Security assessment
The security assessment consists of requirements and questions regarding security specific components as use of encryption, firewall, access and authorisation controls ect. Further, a detailed diagram showing all system components, integrations and connections, data flow diagram and overview of subprocessors are included. In addition, requirements with regards to injection prevention, cross site scripting, error handling and deployment review is also included.