Knowledge Bases & Checklists

A wide range of checklists available

VIGIL enables you to centralise, preserve and develop your knowledge in a single tool.
 
Take advantage of parameterised, customisable and continuously updated knowledge bases and questionnaires.
 
Discover more than 2.000 checkpoints focusing on the following topics :

Ensure your compliance with CSSF Circular 18/698 thanks to a 196 items questionnaire divided into 22 topics.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

Questionnaire focused on the following areas:

  • General Assembly
  • Board of Directors
  • Management Committee
  • Policies and procedures
  • Internal Audit
  • External audit
  • Risk management
  • Compliance
  • Portfolio
  • Delegation
  • Evaluation
  • Information
  • Programme
  • Human Resources
  • IT
  • Accounting
  • Head Office
  • Marketing
  • Proportionality
  • Finance
  • Insurance
  • AML/CTF

Ensure your compliance with CSSF Circular 18/697 thanks to a 91 items questionnaire divided into 5 topics.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

Questionnaire focused on the following areas:

  • Approval
  • Outsourcing
  • Contract 
  • Procedure
  • Due Diligence

Quickly carry out your due diligence work on your various service providers thanks to our pre-configured questionnaires.

Centralised on a single platform, manage your Due Diligences efficiently.

Tackle your due diligence work with ease:

  • Description of the due diligence measures carried out in compliance with the risk-based approach;
  • Description and critical analysis of the observations made;
  • Results of the analysis of the information and documents obtained during the due diligence operations;
  • Where applicable, the escalation measures carried out;
  • Conclusions reached and then validated, dated and signed by any authorised company body as to the decision to delegate or refuse the delegation in question.

Article 2-2 of the Coordinated Law of 12 November 2004 : « The professionals shall take appropriate steps to identify, assess and understand the risks of money laundering and terrorist financing that they face, taking into account risk factors including those relating to their customers, countries or geographic areas, products, services, transactions or delivery channels.»

Based on 74 questions, this questionnaire will allow you to define your BC/FT risk appetite.

Questionnaire focused on the following areas:

  • AML/CTF responsibilities
  • AML/CTF procedure
  • Customer review (KYC)
  • Transaction review (KYT)
  • Control solution
  • Definition of occasional customers
  • Suspicious transaction reports
  • Staff training & awareness
  • Customer risk factors
  • Product/service risk factors
  • Geographical risk factors
  • Definition of risk appetite
  • Definition of inherent risk
  • Definition of mitigation measures
  • Definition of residual risk

Identify the weaknesses in your AML/CFT policies and procedures so that they can be addressed quickly.

This questionnaire is based on 155 questions divided into 18 topics.

Questionnaire focused on the following areas:

  • Formalization & approval of the AML/CFT procedure
  • Legal & regulatory references
  • Obligation of adequate internal organisation
  • Designation & communication of AML/CTF responsibles
  • Use of the GoAML platform
  • Staff training & awareness
  • Definition of key AML/CFT concepts
  • Customer identification measures
  • Individual risk analysis
  • Global risk analysis
  • Definition of simplified due diligence
  • Definition of enhanced due diligence
  • Definition of AML/CFT risk appetite
  • Identity verification measures
  • Customer acceptance policy
  • Ongoing vigilance measures
  • Obligation to cooperate with the authorities
  • Formalization, acknowledgement and approval of the AML/CFT report of the manager

 

Identify the weaknesses in your KYC files so that you can quickly address them.

This questionnaire is based on 35 questions divided into 8 topics.

Questionnaire focused on the following areas:

  • KYC files review
  • KYT files review
  • Review of identification forms
  • Review of individual risk analyses
  • Review of customer acceptance forms
  • Review of clients’ identification and identity verification documents
  • Review of ultimate beneficial owners’ identification and verification documents
  • Review of proxies' identification and verification documents

Get your GDPR-CARPA certification quickly.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

This questionnaire is based on 161 questions divided into 14 topics.

Questionnaire focused on the following areas:

  • Scope of application
  • Lawfulness of processing
  • Consent
  • Special categories
  • Transparency and modalities
  • Information and access to data
  • Rectification and erasure
  • Right of objection
  • General obligations
  • Data security
  • Impact assessment
  • Data Protection Officer
  • Code of conduct and certification
  • Data transfers

Determine the level of maturity of your HR department.

This questionnaire is based on 37 questions divided into 14 topics.

Questionnaire focused on the following areas:

  • HR - Procedure
  • HR - Newcomers
  • HR - Training
  • HR - Evaluation
  • HR - Compensation policy
  • HR - Absence management
  • HR - Human resources forecasting
  • HR - Competency management
  • HR - Recruitment
  • HR - Health
  • HR - Ethics
  • HR - Career
  • HR - Administrative management
  • HR - Exit

Determine the level of maturity of your sales department.

This questionnaire is based on 53 questions divided into 11 topics.

