SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Through disciplined assessment and audit processes,
Stream has implemented comprehensive practices for
ISO/IEC 27001, PCI DSS, SOC 1 (SSAE 18) TYPE II, and SOC 2 (SSAE 18) TYPE II.
Health, Safety and
Security Through
COMPLIANCE
At Stream Data Centers, we design facilities and
train our teams to comply with rigorous standards
set by trade groups and certifying organizations,
maintaining relevant certifications and attestations.
Our Critical Environments Services practice is
dedicated to continually improving and maintaining
compliance certifications that are critical to our
mission-critical data center customers.
Our team ensures compliance through:
Audit readiness — Others in the industry may relax stringent attention to compliance until
the last quarter, then tighten control to prepare for end-of-year audits. Stream’s philosophy
is that we should be audit-ready every day.
We maintain our books, processes, training, STEPS program and CETA program to
make sure we are.
Self-auditing — We take compliance seriously, and continually self-audit in the
areas of health and safety, processes and procedures. Managers frequently
conduct informal audits of different areas, like safety and efficiency, to see how
processes are working. Conscious self-auditing reinforces our commitment to
compliance in the minds of our team. We don’t require third parties or official
audits to keep us up to standard.
Transparency — Our partners are always welcome to visit our sites to
meet the team and ask questions. Often, a visiting partner will choose
a topic from STEPS to review with the on-site team. Stream operates
with trust and integrity on every level.
Financial accountability — Stream’s commitment to compliance,
process management and teamwork brings value to customers
and supports profitability. We believe financial success is a
byproduct of having the right team doing the right job the
right way. And our profits go toward improvement,
innovation, and strengthening the team as needed.
•
•
•
•
International Organization for Standardization (ISO/IEC 27001)
ISO 27001 defines specific controls that should be in place for an organization to be
certified as in conformance with ISO 27001.
ISO 27001 is an International standard providing a model for establishing, operating,
monitoring, and improving an Information Security Management System (ISMS.)
Payment Card Industry Data Security Standard (PCI DSS)
The Payment Card Industry Data Security Standard (PCI DSS) was created to meet the
rising threat to individuals’ payment card information. Compliance with PCI DSS is
mandatory for all organizations dealing with credit, debit and ATM cards, as defined by
the PCI Security Standards Council, which includes industry giants like Visa, MasterCard
and American Express.
PCI DSS is a comprehensive set of standards requiring merchants and service providers
that store, process or transmit customer payment card data to adhere to strict
information security controls and processes.
Stream Data Centers provides physical security access to customer equipment through a
combination of management systems and physical access safeguards and procedures.
Stream Data Centers does not monitor or have access to customer data, so applicability
is only to physical security and management processes that govern physical security.
SOC 1 (SSAE 18) TYPE II
Statement on Standards for Attestation Engagements (SSAE) are attestation
standards put forth by the Auditing Standards Board (ASB) of the American
Institute of Certified Public Accountants (AICPA). This report is intended to
be relied upon by the financial statement auditors of Stream Data Centers
customers. The SOC 1 assesses the effectiveness of business process
controls, physical access controls and logical access controls related to the
property management administrative services performed for Stream Data
Centers clients.
SOC 2 (SSAE 18) TYPE II
Statement on Standards for Attestation Engagements (SSAE) are attestation
standards put forth by the Auditing Standards Board (ASB) of the American
Institute of Certified Public Accountants (AICPA). This report is intended to
be relied upon by the financial statement auditors of Stream Data Centers
customers. The SSAE assesses the physical security, environmental
safeguards and network monitoring controls implemented by Stream Data
Centers. Assessing these controls through the SSAE demonstrates Stream
Data Centers’ commitment to the protection of all IT assets.
Stream Data Centers | Stream Critical Environments Services | Compliance Standards 2019

Contenu connexe

Tendances

Crossland Advisors Services
Crossland Advisors ServicesCrossland Advisors Services
Crossland Advisors ServicesJay Crossland
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System ValidationEric Silva
 
ISO 27001:2013 IS audit plan - by software outsourcing company in india
 ISO 27001:2013  IS audit plan - by software outsourcing company in india ISO 27001:2013  IS audit plan - by software outsourcing company in india
ISO 27001:2013 IS audit plan - by software outsourcing company in indiaiFour Consultancy
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Servicesmcloete
 
