Control Evidence Requirements for Vanta

Complete the remaining evidence requirements to be audit-ready

Overview

Our Vanta Velocity model will focus on the following key controls from Vanta’s standard list. While it’s best practice to implement all of these controls, for the purposes of this audit, we’ve highlighted the specific ones that are most relevant.

Once you’ve completed your initial setup in Vanta—integrating your systems, generating and uploading your policies, and completing the risk assessment and vendor risk activities—you’ll be ready to move on to the remaining audit checklist and evidence collection.

Please ensure that all systems involved in the audit have been properly integrated with Vanta, as missing integrations may result in incomplete evidence.

For example, if you’re using both Amazon Web Services (AWS) and Google Cloud Platform (GCP) for your infrastructure but have only integrated AWS, the audit will only reflect AWS-related evidence. To capture evidence from GCP, both systems need to be integrated.

Sample Requirements

Type 1: If you are working to a Type 1 audit, you can provide any one example of the control, a schedule, or a template if a live example has not been performed yet. 

Type 2: If you are conducting a Type 2 audit, AssuranceLab will provide you the sample selections from the populations in Vanta. For each of the selected samples, provide the evidence listed below in the table.

The event-driven populations such as personnel and vulnerabilities, will be available for us to sample based on what is already configured and populated within Vanta, so we can find those as the auditors ourselves, without having to request those from you, however for incidents, we will manually request a full population of incidents through the related evidence item within Vanta.

The time-based populations will be dependent on the frequency of those related controls, and the length of the audit period.

  • Audit period of 12 months:
    • Annually - evidence of the control being performed within the last 12 months.
    • Bi-annually - evidence of the control being performed within the last 6 months.
    • Quarterly - evidence of the control being performed over 2 quarters (sample selected by the auditor).

For audit periods shorter than 12 months, this will be scaled back accordingly. 

  • Audit period of 3 or 6 months:
    • Annually - evidence of the control being performed within the last 12 months.
    • Bi-annually - evidence of the control being performed within the last 6 months.
    • Quarterly - evidence of the control being performed over 1 quarters (sample selected by the auditor).

Audit checklist

The key focus items for the audit are described in the table below per Vanta control. The requirement column explains the expected audit evidence. You can click the control title to read more including the minimum expectations, better practices, and further explanation of each compliance control. 

 Title  Vanta Ref  Evidence requirements for
 Type 1
Evidence requirements for Type 2

 Commitments
 Externally
 Communicated

 PRM-1 Link to your public-facing terms of service or a contract template (MSA) used to establish agreements with customers and users.

 

External Support Resources Available

 PRM-2

Guidelines and technical support resources available to customers.
For example, a Contact Us/FAQ/Knowledge page or an example onboarding email. 

 Incident Response
 Plan Tested

 IRO-1

Incident Response Plan test completed annually.

If you have not performed a test to date, ensure that testing requirements are outlined in your policy.

Evidence of a completed annual incident response testing, with dates to confirm when it was completed, who was involved, and any lessons learned.
 Incident Response
 Policies Established
 IRO-2

Evidence of the documented Incident Response Plan that clearly outlines potential events, pre-planned response steps, and communication requirements,
as well as root-cause analysis requirements to prevent reoccurrence.

 Incident
 Management
 Procedures Followed
 IRO-3

Evidence of a single sample incident remediation actions, i.e. logging, classification, resolution, and lessons learned devised.

If not incidents have occurred to date, the Incident Response Plan. 

At the end of the observation period, a population of incidents that occurred during the observation period will be requested. From the population, samples will be selected and further evidence requested to confirm formal incident management process followed and remediation actions taken. 

 Penetration Testing  IAO-2

Penetration test report performed within the last 12 months.

Alternatively, a letter confirming a third-party pen tester has been engaged and is planned to start or has started testing. 

The latest penetration test performed by an independent third-party within the last 12 months.
Background Checks Performed  HRS-1

If background checks have been completed to date, provide 1 sample certificate; please redact sensitive information if you would prefer. 

If background checks have not been completed to date, ensure a relevant policy outlines your intention to conduct them for future new hires or integrate a background check provider in Vanta. 

 

Personnel that were hired during the observation period, will be randomly selected.

Background check certificates will be requested. 

