Security Policy Home
Here is a set of guidelines and procedures that a business implements to protect its information, assets, and customers from security threats. These policies...
Documentation
Infrastructure
Technically all our infrastructure are on Google Cloud and protected behind Google Cloud Amour security policy https://cloud.google.com/armor/docs/security-p...
Security audit
All the checklist items must be verified by each team member and audited frequently. Account Management Do you create a unique user account and username for ...
Managing vulnerabilities
We use Sonatype Nexus Repo to manage open source dependencies and artifacts Use Nexus Firewall and Lifecycle to detect and block components which have vulner...
Data recovery
All our apps are running on Google Cloud so that having Business Continuity and/or Disaster Recovery Plans is very easy. We deploy to multiple regions and zo...