This document describes Virtus Group’s standard for this area and how it is applied in practice. It is derived from our internal policies and standards and is intended for both reviewers and operations.
| Area | Examples |
|---|---|
| Identity & Access | Conditional Access, MFA, privileged boundaries |
| Data Protection | Encryption at rest/in transit, key mgmt, backup retention |
| Workload Hygiene | Patch/Vuln SLAs, change control, hardening baselines |
| Monitoring | SIEM integration, alerting, audit trails |
| Vendors & Third Parties | Due diligence, right-to-audit, breach notice windows |
Records are maintained per the VGL Document & Record Control guidelines, including logs, approvals, test outputs, meeting minutes, and reports.