COLSA | Trust Center
COLSA
Trust Center Industry Certifications & Continuous Monitoring
Click for: COLSA's Current Certifications

Compliance

CMMC

CMMC Level 2 focuses on protecting Controlled Unclassified Information (CUI) by requiring organizations to comply with all 110 security requirements outlined in NIST SP 800-171 Revision 2. Assessments are conducted every three years by a C3PAO

ISO 27001

ISO/IEC 27001:2022 is the latest international standard for Information Security Management Systems (ISMS), defining requirements for organizations to manage data security risks and protect information assets

ISO 9001

The ISO 9001:2015 standard details the requirements for a quality management system, enabling organizations to consistently meet customer and regulatory needs and enhance satisfaction through effective system application and continual improvement

AS/EN 9100

AS/EN 9100 is an internationally recognized quality management system standard for the aerospace industry, extending ISO 9001 with specific requirements for product safety, reliability, and defect prevention in aviation, space, and defense.

Monitoring

Continuously monitored by Secureframe
View all

Monitoring

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.
Information Security Policy
An Information Security Policy establishes the security requirements for maintaining the security, confidentiality, integrity, and availability of applications, systems, infrastructure, and data.
Background Checks
Background checks or their equivalent are performed before or promptly after a new hires start date, as permitted by local laws.

Risk Assessment

Risk Register
A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy.

Access Security

Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information
Access to Product is Restricted
Non-console access to production infrastructure is restricted to users with a unique SSH key or access key

Communications

Privacy Policy
A Privacy Policy to both external users and internal personnel. This policy details the company's privacy commitments.