Legal Protocols

Security Policy

Security is the foundation of our engineering process. This document outlines the technical and organizational measures we take to protect our infrastructure and your data.

Last updated: May 2024

01. Infrastructure Security

Our platform is built on enterprise-grade infrastructure utilizing top-tier cloud providers.

Cloud Architecture

We utilize AWS and Azure with strict VPC boundaries and DDoS protection.

Data Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256.

02. Access Control

  • Zero Trust Architecture: Internal access to production systems requires strict multi-factor authentication (MFA) and VPNs.
  • Principle of Least Privilege: Employees are only granted access to systems and data necessary for their role.
  • Audit Logging: All access to sensitive systems is logged and monitored for anomalous behavior.

03. Vulnerability Management

We conduct regular automated vulnerability scanning and manual penetration testing. Code changes go through rigorous peer review and automated CI/CD security checks before deployment.

04. Reporting a Security Issue

If you believe you have discovered a vulnerability in our systems, we want to hear from you immediately.

Email security@itpravah.com