To streamline your next onboarding with a higher-ed instiution, use this checklist to track how well your cybersecurity program aligns with HECVAT 4 standards.
To be applicable for most use cases, this checklist has been adapted to the following responses in the "Required Questions" section of the HECVAT toolkit:
| Question |
Response |
| Are you offering a cloud-based product? |
Yes |
| Does your product or service have an interface? |
Yes |
| Are you providing consulting services? |
Yes |
| Does your solution have AI features, or are there plans to implement AI features in the next 12 months? |
Yes |
| Does your solution process protected health information (PHI) or any data covered by the Health Insurance Portability and Accountability Act (HIPAA)? |
Yes |
| Is the solution designed to process, store, or transmit credit card information? |
Yes |
| Does operating your solution require the institution to operate a physical or virtual appliance in their own environment or to provide inbound firewall exceptions to allow your employees to remotely administer systems in the institution's environment? |
No |
| Does your solution have access to personal or institutional data? |
Yes |
This checklist aligns with the seven HECVAT assessment categories:
- Organization
- Product
- Infrastructure
- IT Accessibility
- Case-Specific
- AI
- Privacy
We’ve broken these down into subsections to give you actionable compliance guidance exactly where you need it.
HECVAT 4 compliance checklist
Use this checklist to understand how prepared you are for your next HECVAT assessment.
1. Organization
Business resilience
- Formal Business Continuity Plan (BCP) document exists
- Formal Disaster Recovery Plan (DRP) document exists
- Named individual or role is responsible for maintaining BCP/DRP plans
- Evidence of testing performed within the last 12 months is available for both plans
External audits & frameworks
- Current SSAE 18/SOC 2 audit report is available for sharing
- Specific industry standard (NIST, ISO, CIS, etc.) followed by the organization is identified
- Documentation shows internal control alignment with the chosen framework (if not certified)
Architecture & data flow
- Visual diagram of the overall system and application architecture is provided
- Diagram specifically traces data movement through every system component
- Text-based description exists for every component shown in the diagrams
Policies & HR
- Formal, documented Data Privacy Policy is in place
- Documented process for new hire security setup is established
- Documented process for immediate access revocation upon employee departure is established
- Samples or logs are available showing HR policies are actively followed
Third-party security assessments
- Complete list of all third-party companies with access to institutional data is maintained
- Vendors are categorized based on data sensitivity (High, Medium, Low risk)
- Security reviews (SOC 2, HECVAT, or questionnaires) are performed and documented before onboarding and at regular intervals
Learn how you can streamline your assessment process with Trust Exchange.
Contractual safeguards
- Specific language defining and limiting vendor access to institutional data is included in all contracts
- Contracts with third-parties with access to institutional data explicitly address financial/legal liability, notification timelines, and remediation responsibilities for breaches
- Security Addendum or Data Processing Agreement (DPA) is used to maintain consistency
Management strategy
- High-level strategy document outlines third-party risk management throughout the relationship lifecycle
- Procedure for reviewing vendor performance and security posture changes is implemented
Hardware supply chain
- Record of all critical hardware (telecom and computing) is maintained
- Documentation exists showing hardware is vetted and purchased through authorized, trusted channels
- Process to verify export licensing and screen against restricted entity lists is implemented
Change control & governance
- Documented outline for handling all system changes is maintained
- Change process includes four mandatory steps: Authorization, Impact Analysis, Testing, and Validation
- Specific path for urgent fixes exists with after-the-fact approval and documentation
