SOC 2 Type II Report 2022 Cyient
SOC 2 Type II Report 2022 Cyient
2
Section I: Independent Service Auditor’s Report
3
Independent Service Auditor’s Report
Scope
We have examined Cyient Limited’s (Cyient) accompanying description of its services titled " Description of
Engineering Design & Spatial Data Services " throughout the period November 01, 2020 to October 31, 2021,
(description) based on the criteria for a description of a service organization’s system in DC section 200, 2018
Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report (AICPA,
Description Criteria), (description criteria) and the suitability of the design and operating effectiveness of
controls stated in the description throughout the period November 01, 2020 to October 31, 2021, to provide
reasonable assurance that Cyient’s service commitments and system requirements were achieved based on the
trust services criteria relevant to Security, Confidentiality and Availability (applicable trust services criteria)
set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity,
Confidentiality, and Privacy (AICPA, Trust Services Criteria).
Cyient uses subservice organizations for Managed Security Operations Centre and helpdesk ticketing services.
The description indicates that complementary subservice organization controls that are suitably designed and
operating effectively are necessary, along with controls at Cyient, to achieve Cyient’s service commitments and
system requirements based on the applicable trust services criteria. The description presents Cyient’s controls,
the applicable trust services criteria, and the types of complementary subservice organization controls
assumed in the design of Cyient’s controls. The description does not disclose the actual controls at the
subservice organization.
The description indicates that complementary user entity controls that are suitably designed and operating
effectively are necessary, along with controls at Cyient, to achieve Cyient ’s service commitments and system
requirements based on the applicable trust services criteria. The description presents Cyient’s controls, the
applicable trust services criteria, and the complementary user entity controls assumed in the design of Cyient’s
controls. Our examination did not include such complementary user entity controls and we have not evaluated
the suitability of the design or operating effectiveness of such controls.
4
The information included in section 5, "Other Information Provided by Cyient," is presented by management of
Cyient to provide additional information and is not a part of Cyient’s description of its Engineering Design &
Spatial Data Services made available to user entities during the period November 01, 2020 to October 31, 2021.
Information about Cyient management’s response to exceptions identified has not been subjected to the
procedures applied in the examination of the description and of the suitability of the design and operating
effectiveness of controls to achieve Cyient's service commitments and system requirements based on the
applicable trust services criteria, and accordingly, we express no opinion on it.
In section II, Cyient has provided the assertion titled “Assertion of the Management of Cyient Limited,”
(assertion) about the fairness of the presentation of the description based on the description criteria and
suitability of the design and operating effectiveness of the controls described therein to meet the applicable
trust services criteria. Cyient is responsible for preparing the description and the assertion, including the
completeness, accuracy, and method of presentation of the description and assertion; providing the services
covered by the description; identifying the risks that would prevent the applicable trust services criteria from
being met; designing, implementing, and documenting the controls to meet the applicable trust services
criteria; and specifying the controls that meet the applicable trust services criteria and stating them in the
description.
Our responsibility is to express an opinion on the fairness of the presentation of the description based on the
description criteria and on the suitability of the design and operating effectiveness of the controls described
therein to meet the applicable trust services criteria, based on our examination. Our examination was
conducted in accordance with attestation standards established by the American Institute of Certified Public
Accountants and accordingly, included procedures that we considered necessary in the circumstances.
Those standards require that we plan and perform our examination to obtain reasonable assurance about
whether, in all material respects, the description is fairly presented based on description criteria and the
controls are suitably designed and operating effectively to meet the applicable trust services criteria
throughout the period November 01, 2020 to October 31, 2021.
An examination of the description of a service organization’s system and the suitability of the design and
operating effectiveness of the controls involves
• Evaluating and performing procedures to obtain evidence about whether the description is fairly
presented based on the description criteria and the controls were suitably designed and operating
effectively, to meet the applicable trust services criteria throughout the period November 01, 2020 to
October 31, 2021.
• Assessing the risks that the description is not fairly presented and that the controls were not suitably
designed or operating effectively.
• Testing the operating effectiveness of those controls to provide reasonable assurance that the
applicable trust services criteria were met.
• Evaluating the overall presentation of the description.
We believe that the evidence we obtained is sufficient and appropriate to provide a reasonable basis for our
opinion.
Inherent Limitations
Because of their nature, controls at a service organization may not prevent or detect and correct, all errors or
omissions in providing services. Also, the projection to the future of any evaluation of the fairness of the
5
presentation of the description or conclusions about the suitability of the design or operating effectiveness of
the controls is subject to risks that the system may change or that controls at a service organization may become
ineffective or fail.
Opinion
In our opinion, in all material respects, based on the description and the applicable trust services criteria:
a. The description fairly presents the system that was designed and implemented throughout the period
November 01, 2020 to October 31, 2021.
b. The controls stated in the description were suitably designed to provide reasonable assurance that the
applicable trust services criteria would be met if the controls operated effectively throughout the
period November 01, 2020 to October 31, 2021.
c. The controls operated effectively to provide reasonable assurance that the applicable trust services
criteria were met throughout the period November 01, 2020 to October 31, 2021.
The specific controls we tested, the tests performed and the results of our tests are presented in section 4,
“Independent Service Auditor’s tests of controls and results of tests”.
Restricted use
This report, including the description of tests of controls and results thereof in section IV are intended solely
for the information and use of Cyient ; user entities of Cyient ’s Engineering Design, Spatial Data & Software
Services for the period November 01, 2020 to October 31, 2021; and prospective user entities, independent
auditors, practitioners providing services to such user entities and regulators who have sufficient knowledge
and understanding of the following:
This report is not intended to be and should not be used by anyone other than these specified parties.
Panaiyur.S.Gopalakrishnan
Date: February 10, 2022 CPA, CITP, CISA, CISSP, FCA, CEH, QSA
Place: Chennai, India CPA License No. 22897
ICAI M.No. 021409
UDIN: 22021409ABEVZD8980
6
Section II: Management Assertion
7
Assertion by Management of Cyient Limited
We have prepared the accompanying description of Cyient Limited’s (Cyient) accompanying description of
services titled "Description of Cyient’s Engineering Design & Spatial Data Services " throughout the period
November 01, 2020 to October 31, 2021, (description) based on the criteria for a description of a service
organization’s system in DC section 200, 2018 Description Criteria for a Description of a Service
Organization’s System in a SOC 2® Report (AICPA, Description Criteria) (description criteria). The
description is intended to provide report users with information about the Engineering Design & Spatial
Data Services that may be useful when assessing the risks arising from interactions with Cyient’s system,
particularly information about system controls that Cyient has designed, implemented, and operated to
provide reasonable assurance that its service commitments and system requirements were achieved based
on the trust services criteria relevant to Security, Confidentiality and Availability (applicable trust services
criteria) set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing
Integrity, Confidentiality, and Privacy, (AICPA, Trust Services Criteria).
Cyient uses subservice organizations for Managed Security Operations Centre and helpdesk ticketing
services. The description indicates that complementary subservice organization controls that are suitably
designed and operating effectively are necessary, along with controls at Cyient, to achieve Cyient’s service
commitments and system requirements based on the applicable trust services criteria. The description
presents Cyient’s controls, the applicable trust services criteria, and the types of complementary subservice
organization controls assumed in the design of Cyient’s controls. The description does not disclose the
actual controls at the subservice organization.
The description indicates that complementary user entity controls that are suitably designed and
operating effectively are necessary, along with controls at Cyient, to achieve Cyient’s service
commitments and system requirements based on the applicable trust services criteria. The
description presents Cyient’s controls, the applicable trust services criteria, and the complementary
user entity controls assumed in the design of Cyient’s controls.
a. the description presents Cyient’s Engineering Design & Spatial Data Services that was
designed and implemented throughout the period November 01, 2020 to October 31, 2021, in
accordance with the description criteria.
b. the controls stated in the description were suitably designed throughout the period November
01, 2020 to October 31, 2021, to provide reasonable assurance that Cyient’s service
commitments and system requirements would be achieved based on the applicable trust
services criteria, if its controls operated effectively throughout that period, and if the user
entities applied the complementary controls assumed in the design of Cyient’s controls
throughout that period.
c. the controls stated in the description operated effectively throughout the period November
01, 2020 to October 31, 2021, to provide reasonable assurance that Cyient’s service
commitments and system requirements were achieved based on the applicable trust services
criteria, if complementary user entity controls assumed in the design of Cyient’s controls
operated effectively throughout that period.
Authorised Signatory
10
Description of CYIENT – Engineering Design & Spatial Data Services for the period
November 01, 2020 to October 31, 2021
Cyient aligns with industry best practices and internationally renowned standards and frameworks like Quality
management system ISO 9001:2015, Information Security Management System 27001:2013, Aerospace
(AS9100 Rev D), Medical Devices (ISO 13485:2016), IRIS (ISO/TS 22163:2017), Environmental Management
System ISO 14001:2015, Occupational Health and Safety Management system OHSAS 18001 and CMMI Dev
1.3, Telecommunication system TL9000 R6.0 and information technology service management system ISO
20000.
