Experts in innovation strategies
English
  • Localized Websites

Technical Organization Measures

Technical Organization Measures

Technical Organization Measures

All your data is encrypted plus extra measures (during transmission and at rest). Passwords are secured in a comprehensive manner. The user password follows industrial secured standards.

Encrypt data at rest & transmission:

  • Data is encrypted at rest and during transmission. No plain text is processed.

Password Hashing:

  • The password is hashed using state-of-the-art technology.

Monitoring and Protocols:

Overview of activities on resources:

  1. Asset Management and Configuration
  2. Audits and security analyze
  3. Detailed information on network processes
  4. Rule-based checks and actions for configuration
  5. Filtering and monitoring HTTP access to applications
  6. Data is transmitted via TLS

Access Control:

  1. Allow only authorized administrators, users, and applications
  2. Multi-Factor Authentication (MFA)
  3. Individually defined access to objects
  4. Authentication of API requests
  5. Geographical restrictions
  6. Temporary Access Tokens with Security Token Service

Data privacy:

  1. We provide our customers with the transparency of knowing where their data is stored, including the storage type and geographic storage region.
  2. We determine the security status of our customers' content and provide robust encryption of customer content during transmission and storage.
  3. We manage access to our customers' content, services and resources through users, groups, permissions and credentials controlled by the customers.

Security by Design:

  1. Forcing functions are to be created which cannot be overwritten by users without corresponding modification authorization.
  2. Establish reliable execution of controls
  3. Enable continuous real-time inspection
  4. The technical scripting of governance policies is performed

Our data centre provider holds recognised certifications and accreditations that demonstrate compliance with strict international standards. These include: ISO 27001 for technical measures, ISO 27017 for cloud security, ISO 27018 for cloud data protection, SOC 1, SOC 2 and SOC 3, PCI DSS Level 1, and certain EU-specific certifications such as the Catalogue for Cloud Computing (C5) and ENS High Requirements. Our data centre operator has also recently announced compliance with the CISPE Code of Conduct.

 

Ensuring Confidentiality

Cetbix implements several specific measures to ensure data confidentiality:

  • Data encryption: All data is encrypted at rest and during transmission.
  • Access controls: Physical and logical access controls are established for facilities and infrastructure hosting services. All access is logged and analyzed for inappropriate use.
  • Secure facilities: Data is kept in ISO 27001 certified European co-location facilities with 24/7 on-site security, environmental monitoring, and redundant power.
  • Continuous monitoring: An automation tool ensures system integrity at the application level, and hundreds of metrics are collected and compared against baselines.
  • Secure authentication: The app uses TLS and other pinnings for authentication.
  • No storage of sensitive financial data: Cetbix does not keep bank or credit card credentials on their servers.
  • Firewalls: Server protection includes firewalls.
  • Compliance with regulations: Cetbix complies with GDPR and enters into data processing agreements with customers.
  • Regular security audits: The company performs gap analyses and audits based on ISO 27001 and ISO 27002 standards.
  • Incident management: Cetbix has a system for managing and tracking security incidents.

These measures collectively form a comprehensive approach to ensuring data confidentiality for Cetbix's customers and users.

 


Ensuring Availability

Cetbix implements several specific measures to ensure data availability:

  • Cloud and On-Premises Solutions: Cetbix is generally available as both a cloud solution and on-premises, allowing organizations to choose the deployment method that best suits their availability needs[5].
  • Automatic backups: Automatic backup systems that regularly save data without manual intervention, ensuring data integrity and availability at all times.
  • High availability infrastructure: The use of replication techniques to maintain data availability even if a datacenter goes offline. This high availability approach ensures continuous access to data.
  • Scalable storage options with built-in redundancy, enhancing data availability.
  • Real-time monitoring: Tools that assess the health of data infrastructure, providing real-time information through logging mechanisms and warning systems.
  • Service Level Agreements (SLAs): SLAs ensuring that the application remains available to customers as agreed upon.
  • Security measures: Encryption, authentication, and authorization mechanisms are being used to protect data and ensure its availability only to authorized users.
  • Regularly assess and update: Conducts data audits, monitor performance, and continuously evaluate and improve data management strategies.

 

By implementing these measures, Cetbix strive to maintain consistent data availability, minimizing downtime and ensuring users can access their data when needed.


Ensuring Integrity

Cetbix implements several specific measures to ensure data integrity:

  • Robust Authentication and Access Controls: Multi-factor authentication (MFA) and role-based access control (RBAC) limits who can view or modify data.
  • Data Validation and Audits: Regular data validation checks and audits ensure accuracy and consistency.
  • Data Encryption: Encrypting data at rest and in transit protects it from unauthorized access or manipulation.
  • Backups and Contingency Planning: Comprehensive backup solutions and contingency plans allow for quick data recovery in case of system failures or breaches.
  • Continuous Monitoring: Advanced monitoring tools detect anomalies or suspicious activities in real-time, allowing for swift resolution to preserve data integrity.
  • Data Governance Policies: Enforcing policies that define how data should be managed, used, and protected.
  • Device and Browser Fingerprinting: This technique uniquely identifies and tracks user devices and browsers to prevent unauthorized access.
  • Impossible Travel Detection: This method detects unusual user login patterns based on geographical locations.
  • Bot Behavior Biometrics AI: AI-driven analysis of user interactions detects anomalies that could indicate fraudulent activities.
  • Data Quality Metrics: Established key metrics to measure and track data quality over time ensures consistent data integrity.
  • Staff Training: Training programs that enhance our employees awareness and understanding of data integrity practices.

 

By implementing these strategies, Cetbix solutions maintain high levels of data integrity, ensuring accuracy, consistency, and reliability of data throughout its lifecycle.