Security & Compliance Policy
Last Updated: March 26, 2025
At Aetegis (https://www.Aetegis.com), security and compliance are foundational to our operations. As a leader in cybersecurity development, blockchain solutions, and data protection, we adhere to the highest standards to safeguard our clients, partners, and systems. This policy outlines our security practices, compliance frameworks, and risk management approach.
1. Security Principles
We operate under the following core security principles:
A. Confidentiality
- Data Encryption: AES-256 for data-at-rest, TLS 1.3+ for data-in-transit.
- Access Control: Role-based access (RBAC) and multi-factor authentication (MFA) for all internal systems.
B. Integrity
- Tamper-Proof Records: Blockchain-secured audit logs and cryptographic hashing (SHA-3).
- Code Integrity: All software undergoes code signing and verification.
C. Availability
- Uptime: 99.9% SLA for critical services.
- Resilience: DDoS protection, geo-redundant backups, and failover systems.
2. Compliance Frameworks
We align with globally recognized standards:
Framework | Scope | Status |
---|---|---|
ISO 27001 | Information Security Management | Certified |
SOC 2 Type II | Data Privacy & Operational Security | Certified |
GDPR | EU Data Protection | Fully Compliant |
CCPA | California Consumer Privacy | Fully Compliant |
NIST CSF | Cybersecurity Best Practices | Implemented |
HIPAA | Healthcare Data Protection | Compliant (If Applicable) |
3. Cybersecurity Practices
A. Secure Development (DevSecOps)
- Code Audits: Static (SAST) & dynamic (DAST) analysis for vulnerabilities.
- Blockchain Security: Smart contract audits (e.g., CertiK, ConsenSys Diligence).
- Penetration Testing: Quarterly third-party red-team exercises.
B. Infrastructure Security
- Cloud: AWS/GCP/Azure with zero-trust architecture.
- Endpoint Protection: CrowdStrike Falcon, SentinelOne.
- Network: Next-gen firewalls, IDS/IPS, and segregated VLANs.
C. Data Protection
- Encryption: AES-256 for stored data, TLS 1.3+ for transmissions.
- Pseudonymization: Applied for GDPR/CCPA compliance.
- Blockchain: Immutable audit trails for critical operations.
4. Incident Response
- 24/7 Monitoring: SIEM (Splunk) with automated alerts.
- Breach Protocol:
- Containment: Isolate affected systems within 1 hour.
- Investigation: Root-cause analysis completed within 72 hours.
- Notification: GDPR-compliant reporting to regulators within 72 hours.
- Recovery: Full system restoration within 7 days.
5. Third-Party Risk Management
- Vendor Requirements: ISO 27001 certification or equivalent.
- Assessments: Annual security reviews for cloud providers (AWS, Azure).
6. Employee Training
- Mandatory Programs:
- Quarterly phishing simulations (98% pass rate required).
- Secure coding training for developers.
- Background Checks: Conducted for all hires.
7. Compliance Documentation
- Available Upon Request:
- SOC 2 Type II Reports
- Data Processing Agreements (DPAs)
- ISO 27001 Certification
8. Contact
For security inquiries or to report vulnerabilities:
🔒 Email: info@aetegis.com
🔐 PGP Key: Download Here
Note: This policy is reviewed biannually (next review: September 26, 2025).