Trust Centre

Zainode recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the privacy of our stakeholders.

We understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Zainode so that our clients and users can feel confident in choosing us as a trusted provider.

This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.

Compliances

ISO 27001 Compliant

SOC 2 Compliant

GDPR Compliant

Controls

    • Production System User Review

    • Situational Awareness For Incidents

    • Vulnerability Remediation Process

    • Audit Logging

    • Data Security

    • Integrations

    • MFA Process

    • Product Architecture

    • Role-Based Access Control

    • SLA

    • Access Monitoring

    • Data Backups

    • Data Erasure

    • Encryption-at-rest

    • Encryption-in-transit

    • Geographic Location of Data

    • Physical Security

    • Firewall

    • Spoofing Protection

    • Virtual Private Cloud

    • Web Application Firewall

    • Wireless Security

    • Conspicuous Link to Privacy Notice

    • Secure system modification

    • Approval of Changes

    • Anti-Malware

    • Disk Encryption

    • Mobile Device Management

    • Asset Management Practices

    • Email Protection

    • Employee Training

    • Incident Response

    • Internal Assessments

    • Internal SSO

    • Penetration Testing

    • Azure

    • Anti-DDoS

    • BC/DR

    • Cloud Service Providers

    • Cloud Workload Protection

    • Data Center

    • Environment Segregation

    • Network Time Protocol

    • Separate Production Environment

    • Risk Framework

    • Risk Assessments

    • Supply Chain Risk Management

    • Third-Party Dependence

  • Upon request