Security & Compliance — Built In, Not Bolted On

We safeguard your data across people, process, and technology: physical, network, application, access, and lifecycle controls.

Contact Us Download Overview
ISO/IEC 27001 (alignment) OWASP ASVS & Top 10 NIST CSF / SP 800-53 (risk-based) CIS Benchmarks SOC 2 TSC (process alignment) GDPR principles & DPAs

Physical Security

Data centre controls

Tier‑1 facilities with 24/7 guards, CCTV, mantraps, visitor logs, and biometric access. Redundant power & environment.

Device & office

  • Managed endpoints with full‑disk encryption
  • Auto‑lock, screen privacy, and secure media handling
  • Asset tracking & visitor management where applicable

People security

Background checks where lawful, role‑based onboarding, NDAs, continuous security awareness & phishing simulations.

Network & Infrastructure

Perimeter & segmentation

  • Private subnets & security groups by function
  • WAF, rate limiting, anti‑bot, and TLS enforcement

Patching & hardening

Baseline images, CIS‑aligned hardening, staged updates, config drift alerts, and vulnerability management.

Secrets & keys

Managed KMS/HSM, key rotation, short‑lived credentials, and secret scanning in CI.

Application Security (SDLC)

Secure‑by‑design

Threat modeling, dependency pinning, code review, and unit/integration tests on every change.

Testing & scanning

SAST/DAST, IaC scanning, secret detection, and periodic third‑party testing where scoped.

Release & rollback

Signed builds, protected branches, staged rollouts, canary/feature flags, and fast rollbacks.

Access Control & Identity

MFA & SSO

SSO across core systems with enforced MFA, including phishing‑resistant factors where supported.

Least privilege

Role‑based access, time‑bound elevation (Just‑in‑Time), and quarterly access reviews.

Account lifecycle

Automated provisioning/deprovisioning tied to HR events; immediate revocation on exit.

Data Protection & Privacy

Encryption

  • TLS 1.2+ in transit
  • AES‑256 at rest (provider‑managed)
  • Key rotation via KMS policies

Data minimisation

Collect only what’s needed; configurable redaction and defined retention windows by dataset.

Customer controls

DPAs, SCCs where required, and access logs/audit support on request.

Data Integrity & Availability

Backups

Automated, encrypted backups with multi‑AZ/region options and periodic restore tests.

Immutability

Write‑once retention (where supported) and checksum verification on critical artefacts.

Resilience

Health probes, autoscaling, and graceful degradation to preserve core functions.

Data Retention & Secure Destruction

Retention policies

Dataset‑specific schedules with legal holds. Authenticated deletion requests supported via secure channels.

Destruction

Cryptographic erasure or provider‑certified media destruction. Certificates available upon request.

Monitoring, Logging & Detection

Telemetry

Centralised logs with retention & integrity controls; time‑synced systems for reliable forensics.

Alerting

Threshold & anomaly alerts for auth, config drift, data exfil patterns, and resource spikes.

Detection

Endpoint protection on managed devices, vulnerability management, and periodic external scanning.

Incident Response & BCP/DR

IR playbooks

Documented runbooks for containment, eradication, recovery, and customer communication. PIRs drive improvements.

BCP / DR

Defined RTO/RPO targets by service tier; tabletop or live failover exercises performed on cadence.

Vendors & Sub‑processors

Risk management

Due diligence, DPAs, security addenda, and continuous monitoring for critical vendors; least‑privilege data sharing.

Data residency

Region selection options where available. Sub‑processor list available on request with change notifications.

Privacy & Legal

Privacy by design

Data minimisation, purpose limitation, and transparency embedded into product decisions.

Agreements

Mutual NDAs, DPAs, and standard contractual clauses (where applicable).

Requests

Support for data subject requests via authenticated channels and verifiable controls.

Shared Responsibility Model

We handle

  • Platform security (infrastructure, SDLC, monitoring)
  • Encryption, backup, and secure deletion mechanisms
  • Incident response and business continuity

You control

  • End‑user account hygiene (passwords/MFA)
  • Authorisation choices (who sees what)
  • Local device and network protections

We’ll provide guidance and best practices for your side of the model.

Frequently Asked Questions

Do you support custom DPAs and NDAs?

Yes. We can review your paper or provide ours for mutual execution.

Can we choose data residency?

Where the underpinning cloud services support it, we offer regional hosting options.

How do you handle deletion requests?

Authenticated requests trigger workflow‑based deletion with verification and audit trail.

Security overview & contact

Need deeper details (architectures, test attestations, or policy set)? Let’s talk.

Contact Us Book a call

Resources

  • High‑level Security Overview (PDF)
  • Sub‑processor list (on request)
  • BCP/DR testing summary (on request)
Download PDF
Subscribed!
Subscribed! Privacy