Application Performance Monitoring, Security & Compliance

1. Organizational Security

a. Information Security Program

We have implemented a comprehensive Information Security Program thoroughly integrated throughout our organization. This strategy is based on the SOC 2 Framework, an information security audit system established by the American Institute of Certified Public Accountants.

b. Third Parties Audits

Our organization willingly subjects itself to impartial, third-party evaluations designed to assess our security measures and compliance controls rigorously.

c. Third-Party Penetration Testing

At a minimum, we conduct independent third-party penetration tests annually to guarantee that the security integrity of our services is maintained.

d. Role Definition and Responsibilities Assignment

The roles and responsibilities concerning our Information Security Program and safeguarding our clients’ data are meticulously outlined and documented. It’s mandatory for our team members to thoroughly review and comply with all of the established security policies.

e. Enhancement of Security Awareness Training

All team members are obligated to participate in employee security awareness training. This compulsory program incorporates the study of industry-standard techniques and critical information security subjects such as phishing and the appropriate management of passwords.

f. Confidentiality

Each team member must sign and uphold an industry-standard confidentiality agreement before commencing their initial day of work.

g. Background Checks

We conduct comprehensive background checks on all prospective team members in strict compliance with local legislation.

2. Cloud Security

a. Cloud Infrastructure Security

Our services are hosted via Amazon Web Services (AWS), which employs a robust security program featuring numerous certifications. For more information on our provider’s security processes, please visit AWS Security.

b. Securing Data Hosting Services

All our data is stored on Amazon Web Services (AWS) databases. Each of these databases is situated within the United States.

c. Encryption at Rest

All databases are securely encrypted while at rest.

d. Encryption in Transit

Our applications encrypt in transit with TLS/SSL only.

e. Vulnerability Scanning

We perform vulnerability scanning and actively monitor for threats.

f. Logging and Monitoring

We actively monitor and log various cloud services.

g. Business Continuity and Disaster Recovery

We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team if any failures affect users.

h. Incident Response

We have a process for handling information security events, which includes escalation procedures, rapid mitigation, and communication.

3. Access Security

a. Permissions and Authentication

Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their roles. Where available, we have Single Sign-on (SSO), 2-factor authentication (2FA), and strong password policies to protect access to cloud services.

b. Least Privilege Access Control

We follow the principle of least privilege for identity and access management.

c. Quarterly Access Reviews

We perform quarterly access reviews of all team members with access to sensitive systems.

d. Password Requirements

All team members must adhere to a minimum set of password requirements and complexity for access.

e. Password Managers

All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.

4. Vendors and Risk Management

a. Annual Risk Assessments

We undergo at least annual risk assessments to identify potential threats, including considerations for fraud.

b. Vendor Risk Management

Vendor risk is determined, and the appropriate vendor reviews are performed before authorizing a new vendor.

5. Contact Us

If you have any questions, comments, or concerns, or if you wish to report a potential security issue, please contact help@eventtia.com.