Skip to main content

Security Policy Home

Here is a set of guidelines and procedures that a business implements to protect its information, assets, and customers from security threats. These policies...

Documentation

Infrastructure

Technically all our infrastructure are on Google Cloud and protected behind Google Cloud Amour security policy https://cloud.google.com/armor/docs/security-p...

Security audit

All the checklist items must be verified by each team member and audited frequently. Account Management Do you create a unique user account and username for ...

Managing vulnerabilities

We use Sonatype Nexus Repo to manage open source dependencies and artifacts Use Nexus Firewall and Lifecycle to detect and block components which have vulner...

Data recovery

All our apps are running on Google Cloud so that having Business Continuity and/or Disaster Recovery Plans is very easy. We deploy to multiple regions and zo...

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.