Security is of utmost importance at SOE Technologies LLP (hereinafter referred to as “SOE” which term shall include its, affiliates, group companies, successors-in-interest and permitted assigns). To ensure the security of user data and our services, we have developed a comprehensive set of practices, policies and technologies to provide the best in className security.
This document outlines some of the mechanisms and processes we have implemented to help ensure that your data is protected.
ISO/IEC 27001 is one of the most widely recognized independent international security standards. This certificate is awarded to organizations that comply with ISO’s high global standards. SOE’s ISO/IEC 27001:2013 certification applies for Applications, Systems, People, Technology, and Processes.
The General Data Protection Regulation (GDPR) is a new framework that will harmonize data protection rules across the European Union (EU). It is in effect from May 25, 2018. The GDPR builds on existing data protection law, while also adding new requirements. As part of GDPR all our clients would act as data controllers and SOE would work as data processor. This ensures the privacy and lawful use of the user personal information.
SOC 2 is an evaluation of the design and operating effectiveness of controls that meet the AICPA’s Trust Services Principles criteria. Protecting personal information and ensuring safety is core to our services and we are currently SOC2 type 1 certified and working towards type 2 certification.
Our data centers are hosted with one of the most trusted datacenter providers in the world – Amazon Web Services (AWS). For physical security of data centers and data we leverage the capabilities of AWS which includes physical security and environmental controls.
As a SaaS service provider the data of all customers is hosted in the same infrastructure. We have processes and procedures in place to limit the access of data using logical segregation ensuring the privacy and security to the client data.
INFRASTRUCTURE AND NETWORK SECURITY
Access to infrastructure and network is granted only on need to know basis with minimum privileges. This ensures that only the users who require access to a system are able to access it. Key-based authentication mechanism is used for login with additional IP based restrictions. To ensure the security of data during transmission secure communication protocols (TLS1.2, SSH, SCP) are used. Data at rest is also encrypted using standard AES 256 encryption. Host based Intrusion Detection (HIDS) and antivirus are installed to secure and proactively monitor any changes in hosting infrastructure. Audit controls and logging is used to review controlled access environment.
PEOPLE, PROCESS AND BUSINESS CONTINUITY
While we talk about security and ensuring the privacy and security of data, along with technology, people and processes also play an important role. We have HR policies and practices in place to ensure the recruitment of right candidates and background verification of new employees. Security team ensures the need to know based access to security systems, data centers and applications. As part of Information Security Management System (ISMS) regular audits are conducted to ensure internal compliances are followed across the organization.
For business continuity people, process and technology plays key roles to provide uninterrupted services to client. SOE offices are based out of Noida, Uttar Pradesh, India. For cloud systems backups and BCP plans are in place to provide service in case any interruption from primary location.
How Can You Reach Us?
It is our core responsibility to keep our customer data safe and secure. If you have discovered a security vulnerability we would greatly appreciate your help in disclosing it to us in a responsible manner. Publicly disclosing a vulnerability may attract more risk for your data and of other users. You can send the details to our security team as email@example.com
Security vulnerabilities are treated with the utmost importance to ensure the safety and security of our service. We will work with you to assess and understand the scope of the issue and fully address any concerns.