Questionnaire focused on the following areas:

  • Knowledge of the market and potential customers
  • Prospecting
  • Company image
  • Sales department
  • Determining payment terms
  • Keeping of the sales journal and reporting
  • Keeping customer accounts and centralising sales
  • Order processing
  • Keeping the list of doubtful customers
  • Stock monitoring
  • Sales management

Raise awareness of fraud risks in your organisation.

This questionnaire is based on 58 questions divided into 13 topics.

Questionnaire focused on the following areas:

  • General
  • Organization
  • Internal Control
  • Training
  • Communication
  • Forecasting
  • Payment
  • HR
  • Information assets
  • Third party relations
  • Incident monitoring
  • Business line
  • Debt levels and cash flows

Perform a "Critical Security Controls" of your organisation.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

This questionnaire is based on 171 questions divided into 20 topics.

Questionnaire focused on the following areas:

  • Inventory and control of hardware assets
  • Inventory and control of software assets
  • Continuous vulnerability management
  • Controlled use of administrative privileges
  • Secure configuration for hardware & software
  • Maintenance, monitoring and analysis of audit logs
  • Email and web browser protections
  • Malware defenses
  • Limitation and control of network ports, protocols, and services
  • Data recovery capabilities
  • Secure configuration for network devices
  • Boundary defense
  • Data protection
  • Controlled access based on the need to know
  • Wireless access control
  • Account monitoring and control
  • Implement a security awareness and training program
  • Application software security
  • Incident response and management
  • Penetration tests and red team exercises

Ensure your compliance with CSSF Circular 20/750 thanks to a 216 items questionnaire divided into 28 topics.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

Questionnaire focused on the following areas:

  • System of governance
  •  IT risk management
  • Information security policy
  • Cyber security
  • Information classification and handling
  • BCP/DR
  • Backups
  • Alternate datacentre
  • Encryption
  • Access control
  • Privilege
  • Access control management confirmations
  • User access management
  • Information access restriction
  • Platform security controls – computer system security
  • Platform security – System config
  • Platform security controls – network security
  • Database and application
  • Platform security – system/app controls
  • Platform security – technical infrastructure
  • Physical environment
  • Change management
  • Incident management
  • Logs and system monitoring
  • Vulnerability scans
  • Penetration testing
  • Supplier/vendor management
  • HR security – background checks

Get your ISO/IEC 27001-2 certification.

Quickly identify your weaknesses in order to remedy them efficiently thanks to precise action plans.

This questionnaire is based on 822 questions divided into 37 topics.

Questionnaire focused on the following areas:

  • ISIT – 01 – Policies for information security
  • ISIT – 02 – Internal organization
  • ISIT – 03 – Mobile devices and teleworking
  • ISIT – 04 – Prior to employment
  • ISIT – 05 – During employment
  • ISIT – 06 – Termination employment
  • ISIT – 07 – Responsibility for assets
  • ISIT – 08 – Information classification
  • ISIT – 09 – Media handling
  • ISIT – 10 – Business requirements of access control
  • ISIT – 11 – User access management
  • ISIT – 12 – User responsibilities
  • ISIT – 13 – System and application access control
  • ISIT – 14 – Cryptographic controls
  • ISIT – 15 – Secure areas
  • ISIT – 16 – Equipment
  • ISIT – 17 – Operational procedures and responsibilities
  • ISIT – 18 – Protection from malware
  • ISIT – 19 – Backup
  • ISIT – 20 – Logging
  • ISIT – 21 – Control of operational software
  • ISIT – 22 – Technical vulnerability management
  • ISIT – 23 – Information systems and audit considerations
  • ISIT – 24 – Network security management
  • ISIT – 25 – Information transfer
  • ISIT – 26 – Security requirements of information systems
  • ISIT – 27 – Security in developement and support processes
  • ISIT – 28 – Test data
  • ISIT – 29 – Information security in supplier relationships
  • ISIT – 30 – Supplier service delivery management
  • ISIT – 31 – Management of information security incidents and improvements
  • ISIT – 32 – Information security continuity
  • ISIT – 33 – Redundancies
  • ISIT – 34 – Compliance with legal and contractual requirements
  • ISIT – 35 – Information security reviews

An additional value for your organisation !

Take advantage of the guidance provided by experts

Document your reviews & download your report

Take your organisation to the next level

Access to customised and configurable checklists

Discover VIGIL

Contact us

Would you like to receive more information about our solution or would you like to schedule a demonstration ?

Contact us via the attached form or by using the following contact details.

Address

11, rue des trois Cantons L-8399 Windhof Luxemburg

email

info@vigil.lu

Phone

+352 26 30 89 35

Mobile

+352 661 777 987

Contact Form

Fields marked with an asterisk (*) are mandatory
en_GBEnglish

Confirmation

Merci !

Le formulaire a été envoyé avec succès.
Nous vous contacterons dans les plus brefs délais