- Check is implemented to verify third-party libraries/dependencies remain supported after updates
Configuration & systems management
- Gold Images or Infrastructure as Code (IaC) are used to ensure secure baselines
- Management strategy covers physical servers, cloud services, and mobile devices
- Mechanism exists to migrate client-side customizations safely between version releases
Patching & vulnerability mitigation
- Timeline and procedure for applying critical security patches is documented
- Pre-patch protection methods (WAF rules, port disabling, etc.) are defined
Release strategy & communication
- Formal channel (email, portal, RSS) is established to notify clients of security-impacting changes
- Public or shareable Release Schedule for upcoming updates is maintained
- 2-Year Technology Roadmap showing planned enhancements and fixes is available
- Number of concurrent supported software versions is formally defined
- Mandatory vs. optional update status is documented for clients
- Requirement for institutional involvement in updates is specified
- Procedures mandate changes occur during off-peak hours or via Zero-Downtime methods
2. Product
Authentication, authorization, and account management
Federated & Single Sign-On (SSO):
- Solution supports standard protocols (SAML2, OIDC, or CAS) for both users and admins
- Organization’s participation in InCommon or eduGAIN is identified
- System maps custom attributes (e.g., eduPerson, ePPN) beyond basic user ID
- System distinguishes between user email addresses and unique internal identifiers
Local authentication (Non-SSO):
- Secure local authentication protocols are supported for non-SSO environments
- System enforces custom password/passphrase complexity and length requirements
- Documented procedures for password resets are active
- Application integrates with local directories (LDAP/AD) if web-based SSO is not used
- Local login portal supports Multi-Factor Authentication (MFA)
Credentials & session security:
- No passwords or secret keys are hard-coded in application code or configuration files
- All passwords are encrypted/hashed (no plaintext storage)
- System automatically locks or logs out users after a period of inactivity
Logging & monitoring:
- Logs capture Login, Logout, Actions Performed, and Source IP
- System logs failed logins, access denials, and authorization changes
- Requirements for log collection and SIEM integration are documented
- Log retention period, tamper protection, and customer access methods are documented
Data
Storage & encryption:
- Data storage locations/IP addresses are identified regarding public routability
- Sensitive data is encrypted in motion using secure protocols (TLS 1.2+)
- Data is encrypted at rest (disk or database level)
- Encryption modules conform to FIPS 140-2 or 140-3 standards
- Cryptographic key lifecycle process is documented
Data ownership & lifecycle:
- Institution retains full ownership of all data, inputs, outputs, and metadata
- Data remains available for a specific window after contract termination for retrieval
- Formal process exists to return data and securely delete copies upon termination
- Contract guarantees at least 90 days for data migration in the event of business closure
Backups & disaster recovery:
- Backups are stored off-site and protected from modification/deletion
- Backups include all components needed for full recovery (OS, apps, security software, data)
- Backup files are encrypted during storage and transport
- Institution has the ability to trigger and extract its own partial or full backup
- Instances where backups leave the institutional data zone are identified
Media handling & workstation security:
- Media handling (end-of-life) follows NIST SP 800-88 or DoD 5220.22-M
- Employee workstation security for remote work is documented
- Logical or physical controls prevent data leakage between customers in multi-tenant environments
- Staff or third-party contractor access to sensitive institutional data is explicitly documented
3. Infrastructure
Application and service security
Access control & logic:
- Access for users and staff is governed by a formal model (RBAC, ABAC, or PBAC)
- Technical barriers prevent single individuals from holding multiple critical admin roles
- Policy details how employees obtain administrative access to client instances
