Trust and Security Portal
Overview:
Welcome to The ComplianceAide's Trust Portal, specially designed for our API and services. This portal serves as your one-stop destination for gaining insights into our steadfast commitment to data protection, privacy, and regulatory compliance. Here, you will find exhaustive compliance documentation, answers to commonly asked questions about security and privacy, and an in-depth look into our stringent security measures. Our aim is to be transparent and build a trustworthy relationship with our clientele, offering you the assurance and information you require to be certain of our capabilities in safeguarding your data.
ComplianceAide doesn't store any data to prioritize user privacy and data security by design.
AI
Prompt(s) and completions (output), your embeddings and your training data
· are NOT available to other customers.
· are NOT available to OpenAI.
· are NOT used to improve OpenAI models.
· are NOT used to improve any Microsoft or 3rd party products or services.
· are NOT used for automatically improving Azure OpenAI models for your use in your resource (The models are stateless, unless you explicitly fine-tune models with your training data).
Security Frameworks we follow
· Cyber Essentials
· NIST CSF
Risk Profile
· Third Part Dependence = Yes
· Hosting = Major Cloud Providers: Azure
Data Security
· Backups enabled
We conduct backups on a regular basis in the event of an incident that causes data loss.
· Data deletion
We do not save, store or retain user responses, policies, plans, POEMS, assessments or evidence beyond a 7 day period.
· Encryption-in-transit
All customer data is encrypted in-transit using TLS 1.2
· Physical Security
Physical security of our infrastructure is managed by Azure. For more information, please see this overview: https://learn.microsoft.com/en-us/azure/security/fundamentals/physical-security
Access Control
· Data access
Access to internal systems is granted based on the principle of least privilege and is reviewed on a regular basis.
· Logging
All important security events in our environment are monitored.
· Credential Security
We have a strong internal password policy that includes a requirement for MFA for accounts that do not support SSO. Passwords are stored in a company managed password manager.
Infrastructure
· 24/7 Status Monitoring
· Windows 365
Our endpoints utilize windows 365 enterprise VDI's and are hosted in Azure in multiple regions throughout North America.
· Azure
Our infrastructure is hosted in Azure in multiple regions throughout North America.
· Infrastructure Security
We utilize infrastructure-as-code techniques to securely deploy resources in our environment.
· Separate Production Environment
Customer data is not used in non-production environments.
Endpoint Security
· Disk Encryption
Full-disk encryption is used to protect employee endpoints and infrastructure in the cloud.
· Endpoint Detection & Response
All employee endpoints are protected with an advanced EDR solution.
· Mobile Device Management
All employee endpoints are centrally managed and secured using an MDM solution.
Network Security
· Firewall
We use both Firewalls and Cilium Network Policies (firewalls for Kubernetes) to monitor and control traffic in our infrastructure.
· IDS
Network activity is centrally logged and arbitrary detection logic has been defined to identify attackers and other anomalous behavior and generate alerts for further investigation.