The services ‘Engineering Design & Spatial Data Services- Including Modelling, Analysis, Design, Product
Development, Implementation, Conversion, Manufacturing Support and Maintenance’ are carried out by the
organization at the entity that is in scope
The Data center services that is within the scope of this examination are carried out at the other site of
Cyient’s where this primary Data Center situated 10 km far from the entity that is in scope.
Subservice Organizations
Cyient utilizes the following subservice providers for various functional activities and are not included within
the scope of this examination.
Service Now – SAAS based application for end user requests handling through ticketing system
Tata Communications Limited (TCL)- Managed Security Operations Centre
Location-1: Plot No 11, Software Units layout, infocity, Madhapur, Hyderabad, India
Location- 2: Plot No-2, IT Park, ISB Road, Nanakramguda, Near Continental Hospital, Gachibowli, Hyderabad,
Telangana 500032 limited to Data Center Operations
Any office location other than the above is not included in the scope of the current examination. The report
excludes all processes and activities that are executed outside above locations.
Cyient has its offices/subsidiaries in other 45 geographical locations. These are not included in the scope of
the report. Unless otherwise mentioned, the description and related controls apply to locations covered by
the report.
11
Cyient designs its processes and procedures related to the System to meet its objectives. Those objectives are
based on the service commitments that Cyient makes to user entities, the laws and regulations that govern
the provision of products and services to its clients, and the financial, operational, and compliance
requirements that Cyient has established for the services. Security commitments to user entities are
documented and communicated in customer agreements, as well as in the description of the service offering
provided online.
Cyient establishes operational requirements that support the achievement of security commitments,
relevant laws and regulations, and other system requirements. Such requirements are communicated in
Cyient's system policies and procedures, system design documentation, and contracts with customers.
Information security policies define an organization-wide approach to how systems and data are protected.
These include policies around how the service is designed and developed, how the system is operated, how
the internal business systems and networks are managed and how employees are hired and trained. In
addition to these policies, standard operating procedures have been documented on how to carry out specific
manual and automated processes required in the operation and development of the System.
Control Environment
Cyient’s internal control environment reflects the overall attitude, awareness, and actions of management
concerning the importance of controls, and the emphasis given to controls in the Company's policies,
procedures, guidelines, methods, and organizational structure.
The Chief Executive Officer (CEO), the Senior Management team and all employees are committed to
establishing and operating an effective Information Security Management System (ISMS) aligned to ISO/IEC
27001:2013 in accordance with its strategic business objectives.
The Management at Cyient is committed to the Information Security Management System, and ensures that
IT policies are communicated, understood, implemented and maintained at all levels of the organization and
regularly reviewed for continual suitability.
Cyient requires Directors, Senior Management, Officers, and all employees to observe high standards of
business and personal ethics in conducting their duties and responsibilities. Cyient promotes Values FIRST
(Fairness, Integrity, Respect, Sincerity and Transparency) as its core ethical values of the company and all
employees are expected to fulfill their responsibilities based on these principles and comply with all
applicable laws and regulations. Cyient promotes an environment of open, transparent communication and
has created an environment where employees are protected from any kind of retaliation should a good faith
report of an ethics violation occur. Executive management has the exclusive responsibility to investigate all
reported violations and to take corrective action when warranted.
Board of Directors
Business activities at Cyient are under the direction of the Board of Directors. The company is governed by
its Board of Directors headed by its Founder & Chairman Mr. B.V.R. Mohan Reddy and ‘Krishna Bodanapu’
12
being the Managing Director & CEO, is in charge of the company’s Global business operations playing a key
role in strategy and client management.
The Executive Management team at Cyient assesses risks prior to venturing into business ventures and
relationships. The size of Cyient enables the executive management team to interact with operating
management on a monthly basis through Operations Council (OC) meetings and Management Review
Meetings (MRM).
The application of protection measures is based on the risk associated with information assets and the
importance of those assets to the organization. As part of this process, threats to security are identified and
the risk from these threats are formally assessed.
Cyient has placed into operation a core Enterprise Risk Management (ERM) and risk assessment process to
identify and manage risks that could adversely affect their ability to provide reliable processing for client
organizations. This process consists of management identifying significant risks in their areas of
responsibility and implementing appropriate measures to address those risks. Senior Management team are
members of forums and core working groups in industry forums that discuss recent developments.
Relevant and important Security Policies (IS Policies) are made available to all employees via Company
Intranet called as “Process Assets Library” (Cyient-PAL) or as relevant hard copy policies to new employees.
Changes to the information security policies are reviewed by HEAD-IT and approved by CIO prior to
implementation.
Cyient has documented procedures covering significant functions and operations for each major work
groups. Policies and procedures are reviewed and updated based upon changes and approval by
management. Departmental managers monitor adherence to Cyient policies and procedures as part of their
daily activities.
Cyient management holds departmental status meetings, along with strategic planning meetings, to identify
and address service issues, customer problems, and project management concerns. For each service, there is
a selected service manager who is the focal point for communication regarding the service activity.
Additionally, there are personnel that have been designated to interface with the customer if processing or
systems development issues affect customer organizations. Electronic messaging has been incorporated into
many of Cyient’s processes to provide timely information to employees regarding daily operating activities
and to expedite management’s ability to communicate with Cyient employees.
13
Electronic Mail (e-Mail)
Communication to Customer Organizations and project teams will be handled through e-Mail as the primary
communication medium. Important corporate events, employee news, and cultural updates are some of the
messages communicated using e-Mail. e-Mail is also a means to draw attention of employees towards
adherence to specific procedural requirements.
Monitoring
Monitoring is the critical aspect of internal control in evaluating whether controls are operating as intended
and whether they are modified as appropriate for changes in business conditions. Cyient management and
Information Security personnel monitor the quality of internal control performance as a routine part of their
activities.
Production systems and infrastructure are monitored through service level monitoring tools like ‘Nagios’,
‘Manage Engine OpManager’ which monitor compliance with service level commitments and agreements.
Reports are shared with applicable personnel and customers, and actions are taken and communicated to
relevant parties, including customers, when such commitments and agreements are not met. In addition, a
self-assessment scan of vulnerabilities is performed using ‘Tenable Nessus Professional’. Vulnerabilities are
evaluated and remediation actions monitored and completed. Results and recommendations for
improvement are reported to management.
Infrastructure
The infrastructure comprises physical and hardware components of the System including facilities,
equipment, and networks.
Cyient offices are equipped with the latest hardware, software and networking infrastructure. Offices are
linked using high speed communication links, backed up by resilient ‘networks and core infrastructure
including network devices’ to improve the SLA.
14
Network Connection to Client Sites
Cyient access the client network(s) via secured Point-to-Point VPN / Citrix Connections. Client application
unique user login Id and password is shared with employees for accessing the client provided server/service.
Clients are notified of any terminations or changes in project personnel for people who have been provided
sign-on ids.
All components are covered by maintenance contracts and tested regularly. Generators are tested
periodically.
Fire Extinguishers and smoke detectors are installed at all sensitive points. Regular check on the working
condition is done, warranty is checked, and AMC is entered on completion of Warranty. ERT team is
formulated by identifying members from each floor. Yearly fire drills are conducted in coordination with
Admin and HR personnel. The fire drill reports are collected, and analysis is made upon them.
15
Temperature and humidity monitoring devices are placed in critical information processing areas and the
reading will be captured and processed by the respective area facility & administration teams for any actions.
Physical Access
Cyient has its global headquarters and delivery center at “Plot #11, Software units Layout, Infocity,
Madhapur, Hyderabad”. The Main building entrance is secured with a security personnel and CCTV
surveillance. Physical and Environmental Security of Cyient is controlled and governed by Cyient ISMS Policy.
Entry to the Cyient offices/data processing areas is restricted to authorized personnel by a badge access
control system. All employees are provided with badge access cards and these cards will also perform
attendance recording. All visitors have to sign the visitors register and are given inactive visitor card.
Employees are granted access only to those areas which they require to access. Some members of the IT
Support Team & Administration team have access to the entire facility. The management team has access to
all areas except the server rooms. Employees are required to wear their access cards / employee
identification cards at all times while within the facility.
CCTV’s placed at each data processing area entrance is enhanced with Artificial Intelligence (AI) to capture
any Piggybacking / Tailgating attempts and log the security events, send the respective alert to the respective
employee manager.
CCTV is implemented to monitor the activities in server room and main entrance and other secure zones.
Admin Team monitors the CCTV recordings. Logs are generated and communicated to the management
periodically. Backup of recordings is stored for 45 days.
