security Security Policy
Our commitment to safeguarding your data and ensuring platform resilience
DENDAT.SECURE maintains a security program designed to protect the confidentiality, integrity, and availability of customer data. This policy summarizes key controls and practices implemented across our organization and platform.
shield Security Program
- Executive sponsorship and dedicated security leadership.
- Documented policies, standards, and procedures with periodic review.
- Security awareness and role-based training for all personnel.
lock Data Protection
- Encryption in transit (TLS) and at rest by default.
- Key management with rotation and restricted access.
- Data classification, minimization, and retention controls.
admin_panel_settings Access Control
- Least-privilege RBAC and segregation of duties.
- MFA enforcement and secure session management.
- Periodic access reviews and revocation workflows.
code Application Security
- Secure SDLC with peer review and dependency scanning.
- Static and dynamic analysis, threat modeling for critical changes.
- Secrets management with restricted build/deploy pipelines.
dns Infrastructure Security
- Network segmentation, private networking, and least-privileged service accounts.
- Hardening baselines, CIS benchmarks, and automated configuration compliance.
- Logging, monitoring, and anomaly detection across systems.
bug_report Vulnerability Management
- Regular scanning of applications and infrastructure.
- Risk-based prioritization with defined SLAs for remediation.
- Penetration testing and independent assessments.
emergency Incident Response
- Documented incident response plan with tabletop exercises.
- 24x7 monitoring and defined escalation paths.
- Post-incident reviews and corrective action tracking.
sync_lock Business Continuity & DR
- Backups with integrity checks and periodic restore testing.
- Multi-zone/region availability options and failover procedures.
- Continuity planning for critical business functions.
campaign Responsible Disclosure
- We welcome vulnerability reports from the security community.
- Non-destructive testing only; avoid access to other customers' data.
- Report issues via our security contact for coordinated remediation.