Security Policy

hero background

Sections

mask

Safeguard Your Business with Robust Security

Ensuring the security of our systems and data is a top priority at Intuilize. We are committed to implementing robust security measures to protect user access, data, and compliance with today’s industry standards. Our secure architecture allows you to focus on running your business and reaching your financial goals confidently.

Development Practices

1. Security-Oriented Development: We adhere to best practices in secure development to ensure our applications are safe and reliable.

2. Solid Configuration Management and Release Processes: We maintain solid configuration management and release processes to ensure consistent and secure deployment of our solutions, minimizing risks and ensuring operational reliability.

3. Controlled Access Management: We implement controlled access protocols across various environments to uphold robust security measures during the development lifecycle.

4. Web Application Security Practices: Our commitment to web application security involves implementing comprehensive practices to protect against vulnerabilities and ensure the integrity of user data.

5. Infrastructure Security: Intuilize’s solutions are designed with the core principles of information security: Availability, Integrity, and Confidentiality (AIC).

Security

1. Security Training: All employees receive training to ensure they are aware of and understand our security protocols and procedures.

2. Internal Security and Privacy: We focus on privacy by design, using customer information only to provide our services, without any other purposes..

3. Compliance: Intuilize maintains thorough records of all key events, data, and logs to ensure transparency and accountability.

4. Operational Security: We manage vulnerabilities and prevent malware through regular scans using commercially available tools.

5. Identity and Access Management

     a. Least Privilege Model: Ensure users have the minimum level of access necessary for their role.

     b. Strong Authentication: Use robust authentication methods to protect user accounts.

     c. High Security Standards: Enforce stringent security standards across all systems and applications.

6. Incident Management: Intuilize has a structured incident management process for security events that may impact the confidentiality, integrity, or availability of systems or data. Incidents are logged and prioritized according to severity.

7. Application Security

     a. Regular Testing: Conduct regular security testing, including third-party penetration tests, to ensure robustness.

     b. Endpoint Encryption: Encrypt public endpoints with HTTPS (TLS 1.1+).

8. Data Security

     a. Data Isolation: Ensure customer data is isolated to prevent unauthorized access.

     b. Disaster Recovery: Implement strong disaster recovery and backup procedures.

Comprehensive Monitoring

  • Maintain a thorough view of application availability, reliability, and performance.
  • Monitor server-side
  • Perform runtime and proactive infrastructure monitoring.
  • Correlate application activity and load with infrastructure status.
  • Create actionable alerts with predefined responses.
  • Prepare dashboards for continuous monitoring and improvement.

This security policy outlines our commitment to protecting Intuilize’s assets and ensuring the security and privacy of our customers’ data.