Iso iec 20000 foundation training course by interprom
Iso iec 20000 foundation training course by interpromIso iec 20000 foundation training course by interprom
Iso iec 20000 foundation training course by interpromMart Rovers
 
NQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA
 
EGI Integrated Management System
EGI Integrated Management SystemEGI Integrated Management System
EGI Integrated Management SystemEOSC-hub project
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information SecurityJohnHPazEMCPMPITIL5G
 
Frame work mi get to know us
Frame work mi get to know usFrame work mi get to know us
Frame work mi get to know usDanielle Lydon
 
Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301IT Governance Ltd
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 

Tendances (19)

Crossland Advisors Services
Crossland Advisors ServicesCrossland Advisors Services
Crossland Advisors Services
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 
Process
ProcessProcess
Process
 
ISO 27001:2013 IS audit plan - by software outsourcing company in india
 ISO 27001:2013  IS audit plan - by software outsourcing company in india ISO 27001:2013  IS audit plan - by software outsourcing company in india
ISO 27001:2013 IS audit plan - by software outsourcing company in india
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity Checklist
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Services
 
Iso iec 20000 foundation training course by interprom
Iso iec 20000 foundation training course by interpromIso iec 20000 foundation training course by interprom
Iso iec 20000 foundation training course by interprom
 
NQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap Guide
 
EGI Integrated Management System
EGI Integrated Management SystemEGI Integrated Management System
EGI Integrated Management System
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Iso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence AcquisitionIso 27001 Audit Evidence Acquisition
Iso 27001 Audit Evidence Acquisition
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Control Your Enterprise
Control Your EnterpriseControl Your Enterprise
Control Your Enterprise
 
Frame work mi get to know us
Frame work mi get to know usFrame work mi get to know us
Frame work mi get to know us
 
Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301Business Continuity Management & ISO 22301
Business Continuity Management & ISO 22301
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 

Similaire à Stream Data Centers Compliance Standards

IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxNapoleon NV
 
Data Center Audit Standards
Data Center Audit StandardsData Center Audit Standards
Data Center Audit StandardsKeyur Thakore
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedVISTA InfoSec
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityMike Lemire
 
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?sistemaCertification
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsChristopher Foot
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001Iris Maaß
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationVISTA InfoSec
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
 
How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsSalvi Jansen
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityShyamMishra72
 

Similaire à Stream Data Centers Compliance Standards (20)

IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptx
 
Data Center Audit Standards
Data Center Audit StandardsData Center Audit Standards
Data Center Audit Standards
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-converted
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on security
 
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?
✅ WHY IS ISO 20000-1 CERTIFICATION A GOOD IDEA FOR YOUR ORGANIZATION GROWTH?
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance Projects
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organization
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
ISO CERTIFICATIONS
ISO CERTIFICATIONSISO CERTIFICATIONS
ISO CERTIFICATIONS
 
How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 Reports
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
 

Plus de kanew396

Insights.aniline.io Sitemap
Insights.aniline.io SitemapInsights.aniline.io Sitemap
Insights.aniline.io Sitemapkanew396
 
Post Covid-19 Restaurant Innovative Trends
Post Covid-19 Restaurant Innovative TrendsPost Covid-19 Restaurant Innovative Trends
Post Covid-19 Restaurant Innovative Trendskanew396
 
How Can Businesses Pivot Post-COVID?
How Can Businesses Pivot Post-COVID?How Can Businesses Pivot Post-COVID?
How Can Businesses Pivot Post-COVID?kanew396
 
What are the Pitfalls of Ignoring a Patient’s Family History
What are the Pitfalls of Ignoring a Patient’s Family HistoryWhat are the Pitfalls of Ignoring a Patient’s Family History
What are the Pitfalls of Ignoring a Patient’s Family Historykanew396
 
Reproductive Genetics: Introduction to Genetic Testing Options
Reproductive Genetics: Introduction to Genetic Testing OptionsReproductive Genetics: Introduction to Genetic Testing Options
Reproductive Genetics: Introduction to Genetic Testing Optionskanew396
 
