The Neuroscale-side controls inventory referenced from the Configuration Hardening page (which describes AWS shared-responsibility) and from Compliance Frameworks.
Operational mirror: the live, test-driven inventory is in Vanta. This page is the human-readable summary referenced from policies. It is reconciled with Vanta whenever a new policy is approved or a control is added/retired.

How the inventory is structured

ColumnMeaning
DomainHigh-level grouping (Access, Change, Crypto, IR, etc.).
Control statementThe thing Neuroscale is committing to do.
OwnerTier-1 executive responsible (per Roles & Responsibilities).
Source policy / procedureThe document where the control is codified.
Evidence sourceWhere the auditor will find evidence (Vanta test, log query, signed acknowledgement, ticket, etc.).
CadenceHow often the control runs / is tested.

Control inventory

DomainControl statementOwnerSourceEvidence sourceCadence
AccessAll workforce access is provisioned through Rippling SSO with role-based bundles.CISOAccess Control Policy, Access MatrixVanta IdP integration; quarterly access review evidenceContinuous + quarterly review
AccessPrivileged access requires named approval and is reviewed at least quarterly.CISOAccess Control Policy, Access ReviewsLinear access tickets; access-review reportsQuarterly
AccessTerminated user access is revoked within 24 business hours.CISO + CHROOffboardingRippling deprovisioning logs; offboarding ticketContinuous
ChangeCode changes require peer review and a passing CI build.CTOCode Review, Change ManagementGitHub branch-protection settings; PR historyContinuous
ChangeProduction deployments use change-approval ticketing.CTOChange ManagementGitHub Actions deploy logs; Linear ticket trailContinuous
CryptoCustomer data is encrypted at rest (AES-256) — AWS KMS-managed for AWS-resident services; Vultr platform-managed encryption for Vultr-resident services; Vault Transit application-layer envelope wrap (Neuroscale-managed keys, never leave Vault) for Confidential customer data on either cloud — and in transit (TLS 1.2+).CISOCryptography PolicyVanta AWS configuration tests; Vultr platform-encryption attestation; Vault Transit audit-device logs (Better Stack + AWS S3 Object Lock)Continuous
CryptoSecrets are stored in HashiCorp Vault (cross-cloud secrets-of-record for both AWS- and Vultr-hosted workloads; workload-bound auth via Vault AWS / Kubernetes / AppRole / OIDC methods — no long-lived static tokens) — no secrets in source.CTOSecrets ManagementGitGuardian / GitHub secret-scanning; CI checks; Vault audit-device logs to Better Stack and AWS S3 (Object Lock)Continuous
IRAn Incident Response Plan exists, is tested annually, and assigns roles.CISOIncident ResponseAnnual tabletop after-action reportAnnual
IRSecurity incidents are logged, triaged, and resolved with documented RCAs.CISOIncident ResponseLinear “Security Incidents” project; RCA intake recordsPer incident
Vuln MgmtVulnerability scans run at least quarterly with severity-based remediation SLAs.CISOVulnerability ManagementDetectify / Snyk / Dependabot reports; Linear “Vulnerabilities” boardContinuous + quarterly review
Vuln MgmtPenetration test runs at least annually.CISOVulnerability ManagementPen-test report on file (vendor TBD)Annual
LoggingProduction systems (AWS and Vultr) emit security events to Better Stack with retention per the Records Retention Schedule and the tiered table in Operations Security. AWS infra logs flow through CloudWatch + S3 (Object Lock); Vultr infra logs forward to Better Stack with audit copies in AWS S3 (Object Lock).CTOLogging & MonitoringBetter Stack ingestion + retention configuration; CloudWatch + S3 Object LockContinuous
BCPBusiness-continuity and disaster-recovery plan is documented and tested annually.CTOBusiness Continuity, RTO/RPO MatrixAnnual restore-test reportAnnual
AssetAll workforce devices are managed (Rippling MDM) and encrypted (FDE).CISOAsset ManagementRippling MDM compliance reportsContinuous
AssetDecommissioned media is disposed via certified destruction with a signed CoD.CISORecords DisposalDisposal log + CoDsPer disposal
VendorAll third parties with Confidential-data or production access undergo a tiered risk assessment before contract signature.CISO + CFOThird-Party Management, Vendor Risk AssessmentVendor Inventory; signed agreements; SOC 2 / DPA on fileContinuous + annual re-review (High tier)
HRWorkforce members complete annual security-awareness training and policy re-acknowledgement.CISO + CHROHR Security PolicyVanta training + acknowledgement recordsAnnual
PrivacyData-subject requests are tracked and resolved within statutory deadlines.GC (Privacy Officer)Data Subject RightsDSR Tracker (Linear); DSR intake form recordsPer request
PrivacyDPIAs are completed for high-risk processing before launch.GC (DPO)DPIADPIA Register (Linear); DPIA intake recordsPer launch

Out-of-scope today

  • FedRAMP — no federal customers; not in scope.
  • PCI DSS — no cardholder data; not in scope.

Cross-references

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani