Security and Privacy

Security by Default

Cydarm Case Management is a key cyber defense capability for our customers, so we take great care to ensure our platform is secure.

Our customers' requirement for a secure case management platform for their Security Operations Centre, regulatory requirements, and industry best practices are the key drivers for our security program.

Privacy by Design

Cydarm operates and builds software with a privacy first approach. We collect only the information we need to operate, and no more. We do not sell or distribute customer data.

Our hosted environment uses dedicated infrastructure and network segmentation to isolate the data of each customer.

Commitment to Trust

We are committed to ensuring the privacy and security of your data, and doing so transparently.

Cydarm Technologies meets the requirements of ISO27001:2022 and has achieved certification.

Our ISO27001:2022 certificate is linked here.

Platform Security

Key Management
Cydarm implements Vault storage to encrypt keys used to integrate with other technologies, so your secrets stay safe.
Encryption
Disk encryption is used to secure data on volumes storing customer data.
Security Headers
Cydarm implements Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) by default.
Transport Layer Security
Cydarm implements the latest versions of TLS, currently at least TLS 1.2 or higher, with insecure protocols and cipher suites disabled.
Single Sign-On
SSO with major identity providers is supported, including Microsoft Entra ID, Okta, Google, and AWS. No fees or SSO tax.
Attribute-based Access Control
More granular than role-based access control (RBAC), ABAC enables secure collaboration for privacy, insider threats, and sensitive cases.
Multi Factor Authentication
Multi-factor authentication is supported natively for organizations needing to deploy Cydarm in isolated networks and environments.

Organization security

Multi-factor Authentication
Multi-factor authentication is used by default on all systems organization-wide.
Single Sign On
SSO is used by default for improved identity and access management over the employee lifecycle.
Access Control
Access to all systems and data follows least privilege principles for all personnel to perform their roles.
Malware Protection
Malware protection is implemented across all systems, and supports behavioural detection, and automated remediation.
Vulnerability Management
Processes are in place to identify, triage, and manage vulnerabilities to reduce our threat exposure.
Security Testing
Code assisted penetration testing is conducted on our software and across our IT environment at least annually.
Secure Development
The security of our code and code dependencies is checked and remediated throughout the development lifecycle.
Segregation of Duties
Access to the production environment is limited to only those required to support and maintain the production environment.
Backups
Backups are taken daily, encrypted, and stored securely across availability zones in multiple cloud environments.
Business Continuity
Business continuity plans are documented, implemented, and tested to verify we can recover from outages and disasters.
Security Operations
24x7 monitoring, detection, and response capability is established to manage the detection, containment, and remediation of incidents.
Incident response
Procedures and playbooks are established for managing, tracking, and reporting on incidents throughout the incident lifecycle.

Want to know more?

Get in touch for a meeting, demo, or for security assurance information.