Expanded Carrier Screening - Genomesmart
Expanded Carrier Screening - GenomesmartExpanded Carrier Screening - Genomesmart
Expanded Carrier Screening - Genomesmartkanew396
 
Huntington’s Disease – Can genetic testing help?
Huntington’s Disease – Can genetic testing help?Huntington’s Disease – Can genetic testing help?
Huntington’s Disease – Can genetic testing help?kanew396
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centerskanew396
 
Facilities Management Services from Stream Data Centers
Facilities Management Services from Stream Data CentersFacilities Management Services from Stream Data Centers
Facilities Management Services from Stream Data Centerskanew396
 
Parrot Feather -Systemic Options for Control
Parrot Feather -Systemic Options for ControlParrot Feather -Systemic Options for Control
Parrot Feather -Systemic Options for Controlkanew396
 
Aquacide Pellets
Aquacide PelletsAquacide Pellets
Aquacide Pelletskanew396
 
Pond Weed Identification - Aquacide
Pond Weed Identification - AquacidePond Weed Identification - Aquacide
Pond Weed Identification - Aquacidekanew396
 
Lake Weed Identification
Lake Weed IdentificationLake Weed Identification
Lake Weed Identificationkanew396
 
What are Systemic Option for Parrot Feather Control
What are Systemic Option for Parrot Feather ControlWhat are Systemic Option for Parrot Feather Control
What are Systemic Option for Parrot Feather Controlkanew396
 
Get Rid of Common Cattails in 3 Easy Ways
Get Rid of Common Cattails in 3 Easy WaysGet Rid of Common Cattails in 3 Easy Ways
Get Rid of Common Cattails in 3 Easy Wayskanew396
 
Water Weed Cutter -Underwater Weed Cutter Designed for Easy Use
Water Weed Cutter -Underwater Weed Cutter Designed for Easy UseWater Weed Cutter -Underwater Weed Cutter Designed for Easy Use
Water Weed Cutter -Underwater Weed Cutter Designed for Easy Usekanew396
 

Plus de kanew396 (16)

Insights.aniline.io Sitemap
Insights.aniline.io SitemapInsights.aniline.io Sitemap
Insights.aniline.io Sitemap
 
Post Covid-19 Restaurant Innovative Trends
Post Covid-19 Restaurant Innovative TrendsPost Covid-19 Restaurant Innovative Trends
Post Covid-19 Restaurant Innovative Trends
 
How Can Businesses Pivot Post-COVID?
How Can Businesses Pivot Post-COVID?How Can Businesses Pivot Post-COVID?
How Can Businesses Pivot Post-COVID?
 
What are the Pitfalls of Ignoring a Patient’s Family History
What are the Pitfalls of Ignoring a Patient’s Family HistoryWhat are the Pitfalls of Ignoring a Patient’s Family History
What are the Pitfalls of Ignoring a Patient’s Family History
 
Reproductive Genetics: Introduction to Genetic Testing Options
Reproductive Genetics: Introduction to Genetic Testing OptionsReproductive Genetics: Introduction to Genetic Testing Options
Reproductive Genetics: Introduction to Genetic Testing Options
 
Expanded Carrier Screening - Genomesmart
Expanded Carrier Screening - GenomesmartExpanded Carrier Screening - Genomesmart
Expanded Carrier Screening - Genomesmart
 
Huntington’s Disease – Can genetic testing help?
Huntington’s Disease – Can genetic testing help?Huntington’s Disease – Can genetic testing help?
Huntington’s Disease – Can genetic testing help?
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
 
Facilities Management Services from Stream Data Centers
Facilities Management Services from Stream Data CentersFacilities Management Services from Stream Data Centers
Facilities Management Services from Stream Data Centers
 
Parrot Feather -Systemic Options for Control
Parrot Feather -Systemic Options for ControlParrot Feather -Systemic Options for Control
Parrot Feather -Systemic Options for Control
 
Aquacide Pellets
Aquacide PelletsAquacide Pellets
Aquacide Pellets
 
Pond Weed Identification - Aquacide
Pond Weed Identification - AquacidePond Weed Identification - Aquacide
Pond Weed Identification - Aquacide
 
Lake Weed Identification
Lake Weed IdentificationLake Weed Identification
Lake Weed Identification
 