ID cards are issued to new employees based on an access requisition initiated by the Human Resource (HR)
group. The HR group creates a ticket in helpdesk ticketing application requesting the IT team and
Administration / Facilities team to issue an access card to the new employee. The IT / Administration team
ensures that the access card/biometric controls configured with the appropriate access rights, and then
issues the same to the employee.
On separation of an employee from the organization, the HR group initiates the 'Exit Process' and circulates
it to all the concerned groups. Based on this, the employee’s privileges in the access control system are
revoked.
Access by visitors, contractors and/or third-party support service personnel’s both entry and exit are
monitored by security personnel. Photography, video, audio or other recording equipment, are not allowed
inside secure premises, unless specifically authorized. Such accesses are recorded, authorized and
monitored. Visitor, contract and/or third-party service personnel to sensitive areas such as data centers are
strictly on “need to have” basis and subject to the principle of least privileges.
16
sensitive areas controlled with separate access cards and bio metric systems. Third parties are allowed access
to the server room only under the supervision of Facility or IT team members
The badge access card along with biometric thumb print opens the door lock for entering into the Data Center.
The Data Center is equipped with resilient systems that can support the availability and continuity of services
at all layers viz power supply, ISP links, Cooling Systems and resilient core network infrastructure. All
services being served through this data center are equipped with state-of-the-art load balancer technologies
to avail high availability.
Firewalls
Palo Alto Firewall’s are configured on the perimeter network to protect IT resources. Firewall and switch
configuration standards are documented. Firewall and switch configurations are reviewed by management
on a quarterly basis.
The ability to modify Palo Alto is limited to the Cyient IT Department. Specifically, IT Department is
authorized to request changes from the provider. Internet Access to Cyient employees is limited through Palo
Alto login and restricted to lower level employees. Sites are allowed based on the nature of the work and the
allowed site categories for the employees. Only frequently used sites are open to the employees for
production purpose. Management level employees are given restricted access through firewall configuration
limiting not to browse any malicious site.
Visitors are limited to use the Internet through Cyient guest Wi-Fi upon specific request at the reception and
a unique guest login. The Guest Wi-Fi is completely isolated from the rest of the Cyient network to maintain
adequate security.
In order to stop any malware from affecting the security of the customer and organizational data, Cyient uses
daily Symantec Endpoint Protection vulnerability scans along with UTM devices. IT team ensures that all the
endpoints in organizations are scanned for any vulnerabilities, including public IPs and services hosted on
Data Center, and that any malware is dealt with efficiently and in a timely manner.
Monitoring
Cyient has devised and implemented adequate monitoring controls to detect unauthorized information
processing activities. Critical servers and systems are configured to log user activities, exceptions and
information security events. System administrator and system operator activities are logged and reviewed
on a periodic basis.
Capacity management controls are put in place to make certain Cyient ’s resources are monitored, tuned and
projections are made to ensure system performance meets the expected service levels and to minimize the
risk of systems failure and capacity related issues. Addition of new information systems and facilities,
upgrades, new version and changes are subject to formal system analysis, testing and approval prior to
acceptance.
17
Patch Management
Corporate IT team will maintain contacts with software principles (Ex. Microsoft) and receive monthly
security inputs on critical updates released. Patches are tested and confirmed by IT team before applying to
the production environment. Before deployment of any patches they are tested and deployed by the
corporate IT teams and business IT SPOC’s. The patch management activity is done regularly or as and when
any critical changes to the computing environment.
As per the audit calendar, all the network settings are audited for any vulnerability by doing scans
periodically. These scans are done by the system admin internally. McAfee endpoint protection is installed
with the feature of scanning the device automatically and log reports are reviewed by the system admin.
All inbound and outbound e-Mails are scanned for spam, phishing, viruses and are filtered by Cisco IronPort
at gateway and further scanned automatically using TrendMicro Deep Discovery E-mail inspector (Advanced
Threat Protection) for any advanced threats. Anti-malware and end-point Host Intrusion Protection System
(HIPS) practices are in accordance with Cyient malware protection policy.
‘Forcepoint DLP’ an end-point protection has been installed on all the desktops & Laptops to prevent
unauthorized data transfers outside the organization through various medium like web, e-mail, usb, CD/DVD,
Bluetooth and any mobile apps.
People
Organizational Structure
The organizational structure of Cyient provides the overall framework for planning, directing, and
controlling operations. It has segregate personnel and business functions into functional groups according
to job responsibilities. This approach helps enable the organization to define responsibilities, lines of
reporting, and communication, and helps facilitate employees to focus on the specific business issues
impacting Cyient clients.
18
Mr. Krishna Bodanapu is responsible for oversight of global Cyient. The Cyient site is locally managed by the
following individuals / teams:
• Engineering
• Finance
• Marketing
• Sales
• Quality Assurance
• Product Delivery
• Information Technology
• Administration
• Human Resources
• Business Development
The management team meets periodically to review business unit plans and performances. Weekly, monthly
meetings and calls with senior management, and department heads are held to review operational, security
and business issues, and plans for the future.
Cyient’s Information Security policies define and assign responsibilities/accountabilities for information
security. Regular management meetings are held to discuss the security level, changes, technology trends,
occurrence of incidents, and security initiatives
19
The Board of Directors (‘the Board’) is ultimately accountable for corporate governance as a whole. The
management and control of information security risks is an integral part of corporate governance.
The MD & CEO lays down the security policy and objectives, and delegates’ responsibilities for
implementation of the information security system. He also formulates the Security Council, which is
comprised of representatives from various functions and locations of the company. The group shall be
reviewing the functioning of the information security systems and its effectiveness at least once in 6 months.
The Chief Information Officer (CIO), acting as the Chief Information Security Officer (CISO), is responsible
for the preparation and maintenance of this CISM, enforcing policies and ensuring compliance, to assure
protection of information assets. The CIO and GEO specific IT Directors will also maintain contacts with
special interest groups such as CERT, SANS, NASSCOM, DSCI, CII and any local security bodies along with
other technology partners in the industry.
Board of Directors
Board of directors shall review the overall security program, investments around information security to
ensure controls in place and they are adequate to meet the statutory & regulatory requirements for
protecting the interests of stake holders.
20
The MD&CEO has charged the Security Council with the task of securing Cyient’s information and
information related assets.
Information security activities shall be coordinated throughout Cyient by the Security Council, to ensure
consistent application of these security principles, axioms and policy statements.
Security Council
The Security Council comprised of representatives from all functional and delivery locations having
responsibilities for Management oversight and direction for both physical and logical aspects of Information
security, Coordinating and directing Cyient’s entire security framework, including the information security
controls at all Cyient locations
Commissioning or preparing information security policy statements, ensuring their compliance with the
principles and axioms approved by the Executive Chairman and formally approving them for use throughout
Cyient
Periodically reviewing the security policy statements to ensure the efficiency and effectiveness of the
information security controls and recommending improvements wherever necessary Identifying significant
trends and changes to Cyient’s information security risks and, where appropriate, proposing changes to the
controls framework and/or policies
Reviewing serious security incidents and, where appropriate, recommending strategic improvements
to address any underlying root causes
Periodically reporting on the status of the security controls infrastructure to the Executive Chairman, and
liaising as necessary with the Risk Management and Audit Committees etc., using metrics and other
information supplied by the CIO, local security committees, the Information Security Manager, Internal Audit
and others.
The Security Council delegates some of its responsibilities, however it remains accountable for the overall
effectiveness of information security throughout Cyient.
Taking the lead on information governance as a whole - for example by issuing the policy manual and by
enforcing the overall strategic direction, support and review necessary to ensure that information assets are
identified and suitably protected throughout Cyient.
Appointing the IT-Governance, Risk and Compliance team for information security implementation
and compliance.
IT-Security Team
Implementation of the information security framework and controls
21
Defining technical and non-technical information security procedures, guidelines processes, methodologies
and support for their implementation
Supporting information asset owners, project security coordinators and CDU heads in defining,
implementation of controls, processes and supporting tools to comply with the policy manual to manage
information security risks
Assisting and supporting information asset owners, project security coordinators in the investigation
and remediation of information security incidents or other policy violations
Reviewing and monitoring compliance with the policy statements and contributing to internal audit and
control self-assessment (CSA) processes
Collecting, analyzing and communicating information security metrics and information related incidents
Liaising as necessary with related internal functions such as IT operations, compliance and internal audit, as
well as external functions when appropriate
Organizing a security awareness drive for personnel to enhance the security culture and develop a broad
understanding of the information security requirements.
Verifying that suitable technical, physical and procedural controls are in place in accordance with the manual,
and are properly applied and used by all associates. In particular, they shall take measures to ensure that
Cyient Associates:
Providing the direction, resources, support, and review necessary to ensure that information assets are
appropriately protected within the respective areas.
Risk Owner
Risk owners are the highest level of authority, accountable to manage the risk and have the authority to
approve the risk treatment plans and residual risks.
