As part of our security program, Sophus has implemented a range of controls to maintain compliance.

Product Security (7)

Production System User Review

Sophus’ Information Security Committee conducts an annual evaluation and authorization of personnel with access to the production console to ensure security and compliance.

Awareness for Incidents

Sophus maintains a comprehensive log of information security incidents, documenting investigation details and
response actions in accordance with established incident management policies and procedures.

Vulnerability Remediation Process

Sophus proactively identifies and addresses platform vulnerabilities through regular and systematic vulnerability scans.

Centralized Management of Flaw Remediation

Sophus monitors and mitigates all identified vulnerabilities, adhering to defined policies and procedures for vulnerability management.

Audit Logging

All user activities and system events are systematically logged and made available for monitoring, review, and audit purposes.

Data Security

  • All stored data (including databases and attachments) is encrypted using AES-256-bit encryption, with
    encryption keys managed through AWS services and rotated annually.
  • All data transmitted over networks is encrypted using HTTPS with TLS 1.2 or later.

Single Sign-On

Sophus has implemented SSO to facilitate secure and streamlined application access.

Data Security (16)

Identity Validation

Sophus enforces logical access provisioning for critical systems, requiring explicit approval from authorized personnel based on role-based or need-based criteria.

Termination of Employment

Sophus ensures the immediate revocation of logical access for employees upon termination.

Production Database Access Restriction

Sophus limits production database access strictly to personnel whose roles necessitate such privileges.

Multi-Factor Authentication

Sophus mandates multi-factor authentication for all personnel accessing critical systems to enhance security.

User Privileges Reviews

Senior Management or the Information Security Committee periodically reviews and ensures that access to critical systems is restricted to necessary personnel only.

User Access Reviews

Senior Management or the Information Security Committee conducts periodic reviews to ensure administrative accessvis appropriately restricted.

Encryption of Data at Rest

Sophus implements robust cryptographic mechanisms to encrypt all production databases storing customer data.

Infrastructure Asset Inventory

Sophus maintains a documented and updated inventory of organizational infrastructure assets to ensure accountability and security.

Data Backups

Sophus performs regular backups of user and system data to meet recovery objectives and verifies backup integrity.

Reliability and Integrity Testing

Sophus routinely tests backup data to validate media reliability and data integrity.

User Consent and Compliance

Sophus ensures compliance with regulatory requirements by obtaining user consent before processing personal data.

Data Subject Access Requests

Sophus processes Subject Access Requests in accordance with its Privacy Policy and applicable regulations.

Backup Implementation

Daily backups of primary data are conducted, stored in a separate location, and can be restored in alignment with recovery objectives.

Data Encryption at Rest

All stored data is encrypted using AES-256-bit encryption, with encryption keys managed through AWS services and rotated annually.

Data Encryption in Transit

All transmitted data is encrypted using HTTPS with TLS 1.2 or later.

Physical Security Measures

All customer data is securely processed within AWS infrastructure, adhering to industry-standard physical security controls.

Network Security (9)

Impact Analysis

Sophus evaluates system-generated information to assess its impact on internal controls and security posture.

Network Connection Restrictions

Sophus enforces strict controls to limit public internet exposure for production database and Secure Shell (SSH) access.

External System Connections

All production systems are protected by firewalls with deny-by-default rules, enforced through Sophus’ cloud provider.

Confidentiality in Data Transmission

Sophus employs strong encryption protocols, including HTTPS with TLS, to ensure the confidentiality of transmitted data.

Anomalous Behavior Detection

Sophus configures its infrastructure to analyze audit logs for identifying suspicious activities and potential threats.

Capacity & Performance Monitoring

Sophus continuously monitors critical assets to optimize performance, plan for future capacity, and mitigate denial-of-service risks.

Protection of Data in Non-Production Environments

Sophus ensures that customer data used in testing environments receives the same level of security as production data.

Centralized Security Event Logging

Sophus configures infrastructure to generate and store audit logs for all critical security-related activities.

Virtual Private Cloud Implementation

Sophus utilizes AWS as its exclusive hosting provider, ensuring all data remains within a secure Virtual Private Cloud (VPC).

Application Security (7)

Privacy Notice Accessibility

Sophus ensures that the most current privacy-related information is readily accessible to customers on its website.

Secure System Modifications

Sophus adheres to structured protocols for securely modifying its operational environment.

Change Approval Procedures

Sophus has established formalized procedures to ensure all system modifications are thoroughly reviewed and approved before implementation.

Unauthorized Activity Monitoring

Sophus utilizes Sprinto for continuous security monitoring, providing alerts on unauthorized access level changes for team members.

Code Analysis & Vulnerability Detection

Sophus employs GitHub Dependabot for automated static code analysis to identify vulnerabilities and dependency risks.

Secure Software Development Life Cycle

Sophus follows a secure SDLC framework, ensuring that new feature releases adhere to best security practices without compromising existing applications.

Patch & Vulnerability Management

Sophus remediates identified vulnerabilities within defined timeframes based on severity levels, ensuring timely patching and software updates after rigorous testing.

Corporate Security (8)

Code of Business Conduct

Sophus maintains a well-documented policy outlining behavioral standards and ethical business practices.

Organizational Structure & Governance

Sophus implements a structured framework to define authorities, facilitate information flow, and assign responsibilities.

Clear Roles & Responsibilities

Sophus establishes transparent communication procedures to ensure staff understand their security-related responsibilities.

Competency-Based Hiring

Sophus ensures that security-sensitive positions are staffed with appropriately qualified professionals.

Personnel Security Screening

Sophus conducts security screenings prior to granting personnel access to critical systems.

Security & Privacy Training

Sophus provides role-specific security and privacy awareness training to all staff.

Performance Evaluations

Sophus assesses employees in IT, engineering, and security roles based on their responsibilities and contributions.

Incident Response Training

Sophus ensures all employees are educated on incident response protocols, covering triage, containment, eradication, and recovery procedures.