SOLVED security, risk, and compliance processes were developed based on industry best practices and are reviewed and updated on an annual basis or upon any significant change.
- Security Policies and Training – All employees go through required training upon hire and must recertify on an annual basis. Policies include:
- Access Control
- Business Continuity
- Disaster Recovery
- Cryptographic Controls
- Data Management
- Human Resources Security
- Information Security
- Operations Security
- Physical Security
- Risk Management
- Third Party Risk Management
- Platform Security – On-going security activities, including:
- Network intrusion detection
- Code vulnerability scanning
- System, network, application log analysis, reporting, and retention
- Incident Response Planning & Team in place to handle any significant security event to triage and respond to establish system resiliency, minimize impact, and protect customer data.
- Regular Third-Party Security Review that identifies and evaluates security risks of vendors and third parties.