Velosimo Connect Platform Security Overview

Introduction

This document showcases our dedication to ensuring a secure user environment and maintaining compliance with industry best practices and standards.

System and Network Security

  • Hosting and Infrastructure: Velosimo Connect is hosted on Amazon Web Services (AWS), a secure cloud services platform. AWS provides a robust, scalable, and secure infrastructure, with compliance certifications from multiple bodies across the globe. It offers us a wide range of data protection measures, including secure access, encryption, network firewalls, and intrusion detection systems.
  • Firewalls and Intrusion Detection Systems: We have robust firewalls and intrusion detection systems (IDS) in place to protect our network and monitor any malicious activity. AWS's in-built security features further enhance these protections.
  • Network Segmentation: We have implemented network segmentation within the AWS environment, isolating sensitive systems from other networks to minimize the risk of unauthorized access.
  • Vulnerability Scanning and Patching: We conduct regular vulnerability scans and promptly apply the necessary patches. The AWS infrastructure enables us to apply these updates seamlessly without interrupting our service.

Data Protection

  • Encryption: All data on Velosimo Connect, both in transit and at rest, is encrypted using industry-standard protocols. AWS's encryption services enhance our data protection capabilities.
  • Data Backup: We perform regular backups of customer data, with data restoration procedures regularly tested. AWS's reliable and scalable storage services support these efforts.

Access Control

  • Role-Based Access Control (RBAC): We have implemented RBAC within our platform to control access to sensitive data and systems based on job function, leveraging AWS's Identity and Access Management (IAM) services.
  • Multi-Factor Authentication (MFA): MFA is enforced for all system administrators and is available to all users, adding an extra layer of security for user accounts.

Incident Response and Disaster Recovery

  • Incident Response Plan: We have a comprehensive incident response plan in place, which is reviewed and tested regularly.
  • Disaster Recovery Plan: Our disaster recovery plan, supported by the high availability and redundancy of AWS services, ensures business continuity in the event of a major incident.

Policies and Procedures

  • Security Policies: We maintain documented security policies covering a range of areas, including acceptable use, password management, and incident response.
  • Security Training: All employees undergo security awareness training upon hire and on a quarterly basis to keep them current with the latest security protocols and best practices. This is tracked and updated regularly using KnowBe4.

Compliance

  • CCPA compliance: Velosimo Connect complies with all relevant data protection and privacy laws, including CCPA.
  • Industry Standards: Our security practices align with recognized industry standards, including ISO 27001 and NIST 800-53, and we leverage AWS's infrastructure, which is certified against a range of global standards.