Are third-party/outsourced systems included in traceability mapping?
UnansweredS5-Q6🧾 Data Principal Rights Enablement
Is there a defined SLA and workflow for handling data principal requests?
UnansweredS6-Q1🏦 RBI / BFSI Expectations
Is access review conducted at least quarterly for critical systems?
UnansweredS6-Q2🏦 RBI / BFSI Expectations
Is privileged access reviewed more frequently (monthly/bi-weekly) for Tier-0 systems?
UnansweredS6-Q3🏦 RBI / BFSI Expectations
Are vendor identities tagged, controlled, and monitored separately?
UnansweredS6-Q4🏦 RBI / BFSI Expectations
Is outsourced access governed centrally with approvals and logging?
UnansweredS6-Q5🏦 RBI / BFSI Expectations
Is risk-based authentication adopted for sensitive access paths?
UnansweredS6-Q6🏦 RBI / BFSI Expectations
Are audit logs retained per RBI expectations and readily retrievable?
UnansweredS7-Q1🤝 Third-Party & Vendor Risk
Are third-party user accounts centrally tracked and owned?
UnansweredS7-Q2🤝 Third-Party & Vendor Risk
Is third-party access time-bound and automatically revoked?
UnansweredS7-Q3🤝 Third-Party & Vendor Risk
Are vendor accounts included in periodic certifications?
UnansweredS7-Q4🤝 Third-Party & Vendor Risk
Is third-party activity monitored and reviewed?
UnansweredS7-Q5🤝 Third-Party & Vendor Risk
Are security clauses / NDAs tied to provisioning and access recertification?
UnansweredS7-Q6🤝 Third-Party & Vendor Risk
Is least privilege enforced for vendor support access (break-glass where needed)?
UnansweredS8-Q1⚠️ Risk & Incident Preparedness
Are anomalous access patterns detected (impossible travel, unusual time, unknown device)?
UnansweredS8-Q2⚠️ Risk & Incident Preparedness
Are privilege escalations flagged and reviewed quickly?
UnansweredS8-Q3⚠️ Risk & Incident Preparedness
Is geo-velocity or risky location monitoring implemented for key apps?
UnansweredS8-Q4⚠️ Risk & Incident Preparedness
Is breach containment linked to rapid identity revocation (kill switch)?
UnansweredS8-Q5⚠️ Risk & Incident Preparedness
Are privileged access reviews performed post-incident?
UnansweredS8-Q6⚠️ Risk & Incident Preparedness
Is there a documented incident response playbook that includes identity controls?
Unanswered