• Undertaking or commissioning information security risk assessments, to ensure that the information
security requirements are properly defined and documented during the early stages of development.
• Appropriate classification and protection of the information assets.
• Specifying and funding suitable protective controls.
• Authorizing access to information assets in accordance with the classification and business needs
• Ensuring timely completion of regular system/data access reviews
• Monitoring compliance with protection requirements affecting their assets.
22
Department Information Security Off (DISO)
The Department Information Security Coordinator is the single point of contact between project teams,
customer liaison, and IT teams, in implementation and adherence to controls by associates in their respective
project(s).
All Associates
All Associates (i.e. employees on the payroll and others acting in a similar capacity, such as contractors,
consultants, student placements etc.) are responsible for complying with the principles, axioms and policies
in the information security policy manual where relevant to their jobs. They are responsible for maintaining
the security of information and related assets entrusted to them. Upon hire, as a condition of employment,
each associate undertakes to comply with Cyient’s information security policies. Any associate failing to
comply with the security policies would be subject to disciplinary action.
The Security Policy and Security Objectives of Cyient are available for all associates on the intranet
(Cyient PAL).
Commitment to competence
Cyient’s formal job descriptions outline the responsibilities and qualifications required for each position in
the company. Training needs are identified on an ongoing basis and are determined by current andanticipated
needs of Business. Employees are evaluated on an Annual basis to document performance levels and to
identify specific skill training needs
23
The Human Resources department review these policies and procedures along with relevant internal
functional departments on periodic basis to ensure they are updated to reflect changes in the organization
and the current operating environment. Employees are informed of these policies and procedures upon their
hiring and sign an acknowledgement form confirming their receipt. Personnel policies and procedures are
documented in the Cyient Human Resources Policy.
Background and reference checks are completed for prospective employees prior to employment through the
independent third-party service providers. Employees are required to sign Employee Confidentiality
Agreement and are on file for employees. Discrepancies noted in background investigations are documented
and investigated by the Human Resources Department in conjunction with a third-party verification agency.
Any discrepancies found in background investigations result in disciplinary actions, up to and including
employee termination.
Performance Evaluation
Cyient has a performance review and evaluation program to recognize employees for performance and
contributions. Cyient performance evaluation process is also used to help employees improve their
performance and skill levels. Employees performance reviews, promotion and compensation adjustment are
performed every 12 months. The performance evaluation is reviewed with the employee and signed by the
employee and their manager. For specific cases, Interim performance reviews shall be carried out by the HR
to meet the market benchmarking compensation levels.
Employee Terminations
Termination or change in employment is being processed as per Cyient HR related procedures. There are
clearly identified and assigned responsibilities with regard to termination or change in employment.
24
All employees, contractors and third-party personnel are required to return physical and digital
Identification/access tokens provided to them by Cyient or its clients on their termination of employment or
contract.
Access privileges are revoked upon termination of employment, contract or agreement. In case of change of
employment /role, rights associated with the prior roles are removed and new access privileges are created
as appropriate for the current job roles and responsibilities.
Ethical Practices
Cyient reinforces the importance of the integrity message and the tone starts at the top. Every employee,
manager and director consistently maintain an ethical stance and support ethical behaviour. Employees at
Cyient encourage open dialogue, get honest feedback and treat everyone fairly, with honesty and objectivity.
Procedures
IT policies and operating instructions are documented. Procedures described cover server management,
server hardening, workstation security system, network management, security patch management, user
creation, system audit, ID card activation, etc. Additionally, production and training standard operating
procedures are available.
Help Desk
Cyient has put in place a helpdesk function that function within the IT Department and an integrated helpdesk
to handle problems and support requirements of users. support users in case of incidents and manage them
without disruption to Cyient ’s business and ensures that changes to any component of Cyient ’s information
assets and infrastructure are controlled and managed in a structured manner.
All requests received at the Help Desk are classified as to their priority & criticality and resolved within the
maximum resolution time as detailed in the Cyient helpdesk Change Management and Incident Response
Procedure.
Change Management
Cyient has implemented a well-defined Change management process to ensure that all changes to the
information processing facilities, including equipment, supporting facilities and utilities, networks,
application software, systems software and security devices are managed and controlled. The Change
Management process describes a methodical approach to handle the changes that are to be made to any work
product. All the changes need to be subjected to a formal Change Management process.
25
Change Management covers any change to the Information assets and infrastructure of Cyient and include but
not limited to addition/ modification in the application, application components, database structure, DBMS,
system and network components, policies and procedures.
Every change to such base lined components is governed by the change control and management procedures
as outlined in the Helpdesk, Change management and Incidence Response procedure. Cyient’s change
management process requires all security patches and system and software configuration changes to be tested
before deployment into Staging or Production environments.
All changes are recorded, approved, implemented, tested and versioned before moving to production
environment. The impact of implementing every significant change are analyzed and approved by the IT Head
before such implementation. A sign-off shall be obtained from the personnel who had requested for the change
after implementation of the change. The effectiveness of the Change Management process is reviewed on a
quarterly basis by CIO.
When an incident is detected or reported, a defined incident response process is initiated by authorized
personnel. Corrective actions are implemented in accordance with defined policies and procedures. Root-
cause analyses of all the incidents are performed and the root cause identified shall remedy and reported. The
actions proposed from the root-cause analyses are approved by CTO.
Logical Access
Only the IT team has access to change user profile or give higher access. Other employees do not have local
admin privileges on their desktops, only IT team has access to install software on employees' machines. The
ability to create or modify users and user access privileges is limited to the IT team.
Access to resources is granted to an authenticated user based on the user’s identity through a unique login ID
that is authenticated by an associated password. Assets are assigned owners who are responsible for
evaluating the appropriateness of access based on job roles. This is documented in Access Control Matrix.
26
Roles are periodically reviewed and updated by asset owners regularly. Privileged access to sensitive
resources is restricted to IT team. Access to storage, backup data, systems, and media is limited to IT team
through the use of physical and logical access controls.
Security Configuration
Employees establish their identity to the local network and remote systems through the use of a valid unique
user ID that is authenticated by an associated password. Use of encrypted VPN channels help to ensure that
only valid users gain access to IT components. Remote access is not permitted to any employee.
Passwords are controlled through Password policy and include periodic forced changes, password expiry and
complexity requirements. User accounts are disabled after a limited number of unsuccessful logon attempts;
the user is required to contact the IT Support team to reset the password. Local users do not have access to
modify password rules.
Guest and anonymous login accounts are disabled are not allowed on any machines. Local administrator
privilege is restricted to the IT Support Team and is not available to other users. However, where the project
need the team members to have the local admin access, respective line manager will raise a request to senior
management, which can approve or deny the request based on its merit.
Unattended desktops are locked within a time of inactivity. Users are required to provide their password to
unlock the desktop.
Confidentiality
Cyient classifies data as ‘Highly Confidential’, ‘Confidential’, ‘Internal’ and ‘Public’. Access to data is restricted
through password-controlled folders and any external data transfers are monitored using Forcepoint DLP¬
Secure procedures are established to ensure safe and secure disposal of media when no longer required. The
level of destruction or disposal of media would depend on the information or data stored in the media and the
criticality of the information as per the information classification guideline.
27
Media Disposal process ensures that the disposal of unwanted media viz. HDD’s, Tapes, print copies, CD’s etc.,
are disposed timely to protect and maintain the secure disposal of the information and data.
Cyient has put in place backup processes that define the type of information to be backed up, backup cycles
and the methods of performing backup. Monthly back-up copies are stored in a secure off-site location; the
backup media are tested for restoration on a periodic basis to ensure the effectiveness and integrity of backup.
All backup copies are tested periodically to ensure that the data and information are securely retrievable in
the event of an emergency without any loss of information. Users are made aware through adequate training
their responsibilities for ensuring backup of required data and information.
Restoration is done in two cases – primary case is when a Cyient member makes a request to recover some
data that they might have lost. The other case when a restoration test is done during our regular DR test. The
relevant IT personnel (i.e., the backup administrator) ensures that the data is restored appropriately and
inform back to the requester for verification and use.
Cyient has determined that Processing Integrity and Privacy trust services Categories are not relevant to the
system.
Contractual Arrangements
• User organizations are responsible for understanding and complying with their contractual
obligations to Cyient such as providing input information, review and approval of processed output
and releasing any instructions.