- Application performs data input validation and provides sanitized error messages
Secure development & supply chain:
- Records show developers are trained in secure coding (e.g., OWASP Top 10)
- Static Application Security Testing (SAST) is performed prior to every release
- Dynamic Application Security Testing (DAST) or similar processes are implemented
- Procedures for vetting third-party libraries and frameworks are documented
- Only currently supported OS, software versions, and libraries are used
Operational defenses:
- Active WAF is configured to protect against common web exploits
- Mobile apps are distributed only via trusted sources (Apple App Store / Google Play)
- GPS/location data requirements and justifications are explicitly documented
Datacenter
Hosting & audits:
- Hosting option (Public Cloud, Private Cloud, On-Prem) is clearly identified
- SOC 2 Type 2 report for the hosting environment is provided
- Ability to store data within the institution’s specific geographic region is confirmed
Physical & environmental security:
- Physical barriers (cages/walls) prevent unauthorized contact in non-cloud hosting
- 24x7x365 staffing and MFA are required for physical administrative access
- Redundant power, cooling, and fire-suppression systems are documented and tested
Network & cloud integrity:
- HA environment architecture and geographic diversity are documented
- ISP redundancy and multiple network provider entrances are verified
- Cloud provider hardening tools or pre-hardened images are utilized
- Cloud provider access status to encryption keys is explicitly stated
Firewalls, IDS, IPS, and networking
- Firewalls are stateful and monitor active connection states
- Firewall Change Request Policy for rule modifications is maintained
- Authority for approving firewall changes is formally documented
- NIDS/NIPS is implemented at the network boundary
- HIDS/HIPS or EDR is implemented on individual servers
- Next-Generation Persistent Threat (NGPT) or ATP monitoring is deployed
- 24x7x365 monitoring by internal SOC or third-party MSSP is documented
- Logs capture every change to network devices, firewalls, and IDS/IPS
Incident handling
- Written Incident Response Plan (IRP) defines containment, eradication, and recovery steps
- Dedicated Incident Response Team (internal or external) is established
- IR Team is reachable and ready to act 24x7x365
- Current Cyber-Risk Insurance policy covers data loss, theft, and outages
Vulnerability management
- Vulnerability scans are performed using authenticated accounts
- Regular scans cover OWASP Top 10 and common web flaws (SQLi, XSS, XSRF)
- Third-party security assessment/penetration test was completed within the last 12 months
- Systems are scanned externally for vulnerabilities on a recurring schedule
- Clean scan is performed before every new software release
- Summarized vulnerability scan results are available for sharing
- Institution is permitted to perform their own scheduled vulnerability testing under NDA
4. IT accessibility
Accountability & documentation
- Specific person is designated for accessibility inquiries
- VPAT or ACR updated within the last 12 months is available for the current version
- Public-facing Accessibility Statement or current VPAT link is maintained
- User-facing documentation explains the software's accessibility features
Standards & legal commitment
- Technical standard (e.g., WCAG 2.1 Level AA) is formally adopted
- Legal commitment to meet stated accessibility standards is included in the MSA
- Detailed, time-bound Accessibility Roadmap for fixing gaps is maintained
Audit & verification
- Third-party accessibility audit has been conducted on the most recent version
- Internal procedures for verifying accessibility are documented
- Formal system for reporting and tracking accessibility barriers is implemented
Development & design lifecycle
- Accessibility check processes are documented for design, development, and QA phases
- Evidence of ongoing accessibility training for staff is provided
- 100% of application functions are performable using only a keyboard
- Product is natively accessible without requiring overlays or widgets
5. Case-specific
Consulting services
- Consultant requirements for network, domain, or hardware access are documented
- Proof exists of consultant training for sensitive data (HIPAA, PCI, FERPA, etc.)
