Is it possible to transfer / receive logs of activity and security from the system?
Does the company facilitate any SIEM/SOC to monitor the system?
Has the product ever been compromised (internally or externally)?
Is the product monitored and audited for security manners?