FEHA Logo
FEHA

Aureon Labs Technologies Ltd.

a privately held software development and IT consulting company founded in 2019
Contact us
support@aureon.io
IT Services & Consulting
2 Frameworks

Completed Compliance

Frameworks approved by consultant

MAS Notice 1121

MAS Notice 1121

5 measures implemented

MAS Notice 658

MAS Notice 658

5 measures implemented

Resources

AA Conflict of Interest Policy

A Conflict of Interest Policy is a formal document that establishes principles and procedures to identify, disclose, evaluate, and manage situations where an employee’s, director’s, or stakeholder ’s personal interests could improperly influence—or appear to influence—their professional judgment and decision-making on behalf of the organization. The policy aims to protect the integrity, objectivity, and reputation of the company by requiring transparency, mandatory disclosure of potential conflicts (such as financial interests, family relationships, outside employment, or gifts and hospitality), and appropriate mitigation measures, including recusal from decision-making or supervisory review.

Approved at 30th Mar, 2026 at 06:20:01
Public

Compliance Policy

A compliance policy is a formal document that outlines the rules, standards, and procedures a company follows to ensure it operates in accordance with applicable laws, regulations, and internal ethical guidelines. It typically defines employee responsibilities, acceptable conduct, reporting mechanisms for violations, and the consequences of non-compliance. The purpose of a compliance policy is to reduce legal and operational risks, promote ethical behavior, and ensure that the organization maintains accountability and integrity in its business practices.

Approved at 30th Mar, 2026 at 06:43:55
Public

Cookie Policy

A cookie policy is a public document that explains how a website or online service uses cookies and similar tracking technologies to collect, store, and process information about users. It typically outlines the types of cookies used (such as essential, analytics, and advertising cookies), their purposes, how long they are stored, and whether third parties have access to the data. Additionally, a cookie policy informs users about their rights and choices, including how they can manage, accept, or reject cookies to control their privacy.

Approved at 30th Mar, 2026 at 06:12:06
Public

In Progress Compliance

This score is determined through an assessment performed by our FEHAGRC Consultant tes.

CIS 8.1COMPLIANCEMONITOREDBY FEHA

CIS 8.1

40 of 153 measures implemented

CSA CECOMPLIANCEMONITOREDBY FEHA

CSA Cyber Essentials

5 of 9 measures implemented

CSA CTCOMPLIANCEMONITOREDBY FEHA

CSA Cyber Trust

34 of 131 measures implemented

DORACOMPLIANCEMONITOREDBY FEHA

DORA

35 of 51 measures implemented

ISO42001:2023COMPLIANCEMONITOREDBY FEHA

ISO 42001:2023

70 of 91 measures implemented

ISO 9001COMPLIANCEMONITOREDBY FEHA

ISO 9001

63 of 102 measures implemented

MiCACOMPLIANCEMONITOREDBY FEHA

MiCA

5 of 63 measures implemented

MAS TRMCOMPLIANCEMONITOREDBY FEHA

MAS TRM

28 of 77 measures implemented

PSASingaporeCOMPLIANCEMONITOREDBY FEHA

PSA Singapore

1 of 26 measures implemented

CA2 CIICOMPLIANCEMONITOREDBY FEHA

Cybersecurity Act (CII) 2018

10 of 15 measures implemented

SOC 2COMPLIANCEMONITOREDBY FEHA

SOC 2

71 of 117 measures implemented

UU PDPCOMPLIANCEMONITOREDBY FEHA

UU PDP (Pelindungan Data Pribadi)

1 of 56 measures implemented

1 Measures

Business Continuity

Business Continuity Plan
6 Measures

Incident Management

Incident Response Procedure
Tabletop Exercise
Incident Report
1 Measures

Equipment

Secure Disposal or Re-use of Equipment Procedure
1 Measures

Site Security

Physical Security Policy
3 Measures

Vulnerability Management

Threat Assessment Report
Vulnerability Scanning Report
Technical Vulnerability Management Records
6 Measures

Test Information

Test Data Management Policy or Procedure
Access Controls for Test Environments
Test Plans Documentation
4 Measures

Source Code

Access Control Configurations for Source Code Repositories
Version Control System Logs
Secure Coding Guidelines
13 Measures

Secure Development

Software Development Life Cycle
Asset Patch Update Log
Technical Development Guidelines for AI Fairness and Safety
4 Measures

Backups

Information Backup Policy
Clock Synchronization Documentation
Backup Schedule and Success Logs
4 Measures

Endpoint Security

Approved Software List (Whitelist)
Device Configuration Standards or Baselines
Antivirus/Anti-malware Software Deployment and Update Logs
2 Measures

Data Masking

Data Masking Policy
Data Masking Documentation
3 Measures

Secure Authentication

Multi-Factor Authentication (MFA) Implementation Records
Procedures for Managing Authentication Credentials
Password Policy
9 Measures

Logging & Monitoring

Logging and Monitoring Policy
Monitoring activities documentation
Endpoint Management System Records
3 Measures

Network Security

Network Security Policy
Network Diagram
WAF configuration
1 Measures

Data at Rest

Data-at-Rest Encryption Standard
2 Measures

Data in Transit

Data-in-Transit Encryption Standard
SSL/TLS Lifecycle Log
4 Measures

Access Control

Access Control Policy
Access Reviews Documentation
Records of Privileged Account Inventory
16 Measures

Data Protection

Data Retention and Disposal policies
Data Classification Policy
Data Protection Policy
7 Measures

Inventory

Document Templates
Document Distribution Records
Asset Management Policy
2 Measures

Remote Working

Remote Working Policy
Examples of Security Reminders
4 Measures

Training

Certifications and Qualifications
Training Records
Role-Based Security Training Plan
5 Measures

Onboarding/Offboarding

Acceptable Use Policy
Off-boarding Checklist
Contracts or Agreements with Outsourced Developers
3 Measures

Recruitment

Template Employment Contract
Personnel Background Verification
Code of Conduct
1 Measures

Vendor Management

Vendor Management Policy
2 Measures

Objectives

Information Security Objectives
AI Objective Action Plan
8 Measures

Management Documentation

Management Review Procedure
Management Review Meeting
Internal Wiki
2 Measures

Change Management

Change Management Policy
Change Request Forms / Change Log
7 Measures

Risk Management

Risk Assessment Report
Risk Assessment Policy
Risk Assessment Input
6 Measures

Interested Parties

Stakeholder Analysis
List of contact special interest groups
Customer Contracts/SLAs
9 Measures

Legal & Regulatory

List of relevant authorities
Applicable Laws and Regulations
Request Handling Procedure
3 Measures

Roles & Responsibilities

Roles and Responsibilities
Organizational Charts
RACI Matrix
6 Measures

Management System Documentations

Information Security Management System (ISMS) Plan
Information Security Policy
Statement of Applicability