FEHA Logo
FEHA

Feha International Consulting B.V

And AI and Human powered platform supporting businesses to comply with various frameworks and regulations, and prepare for certification, seamlessly And AI and Human powered platform supporting businesses to comply with various frameworks and regulations, and prepare for certification, seamlessly And AI and Human powered platform supporting businesses to comply with various frameworks and regulations, and prepare for certification, seamlessly And AI and Human powered platform supporting businesses to comply with various frameworks and regulations, and prepare for certification, seamlessly

Contact us
contact@feha.io
IT Services & Consulting
ISO27001:2022 Certified

Completed Compliance

Frameworks verified by consultant

Qatar PDPL

Qatar PDPL

8 measures implemented

Saudi Arabia PDPL

Saudi Arabia PDPL

11 measures implemented

UAE PDPL

UAE PDPL

7 measures implemented

Subprocessors

AWS (Amazon Web Service)

AWS (Amazon Web Service)

Compute Hosting

Visit website
Connected

Resources

Testing

dcekcedsasdmlkamsd

Approved at 5th Mar, 2026 at 02:34:35
Public

Acceptable Use Policy

Approved at 9th May, 2025 at 13:09:09
Private

Asset Management Policy

Approved at 9th May, 2025 at 13:09:27
Private

In Progress Compliance

This score is determined through an assessment performed by our FEHAGRC Consultant tes.

CSA CECOMPLIANCEMONITOREDBY FEHA

CSA Cyber Essentials

8 of 9 measures implemented

CSA CTCOMPLIANCEMONITOREDBY FEHA

CSA Cyber Trust

31 of 131 measures implemented

Egypt DPLCOMPLIANCEMONITOREDBY FEHA

Egypt Data Protection Law (DPL)

10 of 11 measures implemented

ISO27001:2022COMPLIANCEMONITOREDBY FEHA

ISO 27001:2022

55 of 123 measures implemented

ISO42001:2023COMPLIANCEMONITOREDBY FEHA

ISO 42001:2023

12 of 91 measures implemented

ISO 9001COMPLIANCEMONITOREDBY FEHA

ISO 9001

7 of 102 measures implemented

MAS TRMCOMPLIANCEMONITOREDBY FEHA

MAS TRM

15 of 77 measures implemented

MAS N1COMPLIANCEMONITOREDBY FEHA

MAS Notice 1121

1 of 5 measures implemented

NIS 2COMPLIANCEMONITOREDBY FEHA

NIS 2

14 of 41 measures implemented

PDPASingaporeCOMPLIANCEMONITOREDBY FEHA

PDPA Singapore

3 of 3 measures implemented

SOC 2COMPLIANCEMONITOREDBY FEHA

SOC 2

35 of 117 measures implemented

1 Measures

Equipment

Secure Disposal or Re-use of Equipment Procedure
5 Measures

Vulnerability Management

Penetration Testing Report
Threat Assessment Report
Vulnerability Scanning Report
6 Measures

Test Information

Test Data Management Policy or Procedure
Access Controls for Test Environments
Test Plans Documentation
4 Measures

Source Code

Access Control Configurations for Source Code Repositories
Version Control System Logs
Secure Coding Guidelines
13 Measures

Secure Development

Software Development Life Cycle
Asset Patch Update Log
Technical Development Guidelines for AI Fairness and Safety
4 Measures

Backups

Information Backup Policy
Clock Synchronization Documentation
Backup Schedule and Success Logs
4 Measures

Endpoint Security

Device Configuration Standards or Baselines
Antivirus/Anti-malware Software Deployment and Update Logs
Approved Software List (Whitelist)
2 Measures

Data Masking

Data Masking Policy
Data Masking Documentation
3 Measures

Secure Authentication

Multi-Factor Authentication (MFA) Implementation Records
Procedures for Managing Authentication Credentials
Password Policy
9 Measures

Logging & Monitoring

Logging and Monitoring Policy
Monitoring activities documentation
Endpoint Management System Records
3 Measures

Network Security

Network Security Policy
Network Diagram
WAF configuration
1 Measures

Data at Rest

Data-at-Rest Encryption Standard
2 Measures

Data in Transit

Data-in-Transit Encryption Standard
SSL/TLS Lifecycle Log
4 Measures

Access Control

Access Control Policy
Access Reviews Documentation
Records of Privileged Account Inventory
16 Measures

Data Protection

Data Retention and Disposal policies
Data Classification Policy
Data Protection Policy
7 Measures

Inventory

Asset Management Policy
Asset Register
Document Templates
2 Measures

Remote Working

Remote Working Policy
Examples of Security Reminders
4 Measures

Training

Training Records
Certifications and Qualifications
Role-Based Security Training Plan
5 Measures

Onboarding/Offboarding

Acceptable Use Policy
Off-boarding Checklist
Contracts or Agreements with Outsourced Developers
3 Measures

Recruitment

Template Employment Contract
Personnel Background Verification
Code of Conduct
1 Measures

Vendor Management

Vendor Management Policy
2 Measures

Objectives

Information Security Objectives
AI Objective Action Plan
8 Measures

Management Documentation

Internal Wiki
Management Review Meeting
Budget Allocation Records
2 Measures

Change Management

Change Management Policy
Change Request Forms / Change Log
7 Measures

Risk Management

Risk Assessment Report
Risk Assessment Policy
Risk Assessment Input
6 Measures

Interested Parties

Stakeholder Analysis
List of contact special interest groups
Customer Contracts/SLAs
9 Measures

Legal & Regulatory

List of relevant authorities
Applicable Laws and Regulations
Request Handling Procedure
3 Measures

Roles & Responsibilities

Roles and Responsibilities
Organizational Charts
RACI Matrix
7 Measures

Management System Documentations

Information Security Management System (ISMS) Plan
Information Security Policy
Statement of Applicability