Trust Centre
Zainode recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the privacy of our stakeholders.
We understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Zainode so that our clients and users can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Compliances
ISO 27001 Compliant
SOC 2 Compliant
GDPR Compliant
Controls
-
Production System User Review
Situational Awareness For Incidents
Vulnerability Remediation Process
Audit Logging
Data Security
Integrations
MFA Process
Product Architecture
Role-Based Access Control
SLA
-
Access Monitoring
Data Backups
Data Erasure
Encryption-at-rest
Encryption-in-transit
Geographic Location of Data
Physical Security
-
Firewall
Spoofing Protection
Virtual Private Cloud
Web Application Firewall
Wireless Security
-
Conspicuous Link to Privacy Notice
Secure system modification
Approval of Changes
-
Anti-Malware
Disk Encryption
Mobile Device Management
-
Asset Management Practices
Email Protection
Employee Training
Incident Response
Internal Assessments
Internal SSO
Penetration Testing
-
Azure
Anti-DDoS
BC/DR
Cloud Service Providers
Cloud Workload Protection
Data Center
Environment Segregation
Network Time Protocol
Separate Production Environment
-
Risk Framework
Risk Assessments
Supply Chain Risk Management
Third-Party Dependence
-
Upon request