1. Home
  2. Data Security & Policies
  3. Information Security Policy

Information Security Policy

Safeguarding of the data

Our Atlassian Marketplace plugins are securely hosted in the cloud with Data Residency support activated based on your pinned Jira location. Vansah utilises DigitalOcean, MongoDB, and AWS data centers. We are the sole owner of the data, and have full control over the information hosted in these centers. DigitalOcean, one of the hosting providers, is certified in ISO/IIEC 27018, ISO27001, and SOC1/2/3. These certifications ensure strict policies related to the return, transfer, and deletion of personal information. Consequently, the adherence of DigitalOcean to these standards contributes to transparency and security, giving you peace of mind regarding the protection of your users’ data

Safeguarding of applications

To ensure the security of production applications, Testpoint utilises a Continuous Integration Server that compiles and distributes the software. The server performs thorough checks on the code, including vulnerability scanning, version verification, and rigorous testing before deploying it to the targeted environment. Only when all tests pass successfully, the build is accepted and published, ensuring the reliability and integrity of the software.

Threat of viruses

In Testpoint, every computer has Virus Scan and Anti Spyware Enterprise antivirus software installed, which constantly protects against any malware type.

Threat of intrusion

In order to prevent intrusion, Testpoint uses a High performance Network Security Monitoring (NSM) tool that can detect and block attacks against our network.

We have developed our own signatures to detect malicious or unknown traffic including Intrusion Detection (IDS) and Intrusion Prevention (IPS) modes. Testpoint also utilises Security Information and Event Management (SIEM) tools monitoring the data we collect.

Data Classification System

Testpoint classifies data based on the following sections:

  • Data Type: Data can be classified into different types, such as numerical, categorical, ordinal and textual.
  • Data Source: Data can be classified based on its source, such as primary data (collected first hand) or secondary data (derived from primary sources or existing databases).
  • Data Format: Data can be classified based on its format, such as structured data, unstructured data , or semi-structured data (partially organized, e.g., XML files).
  • Data Domain: Data can be classified based on the domain or subject area it belongs to, such as customer data or system.
  • Data Accessibility: Data can be classified based on its accessibility, such as public data (available to anyone), private data (restricted access), or confidential data (highly sensitive and protected).
  • Data Purpose: Data can be classified based on its purpose, such as transactional data (records of application transactions), analytical data (used for analysis and insights), or operational data (used for day-to-day functions/application operations).

Related Articles