28
Other Controls
Security:
1. Restrict access to data and systems applying the least-privileged principle through logical and physical
access management processes. (CC 6)
2. Monitor key system components for security incidents to identify and respond to security threats
timely through logical and manual security logging and monitoring processes. (CC 7.3)
3. Use of encryption technologies to protect user organization data both at rest and in transit. (CC 6.7)
4. Implement authorized and tested changes to system components through development and change
management processes. (CC 8)
Availability:
5. Maintain and monitor an infrastructure that ensures user organization data are replicated and backed-
up at multiple locations.(A1.2)
6. Maintain and monitor an infrastructure that ensures user organization capacity demands are met.
(A1.1)
Confidentiality:
7. Maintain data classification standards and processes to identify confidential user organization data.
(CC 6.1)
8. Restrict access to confidential data applying the least-privileged principle through logical and manual
physical access management processes. (CC 6.1)
29
Section: IV: Independent Service Auditor’s description of Tests
of Controls and Results
30
Independent Service Auditor’s description of Tests of Controls and Results
Overview
This report on the controls at Cyient (Service Organization) is intended to provide an opinion on the fairness
of the presentation of the description of Cyient’s system; the suitability of the design of the controls to achieve
specified control objectives and the operating effectiveness of those controls in place at Cyient throughout the
period from November 01, 2020 to October 31, 2021. Our examination of Cyient‘s controls was restricted to
the control objectives and the related controls specified by Cyient in Section IV and was not extended to
controls in place at user locations or other control procedures, which may be described in Section III but not
listed in Section IV.
The examination was performed in accordance with AICPA Statement on Standards for Attestation
Engagements No. 18 (SSAE18), “Attestation Standards: Clarification and Recodification” read with AT-C 105,
Concepts common to attestation engagements, AT-C 205, Examination engagements and the AICPA guide to
Reporting on controls at a Service Organization relevant to Security, Availability, Processing Integrity,
Confidentiality or Privacy (SOC 2®). It is the responsibility of User entities (User Organization) to evaluate this
information in relation to the controls in place at each user location to assess the total control environment. If
effective user controls are not in place, Cyient’s controls may not compensate for such weaknesses.
This report on Controls at a Service Organization relevant to Security, Confidentiality, Availability and the
suitability of the design and the operating effectiveness of those controls is intended to provide interested
parties with information sufficient to understand the basic structure of controls within Cyient. This report,
when coupled with an understanding of controls in place at user locations, is intended to permit evaluation of
the total system of internal control surrounding the reviewed systems.
The criteria for evaluating the fairness of presentation of the description of the system of Cyient are as follows:
i. Information regarding the types of services provided
ii. Components of the system used to provide the services comprising of:
a. Infrastructure
b. Software
c. People
d. Procedures; and Data
iii. Boundaries of the system covered
iv. Capturing and addressing significant events and conditions by the system; and
v. Process used to prepare and deliver reports and other information to User entities (User Organization)
31
Test of operating effectiveness of controls:
Our tests of effectiveness of the controls included such tests as we considered necessary in the circumstances
to evaluate the suitability of the design of the controls to achieve specified control objectives and the operating
effectiveness of those controls achieved during the period from November 01, 2020 to October 31, 2021. Our
tests of the operational effectiveness of controls were designed to cover a representative number of
transactions and procedures throughout the period of November 01, 2020 to October 31, 2021, for the controls
listed in Section IV, which are designed based on the Security, Confidentiality, Availability criteria are outlined
in TSP Section 100 (2017), Trust Services Criteria. In selecting a particular test of the operational effectiveness
of controls, the following were considered: (a) the nature of the items being tested, (b) the types and
competency of available evidential matter, (c) the nature of the audit objectives to be achieved, (d) the assessed
level of control risk and, (e) the expected efficiency and effectiveness of the test.
The types of tests performed with respect to the information addressed in Section IV and of the operating
effectiveness of controls as detailed in Section IV are briefly described below:
Test Description
The following information pertains to tests of operating effectiveness performed by Independent Auditors.
Tests were performed only of those controls specifically identified. Testing of the operating effectiveness of
identified controls was performed during the period from November 01, 2020 to October 31, 2021. The nature
and extent of tests performed, along with the specific control objective they were designed to achieve, are
identified in the table below.
Sampling
In accordance with AICPA authoritative literature, professional judgment is utilized to consider the tolerable
deviation rate, the expected deviation rate, the audit risk, the characteristics of the population, and other
factors, in order to determine the number of items to be selected in a sample for a test. Samples were selected
in such a way that they were expected to be representative of the population. This included judgmental
selection methods, where applicable, to ensure representative samples were obtained.
Observation and inspection procedures were performed related to certain system-generated reports, listings,
and queries to assess the accuracy and completeness (reliability) of the information used in the performance
of our testing of the controls.
32
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
CONTROL ENVIRONMENT
CC1.1 The entity demonstrates a commitment to integrity and ethical values.
Inspection:
Inspected the following and determined that the
defined controls are in place:
• Cyient Vision/Mission statements published
and circulated amongst the employees
• Whistle Blower policy
• Disciplinary action policy
33
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
Observation:
Observed the internal portal for a select sample of
employees and determined that code of conduct is
reviewed and accepted.
CC 1.2 The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control
CC 1.3 Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.
34
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Information Security Policies are reviewed and • Allocation of information security
approved by the Management at least annually. responsibility is documented in
information security manual available at
• Allocation of information security responsibility CYIENT PAL
is documented in information security manual • Authority limits, delegation of powers and
available at CYIENT PAL (Document repository). other responsibilities are in place for
significant roles.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Cyient Organization chart
• Review history of policy documentation
• Information Security Manual
Observation:
Observed the Cyient Pal portal and noted that the
company has defined and documented Information
security related policies and procedures shared
internally via CYIENT PAL.
CC 1.4 The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
35
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
employment including a brief description of • New employees sign offer letter as their
position and other terms. agreement and acceptance of broad terms of
employment including a brief description of
• Talent acquisition team initiates the position and other terms.
background check process with an external
vendor prior to onboarding.
• Talent acquisition team initiates the
background check process with an external
• Newly hired personnel are provided sufficient
vendor prior to onboarding.
training before they assume the responsibilities
of their new position.
• Newly hired personnel are provided sufficient
• The induction training given by HR includes
training before they assume the responsibilities
information security training. In this training
of their new position
the HR, physical access and security polices are
explained.
• An awareness refresher training is provided to
• An awareness refresher training is provided to
all employees on at least annual basis. These are
all employees on at least annual basis. These are
rolled out as digital E Learning.
rolled out as digital E Learning.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Job descriptions for a select sample of roles
36
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Cyber Security Awareness Program completion
status for a select sample of employees.
• Offer letter, NDA, background check reports,
acceptable use policy acknowledgement and
induction training attendance for a select
sample of new joiners
• Employee Code of conduct
Observation:
Observed the Cyient PAL portal and noted that
policy and procedure documents are maintained
and updated.
CC 1.5 The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
37
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
CC 2.1 The entity obtains or generates and uses relevant, quality information to support the functioning of internal control.
• Internal audits are performed, results are Inquiry: No exceptions noted
communicated and corrective actions Inquired with the Senior Manager- Corporate
monitored. Quality and ascertained that:
• Internal audits are performed, results are
• Timely reporting is carried out internally by
communicated and corrective actions
all major departments.
monitored.
• Timely reporting is carried out internally by all
major departments.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• select sample of process wise internal audit
reports, Non-conformity and corrective action
reports
• Select sample of monthly report- control tower
for tracking deliverables, resource efficiency
and other metrics-maintained project wise
CC 2.2 The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of
internal control.
• Employees/associates can express their Inquiry: No exceptions noted
concern/issues/grievances through MYCYIENT Inquired with the Senior Manager- Corporate
portal and feedback through annual ASAT Quality and ascertained that:
survey • Employees/associates can express their
concern/issues/grievances through MYCYIENT
• An organizational wide incident management portal and feedback through annual ASAT
process is in place enabled through MYCYIENT survey
portal. IT specific incidents are captured • An organizational wide incident management
through GHD(Global help desk) and information process is in place enabled through MYCYIENT
security incidents through security incident portal.
management portal.
38
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• An awareness refresher training is provided to
all employees on at least annual basis covering
• An awareness refresher training is provided to security objectives. These are rolled out as
all employees on at least annual basis covering Information Security Awareness Program.
security objectives. These are rolled out as Users are informed of the process for reporting
Information Security Awareness Program. complaints and security breaches during
Users are informed of the process for reporting induction Security Training.
complaints and security breaches during • Security policies are published and
induction Security Training. disseminated to employees via Cyient PAL
intranet
• Security policies are published and
disseminated to employees via Cyient PAL
Inspection:
intranet
Inspected the following documents and determined
that the defined controls are in place:
• Select sample of incident tickets from
MYCYIENT portal and IT incidents tickets from
GHD helpdesk
• Cyber Security Awareness Program completion
status for a select sample of employees.
• Select sample of emails sensitizing employees
about phishing, work from home best practices,
cyber security awareness and privacy best
practices.
Observation:
Observed the MyCyient portal and noted that
employees can report concern/issues/grievances
through their respective dashboards. Also noted that
ASAT feedback is collected from employees for
various initiatives within the organization.
