Page 48 - OctDefComp
P. 48

6. Assets or data stored in a cloud or managed by a third-party service provider are subject to
          appropriate security reviews and independent security assessments
          We leverage a hybrid cloud data center strategy that utilizes multiple Tier IV data centers and providers. We remain in
          full control of our industry-leading security requirements for cloud and third-party managed data and services within
          this strategy. We determine how the data/services are stored and secured and who has access to the data/services.
          Best practices include


                         DOL cybersecurity
                         best practices                        Empower protocols


                                                               Prior to contracting with critical suppliers, we conduct
                                                               third-party vendor risk assessments that include reviews
                                                               of financial, technical and operational controls. In addition,
                                                               security requirements are included in contract language, and
                                                               audits are performed at least annually.
                        Requiring a risk assessment of third-party   Physical and environmental security controls of our hybrid
                         service providers
                                                               cloud strategy are evaluated within our SOC 2 Type 2 audits
                                                               by independent AICPA auditors. These facilities are also
                                                               compliant with all required regulatory compliance laws and
                                                               cloud provider compliance standards associated with the
                                                               services performed.

                                                               Our service vendors maintain the same level of security
                                                               and privacy controls required of Empower based on
                        Defining minimum cybersecurity practices   the confidentiality category of the information shared.
                         for third-party service providers
                                                               Requirements are governed by contractual agreements and
                                                               regulatory compliance law.


                        Periodically assessing third-party service   Third-party due diligence evaluations are performed at least
                                                               annually for all partners who have access to NPI/PII.
                         providers based on potential risks.
                         Ensuring that guidelines and contractual
                         protections at minimum address
                         the following:

                         •  The third-party service provider’s access
                           control policies and procedures, including
                           the use of multi-factor authentication
                        •  The third-party service provider’s   Confirmed

                           encryption policies and procedures
                         •  The third-party service provider’s
                           notification protocol for a cybersecurity
                           event that directly impacts a
                           customer’s information system(s) or
                           nonpublic information











                                                                                                                     7
                                 FOR FINANCIAL PROFESSIONAL AND PLAN SPONSOR USE ONLY.
   43   44   45   46   47   48   49   50   51   52   53