 Code of Conduct
 Acknowledged by
 Employees and
 Enforced
 HRS-3 Code of Conduct policy establishing workforce conduct standards of integrity, ethical values, and appropriate behavior to support a secure and effective working environment.
 
Confidentiality Agreement Acknowledged by Employees
 HRS-5

A sample NDA or employee contract inclusive of non-disclosure clause.

 

Personnel that were hired during the observation period, will be randomly selected.

Signed NDA's or employment contracts will be requested. 

 

Performance Evaluations Conducted  HRS-6

A completed performance evaluation, if not yet conducted, a template you intend to use. 

Ensure a relevant policy also states the frequency you intend to complete the reviews, i.e. bi-annually, annually. 

The completed performance evaluation for randomly Sampled Personnel will be requested. 

Risk Assessment Performed

 RSK-2

A Risk Assessment is performed annually, inclusive of risk mitigation actions.


If conducted in Vanta, ensure the auditor view is enabled. Follow this link for instructions. 

Risk Management Program Established  RSK-3 Risk Management Policy.
Continuity and Disaster Recovery Plans Established  BCD-1 Continuity and Disaster
Recovery Plan(s).
Continuity and Disaster Recovery Plans Tested  BCD-2

Continuity and Disaster recovery test completed annually, if not completed to date, ensure testing requirements are outlined in the policy.

Evidence of an annually completed disaster recovery test, with dates to confirm when it was completed, who was involved, and any lessons learned.

Cybersecurity Insurance Maintained  BCD-3 Active certificate of currency or cyber insurance policy details. If not maintained, this can be descoped. 
Board of Directors/ Executive Management  Charter  GOV-2

Evidence to confirm who maintains information security oversight (Board of Directors, Executive Management, Info Sec Team, C-Suite etc.)

For example, a Board Charter document, Information Security Policy roles and responsibilities. 

Board of Directors/ Executive Management Meeting  GOV-4

Minutes from the most recent meeting. If Executive management maintains oversight as above, meeting minutes would be expected from an executive management meeting. 

If not yet performed, provide the meeting agenda for an upcoming meeting and a screenshot to confirm when the meeting is scheduled.

Confirmation on the frequency of meetings (bi-annually, quarterly, annually etc.)

Minutes from meeting/s held during the observation period ensure the date the meeting was held is documented.

Backup Processes Established  GOV-5 Operations Security Policy.
Management Roles and Responsibilities Defined  GOV-7 Information Security Policy, with outlined roles and responsibilities for management.
Organisational Structure Documented  GOV-8 Current organisation chart with roles and reporting lines. 
Roles and Responsibilities Specified  GOV-10 Information Security Policy, with outlined roles and responsibilities for information security.
Security Policies Established and Reviewed  GOV-11

Set of Information Security Policies in scope are reviewed, approved and accepted by employees annually.

Enable Policy Acceptance in the Personnel Checklist Section on Vanta (this enables the tracking of policy acknowledgements).

Same evidence as Type 1, ensure all personnel are compliant. 
Control Self-Assessments Conducted  IAO-1 'Company uses Vanta for continuous security monitoring' test is passing. 
Configuration Management System Established  CFG-1 If CI/CD is in use, provide screenshot evidence showing automated testing as well as approval flows within the pipeline.

If you are doing manual testing and approvals, please provide evidence of one change release ticket being completed, including testing and approvals.

Same evidence as Type 1.

If manual testing and approval are in place, a population of code changes throughout the observation period will be required, and sample evidence will be requested. 

Change Management Procedures Enforced  CHG-1 Evidence of CI/CD configuration for change management procedures, or evidence of configuration to show independent review and testing
of changes by someone other than who made the code change.
 
Access Control Procedures Established  IAC-2 Access Control Policy.
Access Reviews Conducted  IAC-7

Documentation of a recently completed user access review.

If not completed to date, ensure the review requirements are outlined in a policy, typically the access control policy. 

User access reviews of critical systems, completed during the observation period, ensure the date the review was completed and the systems reviewed are documented.

Access Revoked Upon Termination  IAC-8 Evidence to confirm a formal process is followed and documented to revoke terminated employees' user access in accordance with your policy timelines. A termination checklist template or process outlined in a policy is accepted for Type 1. 

