Security Posture

Security & Compliance

BAY IT operations are designed to meet the security and compliance standards demanded by enterprise clients across healthcare, financial services, and regulated industries.

Foundation

Zero Trust Operating Principles

BAY IT applies Zero Trust principles to every delivery engagement โ€” not as a marketing position, but as an operational requirement. Resources operate under least-privilege access, all sessions are authenticated and logged, and no standing administrative access is maintained between engagements.

This posture directly supports your clients' own Zero Trust initiatives and demonstrates to enterprise buyers that your delivery chain is architecturally sound.

Verify Explicitly

All access authenticated via MFA. No implicit trust granted based on network location.

Least Privilege

JIT access provisioned per-engagement. Standing admin rights are not maintained.

Assume Breach

Segmented access, session logging, and anomaly monitoring on all delivery activity.

Audit Continuity

Complete access and activity audit trail available in your PSA at all times.

Framework Alignment

NIST Cybersecurity Framework

BAY IT delivery operations map directly to the five NIST CSF functions โ€” providing a structured reference point for client security conversations and audit evidence requests.

Identify

Asset management, risk assessment, governance mapping

Protect

Access control, data security, patch management, awareness

Detect

Continuous monitoring, anomaly detection, SIEM correlation

Respond

Incident response, communication, analysis, mitigation

Recover

Recovery planning, improvements, communications

CIS Controls v8

18 Control Domains. Operationalized.

CIS Controls provide the prioritized action framework BAY IT uses to structure client security engagements. Resources are trained on all 18 controls and capable of mapping client environments to IG1, IG2, and IG3 implementation groups โ€” supporting both initial assessment and ongoing remediation.

For MSPs serving SMB clients, IG1 controls represent the minimum defensible security baseline. BAY IT can assess, implement, and document that baseline under your brand.

CIS 1โ€“2
Asset Inventory
CIS 3โ€“4
Data & Config Management
CIS 5โ€“6
Account & Access Control
CIS 7โ€“9
Vulnerability & Email Defense
CIS 10โ€“11
Malware Defense & Recovery
CIS 12โ€“16
Network, Monitoring & Testing
CIS 17โ€“18
Incident Response & Penetration Testing
Regulatory Frameworks

Compliance Support Capabilities

BAY IT resources provide operational support for clients subject to the following regulatory requirements. Framework references indicate staff training and operational alignment โ€” formal certification claims are confirmed per engagement.

SOC 2
SOC 2 Type II Alignment
AICPA Trust Service Criteria

BAY IT operations are structured around the five TSC domains: Security, Availability, Confidentiality, Processing Integrity, and Privacy. Operational procedures, access controls, and logging practices are maintained to support partner SOC 2 audit evidence requirements.

Operational Controls Maintained
  • Logical access controls and quarterly reviews
  • Change management documentation
  • Incident response procedures with defined RTO/RPO
  • Encryption-at-rest and in-transit for all partner data
  • Vendor security review process for sub-processors
HIPAA
HIPAA / HITECH
Healthcare data protection

Resources supporting healthcare MSP partners are trained on HIPAA Technical Safeguard requirements. BAY IT can execute as a Business Associate under a BAA where required, and supports PHI-adjacent system management with appropriate access segregation.

Applicable Capabilities
  • Access control and audit controls (ยง164.312)
  • Transmission security for ePHI systems
  • Workforce training on HIPAA safeguards
  • BAA execution support for partner engagements
  • Incident response aligned to Breach Notification Rule
CMMC 2.0
CMMC 2.0 Level 1โ€“2 Support
DoD supply-chain security

For MSPs serving defense contractors, BAY IT provides operational support aligned to CMMC 2.0 Level 1 (17 practices) and Level 2 (110 NIST SP 800-171 practices). Resources support System Security Plan (SSP) development and technical control implementation.

Support Scope
  • NIST SP 800-171 control gap analysis
  • System Security Plan (SSP) support
  • Access control and configuration management
  • Incident response plan documentation
  • POA&M development for remediation tracking
GDPR
GDPR Operational Awareness
UK/EU data protection

For MSP partners serving UK and EU-based clients, BAY IT resources operate with GDPR Article 28 processor obligations in mind. Data residency, subject access requests, and lawful processing basis documentation support available on request.

Applicable Capabilities
  • Data processing register support
  • Sub-processor documentation
  • Data residency configuration (M365, Azure)
  • Breach notification procedure alignment
  • Privacy by design in M365 deployment
Operational Security

Secure Delivery Operations

Security controls applied to BAY IT's own delivery environment โ€” protecting partner data and end-client systems at the infrastructure layer.

Access Governance

  • MFA enforced on all delivery accounts
  • JIT privileged access โ€” no standing admin
  • Quarterly access review and recertification
  • Role-based access scoped per partner

Logging & Monitoring

  • All delivery activity logged in partner PSA
  • Session recording for privileged access
  • Anomaly detection on delivery accounts
  • Audit trail available to partner at any time

Escalation & Incident

  • Defined incident classification tiers
  • Escalation to partner within SLA window
  • Documented incident response runbooks
  • Post-incident review and root cause report

Resource Vetting

  • Technical competency assessment pre-deployment
  • Background screening per regional requirements
  • Communication and documentation audit
  • MSP culture-fit evaluation

Data Handling

  • No partner data retained post-engagement
  • Credentials stored in partner-controlled vault
  • No external data transfer without authorization
  • Offboarding procedure with data destruction confirmation

vCISO Security Advisory

For MSPs requiring executive-level security governance support, BAY IT's vCISO service provides white-labeled strategy, risk advisory, and compliance oversight.

Learn More