Last Updated: March 1, 2026
Version: 2.0
This Security Policy outlines our commitment to protecting the confidentiality, integrity, and availability of our Platform and customer data. As a cybersecurity service provider, we recognize that our internal security practices must meet the highest standards.
This policy applies to:
We classify data into four categories:
| Classification | Definition | Examples | Handling Requirements |
|---|---|---|---|
| Public | Intended for public disclosure | Marketing materials, blog posts | No restrictions |
| Internal | Not for public disclosure | Internal documentation, policies | Access controls |
| Confidential | Sensitive business information | Customer lists, financial data | Encryption, strict access |
| Restricted | Highly sensitive customer data | Assessment results, credentials | Encryption, logging, minimal retention |
Data in Transit:
Data at Rest:
Key Management:
Retention Schedule:
Secure Deletion:
Multi-Factor Authentication (MFA):
Password Policy:
Principle of Least Privilege:
Role-Based Access Control (RBAC):
| Role | Access Level | Review Frequency |
|---|---|---|
| Customer Support | Read-only customer data, ticket system | Quarterly |
| Security Analyst | Security tools, logs | Quarterly |
| System Administrator | Infrastructure access | Monthly |
| Developer | Development environments only | Quarterly |
Continuous Scanning:
Penetration Testing:
Remediation SLAs:
| Severity | Response Time | Remediation Time |
|---|---|---|
| Critical | 1 hour | 24 hours |
| High | 4 hours | 7 days |
| Medium | 24 hours | 30 days |
| Low | 5 days | Next release |
Requirements Phase:
Design Phase:
Development Phase:
Testing Phase:
Release Phase:
| Tool Type | Tools Used | Frequency |
|---|---|---|
| SAST | SonarQube, Checkmarx | Every build |
| DAST | OWASP ZAP, Burp Suite | Weekly |
| Dependency | Snyk, Dependabot | Daily |
| Container | Trivy, Clair | Every build |
| Secrets | TruffleHog, GitLeaks | Pre-commit |
Phase 1: Detection
Phase 2: Analysis
Phase 3: Containment
Phase 4: Eradication
Phase 5: Recovery
Phase 6: Post-Incident
| Severity | Definition | Notification | Timeline |
|---|---|---|---|
| Severity 1 | Data breach, service outage | All affected customers, regulators | Within 24 hours |
| Severity 2 | Suspected breach, partial outage | Affected customers | Within 72 hours |
| Severity 3 | Vulnerability discovered | Internal only | Within 7 days |
| Severity 4 | Security events, low risk | Logged only | N/A |
| Scenario | RTO | RPO |
|---|---|---|
| Single AZ failure | 15 minutes | Near real-time |
| Region failure | 4 hours | 1 hour |
| Data corruption | 24 hours | 24 hours |
| Full disaster | 48 hours | 24 hours |
Emergency Contact (for active incidents only): +1-[phone number]