Application Performance Monitoring, Security & Compliance
1. Organizational Security
a. Information Security Program
We have implemented a comprehensive Information Security Program thoroughly integrated throughout our organization. This strategy is based on the SOC 2 Framework, an information security audit system established by the American Institute of Certified Public Accountants.
b. Third Parties Audits
Our organization willingly subjects itself to impartial, third-party evaluations designed to assess our security measures and compliance controls rigorously.
c. Third-Party Penetration Testing
At a minimum, we conduct independent third-party penetration tests annually to guarantee that the security integrity of our services is maintained.
d. Role Definition and Responsibilities Assignment
The roles and responsibilities concerning our Information Security Program and safeguarding our clients’ data are meticulously outlined and documented. It’s mandatory for our team members to thoroughly review and comply with all of the established security policies.
e. Enhancement of Security Awareness Training
All team members are obligated to participate in employee security awareness training. This compulsory program incorporates the study of industry-standard techniques and critical information security subjects such as phishing and the appropriate management of passwords.
f. Confidentiality
Each team member must sign and uphold an industry-standard confidentiality agreement before commencing their initial day of work.
g. Background Checks
We conduct comprehensive background checks on all prospective team members in strict compliance with local legislation.
2. Cloud Security
a. Cloud Infrastructure Security
Our services are hosted via Amazon Web Services (AWS), which employs a robust security program featuring numerous certifications. For more information on our provider’s security processes, please visit AWS Security.
b. Securing Data Hosting Services
All our data is stored on Amazon Web Services (AWS) databases. Each of these databases is situated within the United States.
c. Encryption at Rest
All databases are securely encrypted while at rest.
d. Encryption in Transit
Our applications encrypt in transit with TLS/SSL only.
e. Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
f. Logging and Monitoring
We actively monitor and log various cloud services.
g. Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team if any failures affect users.
h. Incident Response
We have a process for handling information security events, which includes escalation procedures, rapid mitigation, and communication.
3. Access Security
a. Permissions and Authentication
Access to cloud infrastructure and other sensitive tools is limited to authorized employees who require it for their roles. Where available, we have Single Sign-on (SSO), 2-factor authentication (2FA), and strong password policies to protect access to cloud services.
b. Least Privilege Access Control
We follow the principle of least privilege for identity and access management.
c. Quarterly Access Reviews
We perform quarterly access reviews of all team members with access to sensitive systems.
d. Password Requirements
All team members must adhere to a minimum set of password requirements and complexity for access.
e. Password Managers
All company-issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
4. Vendors and Risk Management
a. Annual Risk Assessments
We undergo at least annual risk assessments to identify potential threats, including considerations for fraud.
b. Vendor Risk Management
Vendor risk is determined, and the appropriate vendor reviews are performed before authorizing a new vendor.
5. Contact Us
If you have any questions, comments, or concerns, or if you wish to report a potential security issue, please contact help@eventtia.com.