CASA SAQ 🔒 The Exact Questions - Full List
Because my extension uses gmail.modify and authenticates through OAuth, Google automatically triggered a CASA review. It’s a thorough process, and for anyone trying to prepare, here are the actual SAQ questions I received. FYI... I went through TAC Security for the CASA review as that is what google recommeneded. However, thre was one peice of it that my developer José saved me over $1000 becuase of how TAC Security lists the pricing options. I'll document that later and put a link here when its up. Here are the questions: 1. Verify documentation and justification of all the application's trust boundaries, components, and significant data flows. 2. Verify the application does not use unsupported, insecure, or deprecated client-side technologies such as NSAPI plugins, Flash, Shockwave, ActiveX, Silverlight, NACL, or client-side Java applets. 3. Verify that trusted enforcement points, such as access control gateways, servers, and serverless functions, enforce access controls. Never enforce access controls on the client. 4. Verify that all sensitive data is identified and classified into protection levels. 5. Verify that all protection levels have an associated set of protection requirements, such as encryption requirements, integrity requirements, retention, privacy and other confidentiality requirements, and that these are applied in the architecture. 6. Verify that the application employs integrity protections, such as code signing or subresource integrity. The application must not load or execute code from untrusted sources, such as loading includes, modules, plugins, code, or libraries from untrusted sources or the Internet. 8. Verify that the application has anti-automation controls to protect against excessive calls such as mass data exfiltration, business logic requests, file uploads or denial of service attacks. 9. Verify that files obtained from untrusted sources are stored outside the web root, with limited permissions. 10. Verify that files obtained from untrusted sources are scanned by antivirus scanners to prevent