Information Security is built into all our products and services from the ground up. Our CISO believes that security needs to be in the DNA of everything we do – thus ensuring our internal processes are managed effectively. This formula is applied to all our products and services that we supply to our clients.
Contact us for more detailsWithin Doordeck we have a set of robust policies and standards which ensures we align ourselves to the working practices of ISO27001. All staff are required to comply with the policies that are in place. All products and services that we use, develop, or deploy are put through a standard risk-based approach review.
Our platform and operational security that is held within AWS is certified under ISO/IEC 27001:2013, the international best practice standard for Information Security Management Controls which is independently audited.
Additionally, we also comply with best practices and regulations in relation to the management of personal data under the UK Data Protection Act 2018 (DPA) and the European Union General Data Protection Regulation (The GDPR).
Having our IT infrastructure with AWS provides security that is designed and managed in alignment with best security practices and a variety of IT security standards. The following is a partial list of assurance programs with which AWS complies:
Having our service operate on Amazon Web Services (AWS) ensures that we can work in a manner which is certified under a number of global compliance programmes which underlines best practices in terms of data centre security.
For the full list of AWS compliance programs
see: https://aws.amazon.com/compliance/pci-data-privacy-protection-hipaa-soc-fedramp-faqs/
More information about AWS data centre controls may be found here: https://aws.amazon.com/compliance/data-center/controls/
We have dedicated automated systems in place to protect against Distributed Denial of Service (DDoS) attacks as well as man-in-the-middle attacks. We use reputable registrars to protect against domain hijacking and “phishing” attacks.
All internet traffic is encrypted at a transport level and confidential information is encrypted at rest. We use best practices in terms of encryption key storage and security.
Our platform provides a role based, hierarchical security model with two-step authentication and multi-factor authentication for sensitive systems. All access is logged and audited for suspicious/anomalous behaviour.
We're developing new integrations with existing door access control systems faster than we can list them — so there's a good chance we've already integrated with your door system.
Get in touch to find out more.