39
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
Observed the CYIENT PAL portal and noted that
policy documents are stored in the centralized
repository.
CC 2.3 The entity communicates with external parties regarding matters affecting the functioning of internal control.
• Company's security, availability and Inquiry: No exceptions noted
confidentiality commitments regarding the Inquired with the Senior Manager- Corporate
system are included in the client contracts / Quality and ascertained that:
SOW. • Company's security, availability and
confidentiality commitments regarding the
system are included in the client contracts /
• Customer specific SLA commitments are SOW.
monitored on a periodic basis. These are shared • Customer specific SLA commitments are
with customers based on the customer monitored on a periodic basis. These are shared
requirements. with customers based on the customer
requirements.
• Customers provide their issues, complaints or • Customers provide their issues, complaints or
feedback through email to Business Heads. feedback through email to Business Heads.
• A client escalation matrix is in place to ensure
• A client escalation matrix is in place to ensure that communication channels for external users
that communication channels for external users are available on a timely basis.
are available on a timely basis. • Changes to systems, network, working
arrangements, employees are communicated to
• Changes to systems, network, working clients, if it impacts their operations
arrangements, employees are communicated to • Incidents impacting external users are
clients, if it impacts their operations communicated to them through emails along
with root cause analysis, if required.
• Customer can provide their issues, complaints or
feedback through email to Business Heads, Observation:
customers feedback is collected annually • Observed a select sample of MSAs entered into
through survey (CSAT) with customers and noted that Company's
security, availability and confidentiality
commitments regarding the system are
included in the client contracts / SOW.
40
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Observed the CSAT surveys collected from
customer and noted that feedback mechanism is
in place.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Select sample of monthly report- control tower
for tracking deliverables, resource efficiency
and other metrics-maintained project wise
• client escalation matrix
• Integrated Project Management Plan for the
project in scope specifying the methodology of
execution, responsibilities of Cyient and the
customer.
• Select sample of emails notifying customers of
changes to workforce members for
creation/modification of access
RISK ASSESSMENT
CC 3.1 The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
41
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
Inspection:
• Inspected the Information Security Operational
Risk Management Procedure and determined
that the defined controls are in place.
CC 3.2 The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be
managed.
• Policies and procedures related to risk Inquiry: No exceptions noted
management are developed, implemented, and
Inquired with the Senior Manager- Corporate
communicated to personnel.
Quality and ascertained that:
• A risk assessment is performed atleast on an • Policies and procedures related to risk
annual basis. management are developed, implemented, and
communicated to personnel.
• As part of this process, threats to security are • A risk assessment is performed atleast on an
identified and the risk from these threats is annual basis.
formally assessed. • As part of this process, threats to security are
identified and the risk from these threats is
formally assessed.
• Risk treatment plans are in place to respond to
risks. • Risk Mitigation Plans and action trackers are in
place to respond to risks.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Information Security Operational Risk
Management Procedure
• Risk Management Plan done process wise
• Risk treatment plan
CC 3.3 The entity considers the potential for fraud in assessing risks to the achievement of objectives.
42
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Company has defined a formal risk management Inspection: No exceptions noted
process for evaluating risks based on identified • Inspected a select sample of process wise Risk
vulnerabilities, threats, asset value and Assessment reports and determined that
mitigating controls. Company has defined a formal risk management
process for evaluating risks based on identified
• A risk assessment is performed atleast on an vulnerabilities, threats, asset value and
annual basis. mitigating controls.
Inquiry:
Inquired with the Senior Manager- Corporate
Quality and ascertained that risk management policy
documents the process for risk evaluation.
CC 3.4 The entity identifies and assesses changes that could significantly impact the system of internal control.
• The Risk and Compliance team evaluates the Inquiry: No exceptions noted
design of controls and mitigation strategies in Inquired with the Senior Manager- Corporate
meeting identified risks and recommends Quality and ascertained that:
changes in the control environment. • Cyient has a risk identification process which
considers changes to the regulatory, economic,
• Whenever new products or services are added and physical environment in which the entity
or its business model changes, a risk assessment operates.
is carried out for the new service.
CC 4.1 The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and
functioning.
43
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• The internal audit function conducts process Inspection: No exceptions noted
wise reviews on a periodic basis and findings
Inspected the following documents and determined
are remediated on a timely basis.
that the defined controls are in place:
• Internal audit team is staffed with competent • Internal audit reports for a select sample of
professionals with technical expertise and projects
relevant certifications. • Corrective action taken on Internal audit
findings
Inquiry:
Inquired with the Senior Manager- Corporate
Quality and ascertained that:
• The internal audit function conducts process
wise reviews on a periodical basis.
• Results and recommendations for improvement
are reported to management.
• Internal audit team is staffed with competent
professionals with technical expertise and
relevant certifications.
CC 4.2 The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including
senior management and the board of directors, as appropriate.
• The internal audit function conducts process Inquiry: No exceptions noted
wise reviews on a periodic basis. Results and
Inquired with the Senior Manager- Corporate
recommendations for improvement are
Quality and ascertained that:
reported to management via security council
meetings. • The internal audit function conducts process
wise reviews on a periodic basis. Results and
recommendations for improvement are
• All internal audit issues are tracked until closure
reported to management.
to ensure that these are closed.
• All internal audit issues are tracked until closure
to ensure that these are closed.
44
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Internal audit reports for a select sample of
projects along with corrective action plan on the
findings
• Select sample of Security Council meeting
minutes
CONTROL ACTIVITIES
CC 5.1 The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
45
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Select sample of emails sensitizing employees
about phishing, work from home best practices,
cyber security awareness and privacy best
practices.
• Internal audit reports for a select sample of
projects along with corrective action plan on the
findings
• Master Organization chart of Cyient
CC 5.2 The entity also selects and develops general control activities over technology to support the achievement of objectives.
46
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Risk Assessment is reviewed and approved by
respective department head
CC 5.3 The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action.
Inquiry: Exception noted
• All policies are updated/reviewed at least every Inquired with the Senior Manager- Corporate
In some instances, MKPSG could not verify if the
year to ensure that these are current and in line Quality and ascertained that:
policy documents were periodically reviewed in the
with the current business.
absence of relevant information in the policy
• All policies are reviewed at least every year to
document version history.
• The compliance department assesses adequacy ensure that these are current and in line with
and relevance of policy and procedures. the current business.
• The compliance department assesses adequacy
and relevance of policy and procedures.
Inspection:
Inspected the version history of the policy
documentation and determined that annual review
process is in place.
LOGICAL AND PHYSICAL ACCESS CONTROLS
CC 6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security
events to meet the entity’s objectives.
47
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Network diagrams are documented covering control, configuration settings, and
Cyient infrastructure standardized policies.
• Infrastructure components and software are • Network diagrams are documented covering
configured to use the Windows security using Cyient infrastructure
group policies & Active Directory.
• Infrastructure components and software are
• Password policy and complexity requirements configured to use the Windows security using
are enabled in the Active Directory. Minimum group policies & Active Directory.
length, password history, password age, account
• Remote working is enabled via VPN and Akamai
lockout attempts and duration are set,
cloud
• Remote working is enabled via VPN • The IT department maintains an up-to-date
listing of all software.
• The IT department maintains an up-to-date
listing of all software. • All Assets are assigned owners who are
responsible for evaluating access based on job
• All Assets are assigned owners who are
roles. The owners define access rights when
responsible for evaluating access based on job
assets are acquired or changed.
roles. The owners define access rights when
assets are acquired or changed. • Privileged access to sensitive resources is
restricted to defined user roles and access to
• Privileged access to sensitive resources is
these roles must be approved by Management.
restricted to defined user roles and access to
these roles must be approved by Management.
• All confidential data is classified as per the data
Privileged access is authorised by COO and
classification policy as part of Cyient
reviewed by IT on a periodic basis.
Information Security Manual
Inspection:
• All confidential data is classified as per the data
Inspected the following documents and determined
classification policy
that the defined controls are in place:
• All information assets are identified in an asset • Access Control Policy and Procedure, Cyient
inventory. Information Security Manual
• Patch Management group policy, vendor
document on firewall security guidelines
• Network diagram of Cyient Head office and
Manikonda Data Center
48
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Password policy configuration in the Active
Directory
• IT asset inventory
Observation:
• Observed the Global protect VPN configuration
and noted that secure remote access channel is
configured.
• Observed the Active directory groups and noted
that Administrator groups with privileged
access are defined and monitored
CC 6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is
administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer
authorized.
• On the day of joining, HR triggers an email from Inspection: No exceptions noted
Workday application which sends a mail to Inspected the following documents and determined
global helpdesk providing the details of the new that the defined controls are in place:
joiners. The helpdesk then provides necessary
• Helpdesk tickets raised by internal departments
access as per request.
pertaining to access creation for new joiners.
