Aptible streamlines the process of addressing security questionnaires and audits with its pre-configured Security & Compliance features. This guide will help you effectively showcase your security and compliance status for Aptible resources.
Before diving into the response process, it’s crucial to clarify the scope of your assessment. Determine between controls within the scope of Aptible (e.g., infrastructure implementation) and those that fall outside of the scope (e.g., employee training on compliance policies).For HITRUST Audits, Aptible provides the option of HITRUST Inheritance, which is a valuable resource for demonstrating compliance within the defined scope. Refer to How to Request HITRUST Inheritance from Aptible.
To ensure that you are well-prepared to answer questions and meet requirements, collect the most pertinent resources:
For inquiries or requirements related to your unique setup (e.g., implementing Multi-Factor Authentication or redundancy configurations), refer to your Security & Compliance Dashboard. The Security and Compliance Dashboard provides an easy-to-consume view of all the HITRUST controls that are fully enforced and managed on your behalf. A printable report is available to share as needed.
For inquiries or requirements regarding Aptible’s compliance (e.g., HITRUST/SOC 2 reports) or infrastructure setup (e.g., penetration testing and host hardening), refer to our comprehensive trust.aptible.com page. This includes a FAQ of security questions.