DPDP Readiness Assessment

Digital Personal Data Protection Act, 2023 · ISO 27001 · RBI IT Framework

0%READINESS
🔴 High Risk – Non-Compliant

0 / 53 answered

0 high-risk gaps

⚠️ Top Gaps (Prioritize)

Unanswered
Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
Governance & Accountability

Are responsibilities for access governance formally assigned?

🔍
Showing 53 of 53
S1-Q1⚖️ Governance & Accountability

Is a Data Protection Officer (or equivalent role) formally appointed?

Unanswered
S1-Q2⚖️ Governance & Accountability

Is there a documented personal data governance policy?

Unanswered
S1-Q3⚖️ Governance & Accountability

Is DPDP compliance reviewed at board / executive level?

Unanswered
S1-Q4⚖️ Governance & Accountability

Is a personal data inventory (systems & data types) maintained centrally?

Unanswered
S1-Q5⚖️ Governance & Accountability

Are responsibilities for access governance formally assigned?

Unanswered
S1-Q6⚖️ Governance & Accountability

Is risk-based identity governance adopted (policy + risk ownership)?

Unanswered
S1-Q7⚖️ Governance & Accountability

Are employees trained on privacy / data handling at least annually?

Unanswered
S2-Q1🔐 Identity & Access Governance

Is RBAC implemented across critical systems handling personal data?

Unanswered
S2-Q2🔐 Identity & Access Governance

Are access requests formally approved through workflow?

Unanswered
S2-Q3🔐 Identity & Access Governance

Is periodic User Access Review (UAR) conducted for key applications?

Unanswered
S2-Q4🔐 Identity & Access Governance

Is access certification automated and tracked to completion?

Unanswered
S2-Q5🔐 Identity & Access Governance

Are privileged users separately governed with stricter controls?

Unanswered
S2-Q6🔐 Identity & Access Governance

Are Segregation of Duties (SoD) rules defined and enforced?

Unanswered
S2-Q7🔐 Identity & Access Governance

Are temporary access grants time-bound with automatic expiry?

Unanswered
S2-Q8🔐 Identity & Access Governance

Is access granted based on least privilege by default?

Unanswered
S3-Q1🔄 Identity Lifecycle Management

Is joiner-mover-leaver automation implemented (core apps)?

Unanswered
S3-Q2🔄 Identity Lifecycle Management

Is deprovisioning automated upon exit/termination?

Unanswered
S3-Q3🔄 Identity Lifecycle Management

Is deprovisioning SLA monitored and reported?

Unanswered
S3-Q4🔄 Identity Lifecycle Management

Are dormant accounts automatically detected (incl. admins)?

Unanswered
S3-Q5🔄 Identity Lifecycle Management

Are orphan accounts identified and remediated?

Unanswered
S3-Q6🔄 Identity Lifecycle Management

Are non-human identities (service accounts, bots, API keys) governed?

Unanswered
S3-Q7🔄 Identity Lifecycle Management

Are periodic cleanup campaigns executed for unused entitlements?

Unanswered
S4-Q1👁️ Monitoring & Audit Readiness

Are identity-linked access logs retained centrally for critical systems?

Unanswered
S4-Q2👁️ Monitoring & Audit Readiness

Is privileged activity monitored with alerts for high-risk actions?

Unanswered
S4-Q3👁️ Monitoring & Audit Readiness

Can audit evidence be generated within 24 hours for regulator requests?

Unanswered
S4-Q4👁️ Monitoring & Audit Readiness

Are certification logs preserved with approvals and timestamps?

Unanswered
S4-Q5👁️ Monitoring & Audit Readiness

Is SIEM integrated with identity/access context (user, role, entitlement)?

Unanswered
S4-Q6👁️ Monitoring & Audit Readiness

Is identity risk scoring implemented (privilege + behavior + anomalies)?

Unanswered
S4-Q7👁️ Monitoring & Audit Readiness

Are logs protected against tampering (immutability / WORM / controls)?

Unanswered
S5-Q1🧾 Data Principal Rights Enablement

Can the organization map an individual across all systems processing their personal data?

Unanswered
S5-Q2🧾 Data Principal Rights Enablement

Is identity-to-application traceability available (who has access where)?

Unanswered
S5-Q3🧾 Data Principal Rights Enablement

Can access history be generated per individual (who/what/when)?

Unanswered
S5-Q4🧾 Data Principal Rights Enablement

Is there a process to revoke access upon data erasure requests?

Unanswered
S5-Q5🧾 Data Principal Rights Enablement

Are third-party/outsourced systems included in traceability mapping?

Unanswered
S5-Q6🧾 Data Principal Rights Enablement

Is there a defined SLA and workflow for handling data principal requests?

Unanswered
S6-Q1🏦 RBI / BFSI Expectations

Is access review conducted at least quarterly for critical systems?

Unanswered
S6-Q2🏦 RBI / BFSI Expectations

Is privileged access reviewed more frequently (monthly/bi-weekly) for Tier-0 systems?

Unanswered
S6-Q3🏦 RBI / BFSI Expectations

Are vendor identities tagged, controlled, and monitored separately?

Unanswered
S6-Q4🏦 RBI / BFSI Expectations

Is outsourced access governed centrally with approvals and logging?

Unanswered
S6-Q5🏦 RBI / BFSI Expectations

Is risk-based authentication adopted for sensitive access paths?

Unanswered
S6-Q6🏦 RBI / BFSI Expectations

Are audit logs retained per RBI expectations and readily retrievable?

Unanswered
S7-Q1🤝 Third-Party & Vendor Risk

Are third-party user accounts centrally tracked and owned?

Unanswered
S7-Q2🤝 Third-Party & Vendor Risk

Is third-party access time-bound and automatically revoked?

Unanswered
S7-Q3🤝 Third-Party & Vendor Risk

Are vendor accounts included in periodic certifications?

Unanswered
S7-Q4🤝 Third-Party & Vendor Risk

Is third-party activity monitored and reviewed?

Unanswered
S7-Q5🤝 Third-Party & Vendor Risk

Are security clauses / NDAs tied to provisioning and access recertification?

Unanswered
S7-Q6🤝 Third-Party & Vendor Risk

Is least privilege enforced for vendor support access (break-glass where needed)?

Unanswered
S8-Q1⚠️ Risk & Incident Preparedness

Are anomalous access patterns detected (impossible travel, unusual time, unknown device)?

Unanswered
S8-Q2⚠️ Risk & Incident Preparedness

Are privilege escalations flagged and reviewed quickly?

Unanswered
S8-Q3⚠️ Risk & Incident Preparedness

Is geo-velocity or risky location monitoring implemented for key apps?

Unanswered
S8-Q4⚠️ Risk & Incident Preparedness

Is breach containment linked to rapid identity revocation (kill switch)?

Unanswered
S8-Q5⚠️ Risk & Incident Preparedness

Are privileged access reviews performed post-incident?

Unanswered
S8-Q6⚠️ Risk & Incident Preparedness

Is there a documented incident response playbook that includes identity controls?

Unanswered

Overall Notes

Included in JSON export.