Skip to main content
All CollectionsSecurity, Privacy & Compliance
General overview of technical security controls
General overview of technical security controls
Updated over a month ago

Logical Access Control

The logical access control procedures we have in place are designed to prevent or mitigate the threats of unauthorized application access and data loss in corporate and production
environments. Employees are granted minimum (or “least privilege”) access to specified SQAI Suite instances, applications, networks, and devices, as needed. User privileges are also segregated based on functional role and environment.


Data segregation

SQAI Suite leverages a multi-tenant architecture, logically separated at the database level, based on a user’s or organization’s account. Only authenticated parties are granted access to relevant accounts.


Data backup and availability

SQAI Suite's databases are backed up regularly and these backups are periodically tested.


Security testing

SQAI Suite undergoes an external penetration test by an independent third party on an annual cadence, at minimum.


Encryption

SQAI Suite maintains a cryptographic standard that meets industry standards. This standard is periodically reviewed, and selected technologies and ciphers may be updated following the assessed risk and market acceptance of new standards.


Monitoring and alerting

We take advantage of Amazon Web Services (AWS) APIs, tools, and security features to
monitor the integrity of our deployed cloud resources and log access to our cloud environments.
We strive to provide least-privilege access to our team and use Infrastructure-as-Code.


Physical security

SQAI Suite's applications and customer assets are housed in the AWS cloud. Staging or testing environments contain no actual customer data.

Our office location is part of an ISO certified incubator group called Gumption.

Corporate security

SQAI Suite's internal security security controls include, but are not limited to, the following tools and practices:

  • Enforcement of SSO and 2FA, where possible, to gate access to important services.

  • Regular reviews of access to important services, such as our source code repository.

  • Use of an MDM to manage our corporate laptops.

  • Patch management for laptops and core apps.

  • Information Security Policy to follow company wide.

Did this answer your question?