- Data on consultant machines/environments is encrypted at rest
- Consultant access is limited to specific Source IP addresses
- On-site vs. remote work status is clearly stated
HIPAA compliance
- Formal HIPAA Privacy and Security Officers are appointed
- Annual HIPAA/HITECH training records are maintained for all employees
- Willingness to sign a Business Associate Agreement (BAA) is confirmed
- BAAs are in place with all subcontractors touching PHI
- Most recent HIPAA Risk Analysis and mitigation actions are documented
- Maximum 90-day password rotation is enforced for users and admins
- Users must set their own password immediately following an admin reset
- Lockout is implemented after a defined number of failed login attempts
- Inactive sessions automatically terminate after a set period
- Passwords are never visible in plaintext
- RBAC supports varying access levels for health records and admin tasks
- Logs capture Who, What, When, and Where for record access
- Archiving and SIEM integration meet HIPAA’s 6-year retention requirement
- Backup and retention practices meet HIPAA/HITECH standards
Payment Card Industry (PCI DSS)
- Current (within 1 year) Attestation of Compliance (AoC) or RoC is provided
- Organization’s status as Service Provider or Merchant (and Level) is identified
- Use of third-party payment gateways (Stripe, Touchnet, etc.) is disclosed
- Application is listed as an approved PA-DSS solution
- Data flow diagram for credit card data is provided
- PCI Deployment Guide for compliant installation is provided
6. AI
AI qualifying & general questions
- Current or planned use of ML or LLMs (within 12 months) is documented
- Formal AI Risk Model is maintained for development/implementation
- AI features can be disabled at the Tenant and/or Individual User level
- Records of Responsible AI training for stakeholders are provided
- Business rules (DLP) prevent institutional data ingestion by AI models
- Plain-language description of AI features is available
AI Policy & risk management
- Policies for mapping, measuring, and managing AI risks are implemented
- Capability to disable and re-enable AI features during incidents is tested
- Documentation aligns with the NIST AI Risk Management Framework (RMF)
AI data security
- Technical process exists to remove sensitive data from AI models upon request
- Disclosure states if user data is used to fine-tune or influence base models
- Logs capture User, Date, and Action for AI-triggered events
- Sanitization process for user inputs prevents prompt injection/malicious code
- Vetting process for third-party AI providers and models is documented
AI Machine Learning (ML)
- Training Data is physically or logically separated from Production Data
- Vetted, Validated, and Verified workflow for training data is implemented
- Access to training data is limited to Need-to-Know staff
- Watermarking is used for training data provenance
- Adversarial Training (defense against poisoning/evasion) is implemented
- Model architecture documentation and input/output logs are maintained
AI Large Language Model (LLM)
- LLM operates with minimum system privileges by default
- Human intervention is required for high-risk actions taken by the LLM/plugins
- Number of plugin calls per single input is limited
- Hard caps on resource use (tokens, memory, compute) are set per request
- Use of Fine-Tuning or RAG and validation mechanisms for accuracy are documented
7. Privacy
General & company privacy profile
- Processing of data regulated by FERPA, GDPR, PIPL, or State Laws is documented
- Direct web link to current Privacy Notice is provided
- Dedicated Data Privacy Officer (DPO) or privacy office is identified
- Personal data breaches or privacy violations within the last 36 months are disclosed
Privacy documentation & third parties
- Privacy Trust Service Principle is included in SOC 2 scope
- Privacy program aligns with NIST Privacy Framework, ISO 27701, or GDPR
- Privacy-specific clauses are included in all third-party contracts
- Privacy Impact Assessments (PIAs) are performed on third parties
Privacy lifecycle & change management
- Privacy principles are integrated into the SDLC
- Formal Privacy Review and Approval is required for every major system change
- Annual privacy awareness training is mandated for all employees
- Specific AI Privacy & Ethics training is implemented for relevant staff
Privacy of sensitive data & tracking
- Collection of demographic, biometric, or device information is documented
- All web/app tracking components (cookies, pixels) are disclosed
- Instances where data leaves the U.S. are documented
- Use of de-identified or masked data combined with other sources is disclosed
International privacy (GDPR/PIPL)
- Data collection or processing in the EEA or China is identified
- Willingness to sign SCCs for GDPR and comply with PIPL is confirmed
Data subject rights & automated processing
- Data Privacy Impact Assessment (DPIA) is documented for the solution
- Procedures allow users to access, review, update, or erase their data
- 100% automated processes (no human involvement) are identified
- Monitoring and validation for automated decision-making are documented
- Personal data retention schedule is documented and enforced
Privacy and AI
- Technical guards prevent unintended AI queries from exposing institutional data
- Processing is limited to fully licensed commercial enterprise AI services
- Clear Opt-Out mechanism for AI processing is provided to users
- Code and AI prompts are reviewed for ethical considerations and bias
Law enforcement & incident response
- Policy for sharing data with authorities (warrants/subpoenas) is documented
- Privacy Analyst/Officer is included in the Incident Response Team for breach notification