If you've added Privacy or Processing Integrity criteria to your Drata Starter audit, here's how to understand the evidence needed for your controls.
By this stage of our Drata Playbook, you should have connected your systems, generated and uploaded your policies, worked through most of your Security controls, and if you're doing a Type 2 audit, uploaded the few population items. Now it's time to move on to the Privacy or Processing Integrity section of the audit checklist!
The items for these criteria audit are described in the table below, including their ID reference in Drata's Controls menu. The requirement column explains the expected audit evidence. We know this can look different for every organisation. The idea here is to provide the evidence that demonstrates how you do it.
These items require manually adding evidence into Drata, either of two actions. As long as the evidence is linked to the control ID, either action is acceptable.
1. Evidence Library: In Drata's Evidence Library menu, click "Add Evidence", fill in the required details and link to the relevant control(s) IDs in Drata.
2. Map external evidence: When you click into each control, you can add files or URLs with the relevant documentation.
Processing Integrity
Title | Ref | Requirement | Examples |
Data flow documentation |
DCF-21/ DCF-22 |
Evidence of documented information sources or data flows to clearly establish and communicate the use of data in relation to the system(s) and service(s). | Data flow diagrams, system architecture, network diagram, process flowcharts, operating procedures |
Systematic data validation checks |
DCF-110/ DCF-111 |
Evidence of system configured data validation checks applied to input data for syntax, value tolerances or mandatory fields | Screenshots of configurations, documentation of system designed validation checks |
Information processing objectives | DCF-32 | Evidence of documented information processing objectives | Internal page (intranet), information security policy (if included) |
Risk assessment of processing objectives | DCF-16 | The latest completed risk assessment cover processing objectives | Risk register, meeting minutes, risk report |
Processing integrity policies and procedures | DCF-32 | Defined policies or procedures that set out the responsibilities and requirements to ensure data inputs, processing and outputs are complete, accurate and timely to meet the objectives | System and Information Integrity Policy, procedure document, Information security policy (if included) |
Register of critical data variables | DCF-102 | Register, inventory or mapping of the critical data variables necessary to support the system processing objectives | System data variable spreadsheet |
Data register classifications and details | |||
Management review of the data register | Evidence of review of the data register | Meeting minutes, memo, edit history | |
Review of system outputs | DCF-155 | Evidence of system output test required as a part of change management process or other evidence of system outputs being reviewed for completeness/accuracy | Test cases, procedure document |
Data processing error communications | DCF-82 |
Evidence of data processing errors logged (we'll select a sample for evidence of communications to users of the system) |
Ticketing system report, log, screenshots |
Logging of data processing errors | Evidence of communications to users of the system for data processing errors (we'll select a sample from the log you provide above) | Notification email, website notice, other communications | |
User documentation of information processing | DCF-66 | User documentation communicating processing objectives, product/service specifications, descriptions of data processed, troubleshooting guidance, and/or data validation responsibilities | Standard terms of service (website), service agreement, contract, user guide |
System boundaries for data protection | DCF-21 | Evidence to demonstrate data is maintained within the system boundaries by design | Architectural diagram, system diagram, data handling policies |
Job schedule failures | DCF-80 | Evidence of automated alerts being used for job schedule monitoring | Configuration screenshot, example automated email/message notification |
Resolution of job schedule failures | Evidence of job schedule failures logged (we'll select a sample for evidence of resolution) | System log | |
Job schedule change approvals | DCF-6 | Evidence of job schedule changes (we'll select a sample for evidence of the change management process) | Logs |
Failed backup alerts | DCF-99, DCF-98 | Evidence of automated alerts being used for backup monitoring | Configuration screenshot, example automated email/message notification |
Privacy
* Applicable to Data Processors only
Title | Ref | Requirement | Examples |
Privacy policy purpose and use | DCF-65, DCF-115 | Documented privacy policy and supporting procedures (if applicable) | Privacy policy or other policies or documentation |
Communication of the privacy policy | DCF-112, DCF-114 | Evidence of how the privacy policy is communicated to data subjects | Screen shots, emails, links or other evidence |
Communication of changes to the privacy policy | DCF-112, DCF-113, DCF-114 | Evidence of the latest communication for changes to the privacy policy | Screen shots, emails, links or other evidence |
Basis of processing personal data | DCF-117, DCF-121 | Documentation of the basis of processing personal data (e.g. consent by data subjects, contract performance requirements, processing required to comply with legal obligation, etc.) | Privacy policy or other policies or documentation |
Privacy policy third-party processors | DCF-115 | Disclosure on the use of third parties or sub-processors of the personal data | Privacy policy or other policies or documentation |
Implicit and explicit consent | DCF-115 | Evidence of determining when explicit versus implicit consent is required for data collection and processing | Privacy policy or other policies or documentation |
Consent from data subjects | DCF-112, DCF-116 | Evidence of consent from data subjects prior to data collection or processing | Contract, terms and conditions or other documentation |
Opportunity to withdraw consent | DCF-112, DCF-114 | Evidence of documented rights for data subjects to withdraw consent | Privacy policy or other policies or documentation |
Data controller permission for new sub-processors | DCF-115 | Evidence of Data Controller permission for new sub-processors (we'll select a sample from the vendors list) | Contract, consent document, addendum or other documentation |
Consent for sharing data with sub-processors | DCF-115, DCF-116 | Evidence of consent from data subjects prior to sharing their personal data with third-parties | Contract, terms and conditions or other documentation |
Contract terms with sub-processors | DCF-132, DCF-133 | Evidence of privacy requirements agreed with sub-processors (we'll select a sample from the vendors list) | Formal contracts with privacy requirements |
Established responsibilities for privacy | DCF-115 | Documentation and communication of the defined privacy responsibilities | Privacy policy or other policies or documentation |
Employee security | DCF-37, DCF-119 | Documented policy with requirements for employee security practices | Acceptable use policy, privacy policy or other policies |
Employee privacy training | DCF-36 | Evidence of privacy training for employees (we'll select a sample from the employee list) | Training records, certificates or other evidence of completed privacy training |
Disposal of personal data | DCF-122, DCF-123 | Documented data disposal procedures for secure disposal/erasure of personal data | Data handling policy, privacy policy or other documentation |
Defined procedures for handling requests from the Data Controller | DCF-16 | Documented privacy request processes and procedures for handling requests from the Data Controller | Privacy policy or other policies or documentation |
Defined procedures for handling privacy requests | DCF-122, DCF-125, DCF-126 | Documented privacy request processes and procedures for handling requests from data subjects | Privacy policy or other policies or documentation |
Denied privacy requests handling | DCF-141 | Evidence of denied privacy requests with evidence of notification to data subjects | List or log of denied privacy requests, notification of request result |
Data subject access to modify data | DCF-125, DCF-126 | Evidence of data subjects access to review, correct, amend or append their own personal data | Screen shots, system documentation or other evidence |
Personal data request authentication | DCF-124 | Evidence of data subject requests/disclosures and defined authentication practices to verify the identity and appropriateness of requests from data subjects (we'll select a sample of the requests) | Identity and security checks performed for samples |
Defined procedures for privacy requests | DCF-125 | Evidence of communication of personal data to data subjects (we'll select a sample of data disclosures from the log in DCF-141) | Email communication, automated messages, confirmation of letters sent or other evidence |
Tracking of privacy requests and disclosures | DCF-141 | Evidence of formally tracking privacy events such as data subject information requests, personal data disposals, authorized disclosures, disclosures to third parties, etc. |
Log, register or other tracking of privacy events |
Data breach notifications to the Data Controller* | DCF-131, DCF-135, DCF-134 | Evidence of a defined process for identification, assessment and reporting data breaches to Data Controllers | Documented data breach handling policies and procedures |
Data breach notification procedures | DCF-131, DCF-135, DCF-134 | Evidence of a defined process for identification, assessment and reporting data breaches to impacted data subjects and authorities | Documented data breach handling policies and procedures |
Data breach response plans | DCF-131, DCF-135 | Evidence of predefined with responsibilities, contacts and key steps for handling breaches | Data breach response plans |
Personal data processing scope | DCF-113, DCF-120, DCF-142 | Evidence that the personal data processing scope has been assessed and tracked | Log, listing or register of personal data processing activities or defined and documented scope |
Privacy impact assessment | DCF-16 | The most recent privacy impact assessment | Meeting minutes, documented assessment, outputs, outcomes or other evidence |
Personal data risk assessment | DCF-16 | Evidence of personal data risk assessment performed | Completed risk assessment including evidence of considering privacy related requirements and risks |
Annual review of privacy policy, notices and activities | DCF-113, DCF-120, DCF-142 | Evidence of annual review of privacy policy, notices and activities | Meeting minutes, documentation with evidence of updates, documented review or other evidence |
Privacy policy contact methods | DCF-139 | Evidence of contact methods and contact details for customers to raise privacy requests or ask for more information | Privacy policy or other policies or documentation |
Annual vendor risk assessment | DCF-56, DCF-57, DCF-16 | Evidence of periodic vendor risk assessment | The completed vendor risk assessment for current vendors |
Vendor register | DCF-56 | Evidence of identifying sub-processors | Vendor registers |
Risk assessment of new vendors | DCF-56 | Evidence of risk assessment for new vendors (we'll select a sample of new vendors) | The completed risk assessments for the new vendors sampled |