What are Systemic Option for Parrot Feather Control
What are Systemic Option for Parrot Feather ControlWhat are Systemic Option for Parrot Feather Control
What are Systemic Option for Parrot Feather Control
 
Get Rid of Common Cattails in 3 Easy Ways
Get Rid of Common Cattails in 3 Easy WaysGet Rid of Common Cattails in 3 Easy Ways
Get Rid of Common Cattails in 3 Easy Ways
 
Water Weed Cutter -Underwater Weed Cutter Designed for Easy Use
Water Weed Cutter -Underwater Weed Cutter Designed for Easy UseWater Weed Cutter -Underwater Weed Cutter Designed for Easy Use
Water Weed Cutter -Underwater Weed Cutter Designed for Easy Use
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Stream Data Centers Compliance Standards

  • 1. Through disciplined assessment and audit processes, Stream has implemented comprehensive practices for ISO/IEC 27001, PCI DSS, SOC 1 (SSAE 18) TYPE II, and SOC 2 (SSAE 18) TYPE II. Health, Safety and Security Through COMPLIANCE At Stream Data Centers, we design facilities and train our teams to comply with rigorous standards set by trade groups and certifying organizations, maintaining relevant certifications and attestations. Our Critical Environments Services practice is dedicated to continually improving and maintaining compliance certifications that are critical to our mission-critical data center customers. Our team ensures compliance through: Audit readiness — Others in the industry may relax stringent attention to compliance until the last quarter, then tighten control to prepare for end-of-year audits. Stream’s philosophy is that we should be audit-ready every day. We maintain our books, processes, training, STEPS program and CETA program to make sure we are. Self-auditing — We take compliance seriously, and continually self-audit in the areas of health and safety, processes and procedures. Managers frequently conduct informal audits of different areas, like safety and efficiency, to see how processes are working. Conscious self-auditing reinforces our commitment to compliance in the minds of our team. We don’t require third parties or official audits to keep us up to standard. Transparency — Our partners are always welcome to visit our sites to meet the team and ask questions. Often, a visiting partner will choose a topic from STEPS to review with the on-site team. Stream operates with trust and integrity on every level. Financial accountability — Stream’s commitment to compliance, process management and teamwork brings value to customers and supports profitability. We believe financial success is a byproduct of having the right team doing the right job the right way. And our profits go toward improvement, innovation, and strengthening the team as needed. • • • •
  • 2. International Organization for Standardization (ISO/IEC 27001) ISO 27001 defines specific controls that should be in place for an organization to be certified as in conformance with ISO 27001. ISO 27001 is an International standard providing a model for establishing, operating, monitoring, and improving an Information Security Management System (ISMS.) Payment Card Industry Data Security Standard (PCI DSS) The Payment Card Industry Data Security Standard (PCI DSS) was created to meet the rising threat to individuals’ payment card information. Compliance with PCI DSS is mandatory for all organizations dealing with credit, debit and ATM cards, as defined by the PCI Security Standards Council, which includes industry giants like Visa, MasterCard and American Express. PCI DSS is a comprehensive set of standards requiring merchants and service providers that store, process or transmit customer payment card data to adhere to strict information security controls and processes. Stream Data Centers provides physical security access to customer equipment through a combination of management systems and physical access safeguards and procedures. Stream Data Centers does not monitor or have access to customer data, so applicability is only to physical security and management processes that govern physical security. SOC 1 (SSAE 18) TYPE II Statement on Standards for Attestation Engagements (SSAE) are attestation standards put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). This report is intended to be relied upon by the financial statement auditors of Stream Data Centers customers. The SOC 1 assesses the effectiveness of business process controls, physical access controls and logical access controls related to the property management administrative services performed for Stream Data Centers clients. SOC 2 (SSAE 18) TYPE II Statement on Standards for Attestation Engagements (SSAE) are attestation standards put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). This report is intended to be relied upon by the financial statement auditors of Stream Data Centers customers. The SSAE assesses the physical security, environmental safeguards and network monitoring controls implemented by Stream Data Centers. Assessing these controls through the SSAE demonstrates Stream Data Centers’ commitment to the protection of all IT assets. Stream Data Centers | Stream Critical Environments Services | Compliance Standards 2019