Top Security and Compliance FAQsThis Security & Compliance FAQ highlights the most commonly requested questions related to Impressionwise’s security posture, risk management, and operational controls. It is intended to provide customers and partners with clear, high-level insight into the security practices most frequently reviewed during vendor risk and due diligence assessments, and serves as a supplement to our formal security posture documentation. Top FAQ’s1. Does your company have a formal process to scan code for vulnerabilities (a) prior to production release, and (b) periodically thereafter?Our company maintains a formal process to scan all code for vulnerabilities both (a) prior to production release and (b) periodically thereafter. This process includes automated static and dynamic analysis tools, dependency and third-party library scanning, and manual code reviews where appropriate. Identified vulnerabilities are tracked, prioritized, and remediated according to our secure software development lifecycle (SDLC) policies to ensure code security throughout the software lifecycle. Specific code scanning practices for vulnerabilities include:
2. Does your company have ANY vulnerabilities published in the National Vulnerability Database?Our company currently has no vulnerabilities published in the National Vulnerability Database (https://nvd.nist.gov/vuln/search). We continuously monitor and regularly review the NVD and other security sources to proactively identify and address any potential vulnerabilities, ensuring the ongoing security and integrity of our products and services. 3. Does your company provide independent web application penetration test (WAPT) reports?Full independent Web Application Penetration Test (WAPT) reports are maintained for internal security and risk management purposes only. This report contains sensitive security findings and is not available for customer inspection or distribution. 4. Does your company have a process to allow it's customers to conduct web application penetration test of the services in scope for this relationship (in non-production environments)?Customer-conducted web application penetration testing of the services in scope may be permitted only with at least thirty (30) days prior written notice of the proposed testing schedule or event. Such testing is subject to Impressionwise’s sole discretion to approve the timing, scope, and methodology of the testing. Approval may be withheld or conditioned as deemed necessary by Impressionwise to protect its systems, data, and operations. All testing must be conducted in non-production environments and in accordance with any additional terms communicated by Impressionwise. 5. Does your organization maintain policies, standards, and procedures for identifying and managing cyber supply chain risks i.e., ensuring software and hardware components used as part of delivering a service or product do not present a risk?Our organization maintains formal policies, standards, and procedures to identify, assess, and manage cyber supply chain risks. These measures ensure that all software, hardware, and third-party components used in our products and services are evaluated for potential security risks and mitigated according to established procedures, thereby protecting the integrity and security of our offerings. 6. Does your company maintain a Software Bill of Materials (SBOM)?Our company maintains a comprehensive Software Bill of Materials (SBOM) in accordance with https://www.cisa.gov/sbom for all software products, including all third-party and open-source components. The SBOM is regularly updated to track component integrity and address potential vulnerabilities, ensuring supply chain security and compliance with industry standards. 7. Does your company participate in a public and/or private bug bounty program for the products in scope for this relationship?Our company does not participate in public or private bug bounty programs for the products or services in scope for this relationship. Security testing is conducted internally and through authorized independent assessments only. 8. Which industry recognized framework does your company follow to configure and harden IT systems, end-point devices, networks, and software?Our company follows industry-recognized frameworks, specifically the CIS (Center for Internet Security) Benchmarks, to configure and harden IT systems, end-point devices, networks, and software. These benchmarks found at https://www.cisecurity.org/cis-benchmarksguide our secure configuration practices and help ensure that all systems are consistently hardened according to recognized best practices. 9. Is there an automated system to review and correlate log and/or behavioral events Security Info. & Event Management e.g., SIEM? Are security events related to systems and data, including hosted environments, monitored continuously 24x7x365?Our company employs an automated Security Information and Event Management (SIEM) system to collect, review, and correlate logs and behavioral events across IT systems, applications, and network devices. Security events related to scoped systems and data, including hosted environments, are **monitored continuously 24x7x365**, enabling real-time detection of anomalies or potential security incidents and supporting timely investigation and response in accordance with our security policies and procedures. SummaryThe topics addressed in this FAQ reflect the security areas most interest by customers, including secure software development, vulnerability management, supply chain security, system hardening, and continuous monitoring. Impressionwise’s security program is designed to align with recognized industry standards and to support transparency while safeguarding sensitive information. This document is provided for informational purposes and does not replace contractual or regulatory materials. |
Impressionwise makes it easy for potential clients to evaluate our list cleaning services by offering a complimentary scan and report for a sample set of your data to illustrate the benefits of our services.
Try it NowBefore you head out…
Stop wondering and start knowing if your emails are safe and deliverable.
Experience Impressionwise's industry leading
No credit card required. | Zero obligations.