Confidentiality
Formatting and data accumulation
We format our computers often, and we do not accumulate the information in local storage. With this process we ensure that data is permanently removed from our devices. Requirements 360. Remove unnecessary sensitive information
We only hire directly
All our talent have indefinite-term contracts directly with our company. Due to our business nature, we never hire through contractors, freelancers, or any other third party.
Personnel NDA
Everyone within our company knows how important it is to keep our clients' information secure. We enforce this by requiring all our new talent to sign a non-disclosure agreement (NDA). The NDA document can be found here.
Encryption in transit
All our applications and services have industry-standard encryption in transit. The Fluid Attacks domain uses the latest TLSv1.3 cryptographic protocol for maximum protection of data in transit. Image Source: SSLlabs. (2023). SSL Configuration ...
Encryption at rest
All our applications and services have industry-standard encryption at rest. All the sensitive data provided by our clients (repository access keys, VPN credentials, etc.) is encrypted using the symmetric algorithm of our key management system (KMS). ...