Security notice
ReliaSoft Cloud is a suite of cloud-based reliability applications. This FAQ addresses questions around security.
ReliaSoft Cloud's security approach aims to align to our customers’ Corporate IT security policies and strategies. ReliaSoft Cloud leverages our cloud provider Azure Web Services benchmark security practices for cloud applications.
How data is collected
Data is provided directly by users of ReliaSoft Cloud via web browser based applications.
How data is transmitted to and from the cloud
In all cases, data is transmitted to and from ReliaSoft Cloud using TLS encryption.
How data is protected by unauthorized access
All access to ReliaSoft Cloud requires authentication. Authentication can be provided by ReliaSoft Cloud, or delegated to a customer's single-sign-on. Each customer is responsible for creating accounts for their users and assigning those users limited authorization within the ReliaSoft Cloud services. Every customer has fully segregated user data and authentication.
How data is kept secure in the cloud
ReliaSoft Cloud is hosted in data centers located in the United States operated by Azure Web Services. The IT infrastructure provided by Azure is designed and managed in alignment with security best practices and a variety of IT security standards.
Key aspects of ReliaSoft Cloud's security include:
Compliance |
HBK are in the process of aligning to ISO27001 and working towards compliance GDPR Compliance |
Access |
Only authorized users can access application data via a web browser ReliaSoft Cloud infrastructure fully fire-walled from the public Internet |
Data Partitioning |
ReliaSoft Cloud employs physical segregation of customer data, providing high-level confidentiality across tenants |
Encryption |
Encryption is employed for all data in-transit Encryption is employed for all data at-rest |
Backup |
Periodic rolling backups are performed for all persisted data Data can be recovered with minimal data loss |
High Availability |
Services are managed by cluster orchestration ensuring high availability Cluster orchestration redundantly deployed across multiple instances for zero downtime failover |
Summary
ReliaSoft Cloud is compliant with security best practices and we ensure that security is built into our products and deployment infrastructure. This includes:
-
Taking a "security by design" and "privacy by design" approach to the development process, operations, and compliance
-
Identifying and implementing technologies to secure and protect customer information to meet GDPR
-
Monitoring cloud products for possible security incidents and responding to incidents as needed