1. Firewall(s) – system level and network level
  2. Breach protocols, alarms, notifications, IP tracking
  3. Encryption – in storage, in transit and on client side
  4. Need strict policy on vetting source code tools that we use
  5. Best practices – not leaving laptops unlocked, not using flash-drives or external drives, password to be 15 characters or more (change after every 90days), etc.
  6. Weekly back-up plan for Live and Test site
  7. Monthly back-up of employee systems (mapping back-up)
  8. Best practices before pushing live – Detailed Change Requests, need to take back-up of code (i.e.master), etc.
  9. AWS and Remote Desktop backup taken in a tape and stored in remote location.