• Helpdesk tickets pertaining to access revocation
• Employee user accounts are removed from
for a select sample of exited employees from the
various applications and network systems as of
active directory.
the last date of employment based on access
• Select sample of emails informing clients to
revocation request sent by the concerned
grant access for new joiners.
department to the global helpdesk team.
• Select sample of emails informing clients to
revoke access when employees leave the
• Client is informed about the new joiners to the organization.
team by the respective managers for granting
necessary access
Inquiry:
Inquired with the CISO and ascertained that:
• On the day of joining, HR triggers an email from
Workday application which sends a mail to
49
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Access on client systems is removed by sending global helpdesk providing the details of the new
an email to the client manager informing them joiners. The helpdesk then provides necessary
about the exiting employee. access as per request.
50
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• There is a security desk at the office entry • Access cards are issued to new employees
manned by a security guard based on an access card requisition initiated
by the Human Resource (HR) group.
• Visitor register is maintained to log entry and
Observation:
exit details.
Observed during the virtual tour of the facility and
• Visitor badges are for identification purposes noted that:
only and do not permit access to the facility. • Physical access to office premises is monitored
through CCTV installed at key points within the
• All visitors must be escorted by a Company premises.
employee when visiting office facilities.
• There is a security desk at the office entry
• ID cards that include an employee picture must manned by a security guard
be worn at all times when accessing or leaving
the facility. • Visitor register is maintained to log entry and
exit details.
• Physical access is setup by the Admin Dept for
new joiners after all HR formalities are • Visitor badges are for identification purposes
completed. ID cards by default does not have only and do not permit access to the facility.
access to any of the sensitive areas.
• All visitors are escorted by a Company employee
• Physical access to sensitive areas / server rooms when visiting office facilities.
is granted only to privileged users by helpdesk
• ID cards that include an employee picture is
Team.
worn at all times when accessing or leaving the
facility.
• A periodic review of physical access logs is
carried out by the Admin team. • Physical access is setup by the Admin Dept
through a tool for new joiners after all HR
• Upon the last day of employment, HR Team formalities are completed. ID cards by default
sends exit email requesting for deactivation of does not have access to any of the sensitive
physical access for terminated employees. areas.
Physical access is deactivated by the Admin
• Physical access to sensitive areas / server rooms
Team.
is granted only to privileged users / IT Team.
Access to such restricted zone is given against
• Employees are required to return their ID cards
written request by the Managers.
on the last day, and all ID badges are disabled.
• Employees are required to return their ID cards
on the last day, and all ID badges are disabled.
51
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• The sharing of access badges and tailgating are
prohibited by policy. • Access to server rooms are restricted and log of
visitors is maintained.
• Access to server rooms are restricted and log of
visitors is maintained
Inspection:
• Inspected the badge access deactivation for a
select sample of exited employees from the pro
watch portal and determined that badge access
revocation process is in place.
• Inspected the physical access log review emails
for a select sample of months and determined
that access validation process is in place.
• Inspected the Physical Security and Access
control policy and determined that sharing of
access badges and tailgating are prohibited by
policy.
• Inspected the server room access logs and
determined that visitor log is maintained and
monitored.
CC 6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets
has been diminished and is no longer required to meet the entity’s objectives.
• Media Handling Policy is implemented for Inquiry: No exceptions noted
procedures relating to disposal of information Inquired with the Senior Manager- Corporate
assets / equipment. Quality and ascertained that:
• Media Handling Policy is implemented for
procedures relating to disposal of information
assets / equipment.
Inspection:
Inspected the the Cyient Information Security
Manual and determined that procedures are defined
and documented.
52
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
CC 6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.
• External points of connectivity at office network Inspection: No exceptions noted
are protected by firewall. Inspected the following documents and determined
that the defined controls are in place:
• The firewall provides unified threat
management (UTM) services such as intrusion • Cyient Network diagram for Head office and
protection, web filtering and inbound and out Manikonda Data center
bound traffic filtering.
Observation:
• Incoming connections are accepted from only Logged into the Palo Alto firewall and noted the
whitelisted IPs in the firewall. following configurations:
• Company has implemented content filtering • The firewall provides unified threat
system through firewall that blocks access to management (UTM) services such as intrusion
certain sites such as personal emails, storage protection, web filtering and inbound and out
etc. bound traffic filtering.
• Access to modify firewall rules is restricted by • Rules are configured to restrict inbound and
management outbound traffic and implicit deny is configured
• Logical access to Company systems is restricted • Company has implemented content filtering
through active directory based domain policies. system through firewall that blocks access to
• Administrative access to the firewall is only certain sites such as personal emails, storage
enabled through secure connections like etc.
https/SSH. • Access to modify firewall rules is restricted by
• Logs of firewall device are forwarded to SIEM management.
for monitoring suspicious events. • Observed the administrators accessing the
company systems using domain credentials and
noted that access is controlled only through
official IDs.
53
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Observed the log configuration in the firewall
and noted that forwarding of logs to SIEM is
enabled.
Inquiry:
Inquired with the CISO and ascertained that:
• External points of connectivity at office network
are protected by firewall.
• Logical access to Company systems is restricted
through active directory based domain policies.
CC 6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it
during transmission, movement, or removal to meet the entity’s objectives.
54
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
pertaining to anti-spam, malware protection, • Inspected the Global protect VPN configuration,
content filters and phishing protection. encryption settings, multifactor authentication
settings and determined that secure remote
connectivity is in place for employees.
Observation:
• Observed the removable media restriction
configuration in Anti virus and noted that
prohibition is enforced.
• Observed the dashboard of the deep discovery
email inspector, quarantine information and
noted that suspicious emails are filtered as per
advanced threat indicators.
• Observed the policy configuration in the email
gateway and noted that policies pertaining to
anti-spam, malware protection, content filters
and phishing protection are in place.
CC 6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives.
55
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
are configured. Also noted that periodic updates
• Policies are configured in the email gateway for are be auto installed in the server and connected
quarantining emails matching criteria systems receive updates on a regular basis.
pertaining to anti-spam, malware protection,
• Observed the Cyient USB block rule in Mcafee
content filters and phishing protection.
DLP policy settings and noted that use of
removeable media is prohibited.
• Observed the dashboard of the deep discovery
email inspector, quarantine information and
noted that suspicious emails are filtered as per
advanced threat indicators.
• Observed the policy configuration in the email
gateway and noted that policies pertaining to
anti-spam, malware protection, content filters
and phishing protection are in place.
SYSTEM OPERATIONS
CC 7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new
vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
• Management has defined configuration Inquiry: No Exception noted.
standards and hardening standards. Inquired with the CISO and ascertained that:
• Management has defined configuration
• Cyient utilizes a third party service provider for standards and hardening standards.
managed Security Operations Center (SOC) and
threat monitoring • Cyient utilizes a third-party service provider for
managed Security Operations Center and threat
• Periodic Vulnerability assessments are monitoring
performed by competent Cyient internal staff
project wise. Vulnerability assessments are • Vulnerability Assessments are performed on a
done by the internal cyber security team on periodic basis
regular intervals.
Inspection:
56
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Centralized patch management of Servers and Inspected the following documents and determined
systems is in place as per Cyient patch that the defined controls are in place:
management policy.
• Patch Management policy as configured in the
group policy
• Alert monitoring dashboard from SOC provider-
TCL, incident tickets raised and closure
• Select sample of monthly patch update emails
circulated internally and corresponding change
tickets for initiating the patch updates
CC 7.2 The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and
errors affecting the entity’s ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.
No exceptions noted
• Cyient utilizes a third party service provider for Inquiry:
managed Security Operations Center (SOC) and Inquired with the CISO and ascertained that the
threat monitoring defined controls are in place:
• Cyient utilizes a third party service provider for
• Vulnerability monitoring scans are performed
managed Security Operations Center (SOC) and
on a periodic basis. Management takes
threat monitoring
appropriate action based on the results of the
scans.
• Vulnerability monitoring scans are performed
on a periodic basis. Management takes
appropriate action based on the results of the
scans.
Inspection:
Inspected the alert monitoring dashboard from SOC
provider-TCL, incident tickets raised and resolved
57
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
and determined that event logs from systems and
servers are monitored.
CC 7.3 The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents)
and, if so, takes actions to prevent or address such failures.
• An incident management process is defined and Inquiry: No exceptions noted
documented for evaluating reported events. Inquired with the Senior Manager- Corporate
Quality and ascertained that:
• Incidents are reported to the Global Helpdesk • An incident management process is defined and
team (GHD) and resolved documented for evaluating reported events.
• Reported incidents are logged as tickets and • Incidents are reported to the Global Helpdesk
include the following details: team (GHD) and resolved
o Severity, date and Time of incident • Reported incidents are logged as tickets and
o Details include the following details:
o Status
o Root Cause o Severity, date and Time of incident
o Details
o Status
o Root Cause (High severity incidents
only)
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• Incident Management Procedure
58
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Select sample of incident tickets from GHD
helpdesk along with resolution details
CC 7.4 The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate
security incidents, as appropriate.