Terminated personnel will be sampled, and evidence will be requested to confirm access was revoked to your critical systems in a timely manner.

Access Requests Required  IAC-9

Evidence to confirm a formal process is in place to grant/approve new user access, for example, an onboarding checklist, ticket system. 

Policy outlinig the process or template is suffficent for Type 1. 

New Hires will be sampled, and evidence will be requested to confirm a formal process is in place to grant/approve new user access.
Password Policy Enforced  IAC-11 Access Control Policy, or Password Policy.
Remote Access MFA Enabled  IAC-12 Evidence of the configuration of MFA across critical services (such as IAM, infrastructure and version control system).
Vulnerabilities Scanned and Remediated  VPM-2

Evidence to confirm third-party vulnerability scanning tool/s are utilised, and confirmation of the frequency scanning is configured to run.

Common systems used; AWS - Inspector, Azure - Microsoft Defender For Cloud, GCP - Web Security Scanner (Command Centre). Common third-party scanners: CrowdStrike, Intruder, Wiz

Security Awareness Training  SAT-1 Evidence to confirm
security training is undertaken by current employees annually. 
Ensure all current personnel have completed training annually. 
MDM System Utilised  MDM-1

MDM system or Vanta Agent integrated in Vanta.

Ensure all current personnel have an MDM system or Vanta Agent installed.

Intrusion Detection System Utilised  MON-1 Intrusion detection system configuration.
Log Management Utilised  MON-2 Screenshot evidence of logging system used and logs being stored.
Data Transmission Encrypted  NET-1 Evidence of encryption in transit configuration.
Vulnerability and System Monitoring Procedures Established  OPS-1 Vulnerability Management
Policy, or Operations Security Policy.
Asset Disposal Procedures Utilised  AST-1 Data Management Policy, or
Asset Management Policy.
Data Retention Procedures Established  AST-2 Data Management Policy, or
Asset Management Policy.
Production Inventory Maintained  AST-3 Asset register, either tracked through Vanta, or manual evidence, inclusive of devices at a minimum. 
Production Deployment Access Restricted  CHG-2 Version control system connected in Vanta, for example GitHub, GitLab. 
Development Lifecycle Established  CHG-3 Operations Security Policy.
Encryption Key Access Restricted  CRY-2 Cryptography or Encryption
Policy.
Portable media encrypted CRY-3

If MDM is monitoring hard disk encryption, ensure at a minimum 1 current device is compliant. 

If no MDM is in use, provide screenshot evidence. 

If MDM is monitoring hard disk encryption, ensure all current devices are compliant. 

If no MDM is in use, Current personnel will be sampled, and screenshots of evidence will be requested to confirm compliance. 

Data Encryption Utilised  CRY-4 Configuration to show data is encrypted at-rest.
Unique Account Authentication Enforced  CRY-5 User access accounts are individually and uniquely assigned for all critical systems.
Data Classification Policy Established  DCH-5 Data Management Policy.
Anti-Malware Technology Utilised  END-1

If MDM is monitoring anti-virus software, ensure, at a minimum, 1 current device is compliant. 

If no MDM is in use, provide screenshots of evidence. 

If MDM is monitoring anti-virus software, ensure all current devices are compliant. 

If no MDM is in use, Current personnel will be sampled, and screenshots of evidence will be requested to confirm compliance. 

Third-Party Agreements Established

 TPM-1

Link to the public-facing of the cloud provider service agreement. For example. 
Vendor Management Program Established  TPM-2 Third-Party Management Policy.
Vendor Register  TPM-2 Vendor registers inclusive of critical systems, monitored in Vanta; alternatively, upload a manual register. 
Availability Trust Service Criteria
Production Multi-Availability Zones Established  BCD-6 Screenshot evidence to confirm multiple availability zones is configured within the infrastructure.
System Capacity Reviewed  CAP-1 Screenshot evidence to confirm auto-scaling configuration enabled within the infrastructure or evidence of reviews to show manual reviews are in place to review capacity on a frequent basis.
Infrastructure Performance Monitored  MON-4 Screenshot evidence of a load balancer configured within the infrastructure.
Database replication utilised BCD-4 Screenshot evidence of daily backups configured within the infrastructure.

Added Processing Integrity or Privacy to you audit scope? Contact us for guidance on the additional scope areas.