Do you have any questions about Andy’s security measures and protocols? Read on! This article has all the answers.
1. What is Andy's security policy?
Our security policy is based on secure design principles, implementing protective measures at all stages of software development and operation. This includes the use of encryption, access controls, and regular audits.
2. How is backup managed in Andy?
We perform daily backups of all our databases, which are stored in secure and offsite locations. Additionally, we use continuous backups to allow point-in-time recovery. Daily backups are retained for a period of 30 days.
3. What network security measures does Andy use?
We use AWS Virtual Private Cloud (VPC) to create isolated network environments, VPN authentication for changes to databases and applications, and access control lists (ACLs) to manage network traffic.
4. What is multi-factor authentication (MFA) and how is it implemented in Andy?
MFA is an authentication method that requires two or more forms of verification. In Andy, we use MFA to access critical resources, utilising physical devices and virtual MFA applications.
5. What encryption protocols are used in Andy?
Andy employs TLS (Transport Layer Security) to encrypt data in transit and AES (Advanced Encryption Standard) with 256-bit keys to encrypt data at rest.
6. How often are penetration tests conducted in Andy?
We conduct penetration tests regularly, at least annually, to identify and address vulnerabilities in our systems. These tests simulate real-world attacks to evaluate our security posture.
7. What measures are taken for secure development in Andy?
Our development process follows secure coding practices and regular security reviews. We integrate security at every stage of the software development lifecycle (SDLC), from design to deployment.
8. How does Andy respond to a security incident?
We have a structured incident response plan that includes the identification, containment, eradication, and recovery of incidents. Additionally, we maintain communication protocols to inform all relevant stakeholders.
9. How does Andy ensure GDPR compliance?
We comply with the General Data Protection Regulation (GDPR) by ensuring that personal data is processed lawfully, transparently, and for specific purposes. We also obtain user consent before data collection and promptly notify any data breaches.
10. How does Andy handle threat monitoring and detection?
We use advanced tools like AWS CloudWatch and AWS Security Hub for early detection of threats and malicious activities. These systems monitor and log all activities and changes in our AWS environment.
Any other questions? Doubts? Suggestions? Don’t hesitate to write our Customer Experience Team at
help@andyapp.io.