• All security incidents are reviewed and Inquiry: No exceptions noted
monitored by the Security Council Meetings.
Inquired with the Senior Manager- Corporate
Corrective and preventive actions are
Quality and ascertained that the below defined
completed for incidents.
controls are in place:
• All incidents are evaluated, and necessary action • All security incidents are reviewed and
taken to close the threat / vulnerability. monitored by the Security Council Meetings.
Corrective and preventive actions are
• Protocols for communicating security incidents completed for incidents.
and actions taken to affected parties are
developed and implemented to meet the entity's • All incidents are evaluated, and necessary action
objectives. taken to close the threat / vulnerability.
• Reported incidents are logged as tickets and • Protocols for communicating security incidents
include the following details: and actions taken to affected parties are
developed and implemented to meet the entity's
o Severity, date and Time of incident objectives.
o Details
• Reported incidents are logged as tickets and
o Status
include the following details:
o Root Cause (High severity incidents
o Severity, date and Time of incident
only)
o Details
o Status
o Root Cause (High severity incidents
only)
o Lessons learnt, Impact and
Improvement opportunities
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
59
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Select sample of incident tickets from GHD
helpdesk along with resolution details and
corrective action taken
• Incident Management Procedure
• Security council meeting minutes analyzing the
incident types
CC 7.5 The entity identifies, develops, and implements activities to recover from identified security incidents.
• All incidents are evaluated and necessary action Inspection: No exceptions noted
taken to close the threat / vulnerability Inspected the following documents and determined
that the defined controls are in place:
• Root cause analysis is performed for major
• Select sample of incident tickets from GHD
incidents.
helpdesk along with resolution details and
corrective action taken
• Lessons learnt are analyzed, and the incident
• Incident Management Procedure
response plan and recovery procedures are
• Security council meeting minutes analyzing the
improved.
incident types
Inquiry:
Inquired with the Senior Manager- Corporate
Quality and ascertained that the below defined
controls are in place:
• All incidents are evaluated and necessary action
taken to close the threat / vulnerability
60
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
CC 8.1 The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and
procedures to meet its objectives.
• Entity has defined its change management and Inquiry: No exceptions noted
approval processes in its IT Change Inquired with the Senior Manager- Corporate
Management policy and procedure. Quality and ascertained that:
• Entity has defined its change management and
• All change requests are submitted with approval processes in its IT Change
implementation and rollback plans. Management policy and procedure.
• All change requests are logged and change • All change requests are submitted with
request ticket created. implementation and rollback plans.
• Major changes are tracked separately as major • All change requests are logged and change
infra changes and approved by CAB. request ticket created.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
• IT Change Management policy and procedure
• Select sample of change tickets from Service
now with implementation and roll back plan
details
61
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Select sample of Emergency change requests
and related approvals
RISK MITIGATION
CC 9.1 The entity identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions.
Inspection:
Inspected the following documents and determined
that the defined controls are in place:
•IT Business Continuity and Disaster Recovery
Plan
• ISP failover, firewall failover mockdrill reports
for Manikonda data center
• Firedrill reports pertaining to Madhapur and
Manikonda locations
CC 9.2 The entity assesses and manages risks associated with vendors and business partners.
• New Third Party Service Providers are selected Inquiry: No exceptions noted
based on a Vendor Selection Process. Security Inquired with the Senior Manager- Corporate
risk assessment is a key part of the vendor Quality and ascertained that:
selection process. • New Third Party Service Providers are selected
based on a Vendor Selection Process. Security
• Company obtains and reviews compliance risk assessment is a key part of the vendor
reports and certificates such as ISO 27001, SOC1 selection process.
62
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
or SOC2 for its key vendors. Opinion section and
relevant controls are reviewed for any • Company obtains and reviews compliance
exceptions. This is part of vendor monitoring. reports and certificates such as ISO 27001, SOC1
or SOC2 for its key vendors. Opinion section and
• A formal contract is executed between Company relevant controls are reviewed for any
and third Party Service Providers before the exceptions. This is part of vendor monitoring.
work is initiated. Agreement includes terms on
confidentiality, responsibilities of both parties.
• A formal contract is executed between Company
• All customer & vendor contracts have terms and third Party Service Providers before the
related to confidentiality. work is initiated. Agreement includes terms on
confidentiality, responsibilities of both parties.
A1.1 The entity maintains, monitors, and evaluates current processing capacity and use of system components (infrastructure, data, and software) to manage
capacity demand and to enable the implementation of additional capacity to help meet its objectives.
• The Entity monitors system processing capacity Inquiry: No exceptions noted
and usage and takes correction actions to Inquired with the CISO and ascertained that:
address changing requirements • Processing capacity is monitored on an ongoing
basis using various tools
63
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Processing capacity is monitored on an ongoing • Critical infrastructure components have been
basis. reviewed for criticality classification and
assignment of a minimum level of redundancy.
• Critical infrastructure components have been • Future processing demand is forecasted and
reviewed for criticality classification and compared to scheduled capacity on an ongoing
assignment of a minimum level of redundancy. basis.
Observation:
Observed a select sample of system/host availability
reports and noted that processing capacity is
monitored on an ongoing basis.
Inspection:
Inspected the ISP failover, firewall failover mock-
drill reports for the Manikonda data center and
determined that redundancy check is done
periodically.
A 1.2 The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data
back-up processes, and recovery infrastructure to meet its objectives.
64
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
• Uninterruptible power supply (UPS) devices • Observed the Server rooms and noted that IT
are in place to secure critical IT equipment Engineer monitors the temperature in server
against power failures and fluctuations. room on a daily basis and take corrective actions
in case of discrepancy
• DG set of sufficient capacity is provided to
provide power during outage. Inspection:
• Inspected the Network diagram of Cyient
• Company has multiple ISPs in place to provide
Madhapur and Manikonda DC and determined
redundancy in case of link failure
that Company has multiple ISPs in place to
• IT Engineer monitors the temperature in server provide redundancy in case of link failure.
room on a daily basis and take corrective actions
• Inspected the preventive maintenance reports
in case of discrepancy
for Air conditioners, Diesel Generators, UPS, fire
• Vendor AMC specifications are documented and alarms and determined that environmental
followed up for service requirements. protections receive maintenance on at least an
annual basis.
• Facilities and admin personnel monitor the
status of environmental protections on a regular • Inspected the fire drill reports conducted in
basis. Madhapur, Manikonda locations, ISP failover,
firewall failover mock-drill reports for the
Manikonda data center and determined that the
Business continuity and disaster recovery plans,
are tested periodically. Also testing results and
change recommendations are reported to the
concerned teams.
65
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
status of environmental protections during each
shift.
A 1.3 The entity tests recovery plan procedures supporting system recovery to meet its objectives. The entity tests recovery plan procedures supporting system
recovery to meet its objectives.
• Business continuity and disaster recovery plans, Inspection: No exceptions noted
are tested annually. Inspected the fire drill reports conducted in
Madhapur, Manikonda locations, ISP failover,
• Disaster recovery and Business Continuity plans firewall failover mock-drill reports for the
and procedures for various disruption scenarios Manikonda data center and determined that the
are documented. Business continuity and disaster recovery plans, are
tested periodically. Also testing results and change
recommendations are reported to the concerned
teams.
• IT Business Continuity and Disaster Recovery
Plan
Inquiry:
Inquired with the Senior Manager- Corporate
Quality and ascertained that Business continuity
plan testing is performed on a periodic basis.
ADDITIONAL CRITERIA- CONFIDENTIALITY
C 1.1 The entity identifies and maintains confidential information to meet the entity’s objectives related to confidentiality.
66
Control Activity Specified by the Service Test Applied by the Service Auditor Test Result
Organization
Inspection:
Inspected the Cyient Information Security Manual
and determined that the defined control is in place.
C 1.2 The entity disposes of confidential information to meet the entity’s objectives related to confidentiality.
Inspection:
Inspected the Cyient Information Security Manual
and determined that the defined control is in place.
67
Section V – Other Information Provided by the Management
of Cyient
68
The information included in Section V of this report is presented by Cyient to provide additional
information to user entities and is not part of Cyient’s description of the system. The information included
here in Section V has not been subjected to the procedures applied in the examination of the description of
the system related to description of the system, and, accordingly, M Kuppuswamy PSG & Co LLP expresses
no opinion on it.
The table below contains Management’s response to the exceptions noted in Section IV - Information
Provided by Independent Service Auditor.
CC 5.3 All policies are In some instances, MKPSG Cyient has reviewed policy
updated/reviewed at least could not verify if the policy documentation and will take
every year to ensure that documents were steps to document the same.
these are current and in line periodically reviewed in
with the current business. the absence of relevant
information in the policy
document version history.
69