Trust Center · Security questionnaire
Vendor Security Questionnaire
Leapo's answers to the standard vendor-security domains drawn from the Cloud Security Alliance's CAIQ. We've pre-answered the questions procurement teams ask first so the back-and-forth on a vendor review can start at a useful place.
Answer status legend
Governance, Risk Management & Compliance
Do you have a formal information security program?
Do you have a designated security officer?
Do you maintain a risk register?
Are you GDPR-compliant?
Are you SOC 2 / ISO 27001 / ISAE 3402 certified?
Do you carry cyber liability insurance?
Data Security & Information Lifecycle
Is customer data encrypted at rest?
Is customer data encrypted in transit?
Are encryption keys managed by a key management system?
Do you classify data by sensitivity?
Is data segregated between customers (multi-tenancy model)?
Where is customer data physically stored?
Do you have a data retention and deletion policy?
Can customers retrieve their data in a portable format?
Identity & Access Management
Is multi-factor authentication (MFA) required for administrative access?
Is MFA available to end users?
Do you enforce password complexity requirements?
Do you support Single Sign-On (SAML/OIDC)?
Are administrative actions logged?
Are user sessions automatically terminated after inactivity?
Is principle-of-least-privilege enforced for personnel?
Infrastructure & Virtualization Security
Where is the application hosted?
Is the production network segmented from the development network?
Are network communications between services encrypted?
Is a Web Application Firewall (WAF) in front of the application?
Are public-facing endpoints rate-limited?
Supply Chain & Subprocessors
Do you maintain a list of subprocessors?
Do you have DPAs in place with each subprocessor?
Do you notify customers of changes to subprocessors?
Are international data transfers covered by Standard Contractual Clauses?
Business Continuity & Disaster Recovery
Do you have documented backup procedures?
What is your Recovery Time Objective (RTO)?
What is your Recovery Point Objective (RPO)?
Have you tested the disaster-recovery procedure?
Do you offer an uptime SLA?
Incident Response
Do you have a documented incident response plan?
What is your breach notification SLA?
How are anomalous events detected?
Is there a security contact for responsible disclosure?
Vulnerability & Patch Management
Are dependencies scanned for vulnerabilities?
Is application code scanned for vulnerabilities (SAST)?
Have you completed a penetration test in the last 12 months?
Do you have a documented patching SLA?
Need more depth?
If your procurement team uses a longer or different questionnaire (full CAIQ, SIG, ISO 27001 control list, Belgian banking-supervisor template), send it to security@leapo.app and we'll complete it within 5 business days at no charge.