Skip to content

Latest commit

 

History

History
17 lines (10 loc) · 841 Bytes

vulnerability_scanning_policy.md

File metadata and controls

17 lines (10 loc) · 841 Bytes

Vulnerability Scanning Policy

BloomAPI is proactive about information security and understands that vulnerabilities need to be monitored on an ongoing basis. BloomAPI utilizes Snyk and ScouteSuite to test infrastructure and applications for vulnerabilities.

Applicable Standards from the HITRUST Common Security Framework

  • 10.m - Control of Technical Vulnerabilities

Applicable Standards from the HIPAA Security Rule

  • 164.308(a)(8) - Evaluation

Vulnerability Scanning Policy

  • Snyk automatically scans BloomAPI code and disk images for vulnerabilities.
  • ScouteSuite is run against BloomAPI Google Cloud infrastructure periodically.
  • Upon notification of a vulnerability (e.g. unpatched machine, out-of-date internal api) the vulnerability will be assessed and mitigated by the dev ops team if warranted within 14 days.