Security Policy

Security Policy

Our commitment to protecting your data and our systems

Last updated: December 2024

Security Framework

As a cybersecurity company specializing in maritime infrastructure protection, we maintain the highest security standards for our own operations and data handling.

Security Standards

  • • ISO 27001 aligned practices
  • • SOC 2 Type II compliance
  • • NIST Cybersecurity Framework
  • • Maritime security regulations

Certifications

  • • Security audits and assessments
  • • Penetration testing
  • • Vulnerability management
  • • Compliance monitoring

Data Protection Measures

Encryption

  • Data in Transit: TLS 1.3 encryption for all communications
  • Data at Rest: AES-256 encryption for stored data
  • Database: Encrypted database connections and storage
  • Backups: Encrypted backup systems with secure key management

Access Controls

  • Multi-Factor Authentication: Required for all administrative access
  • Role-Based Access: Principle of least privilege
  • Regular Reviews: Quarterly access audits and updates
  • Session Management: Automatic timeout and secure sessions

Infrastructure Security

  • Cloud Security: Enterprise-grade cloud infrastructure
  • Network Segmentation: Isolated environments and VPCs
  • Monitoring: 24/7 security monitoring and alerting
  • Updates: Regular security patches and updates

Monitoring and Detection

Continuous Monitoring

  • • Real-time security event monitoring
  • • Automated threat detection systems
  • • Log analysis and correlation
  • • Performance and availability monitoring

Incident Response

  • • 24/7 security operations center
  • • Defined incident response procedures
  • • Rapid containment and remediation
  • • Post-incident analysis and improvement

Vulnerability Management

We maintain a comprehensive vulnerability management program to identify, assess, and remediate security vulnerabilities.

Identification

  • • Automated vulnerability scanning
  • • Manual security assessments
  • • Third-party security audits
  • • Bug bounty programs

Assessment

  • • Risk-based prioritization
  • • Impact and exploitability analysis
  • • Business context evaluation
  • • Compliance requirements review

Remediation

  • • Timely patch deployment
  • • Configuration updates
  • • Compensating controls
  • • Verification testing

Third-Party Security

Vendor Assessment

All third-party service providers undergo security assessments before integration:

  • • Security questionnaires and audits
  • • Compliance certification verification
  • • Data processing agreement requirements
  • • Ongoing monitoring and reviews

Current Partners

Supabase

Database and authentication - SOC 2 Type II certified

JM Baxi Group

Strategic partner - Maritime industry expertise

Employee Security

Our team members are our first line of defense. We invest heavily in security awareness and training.

Training & Awareness

  • • Regular security training sessions
  • • Phishing simulation exercises
  • • Security policy updates
  • • Incident response drills

Access Management

  • • Background verification
  • • Secure device management
  • • VPN and secure remote access
  • • Regular access reviews

Reporting Security Issues

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.

How to Report

security@cyber-periscope.com

Please include detailed information about the vulnerability and steps to reproduce it.

Our Commitment

  • • Acknowledge receipt within 24 hours
  • • Provide regular updates on investigation progress
  • • Credit security researchers (with permission)
  • • Fix verified vulnerabilities promptly

Contact Information

For security-related questions or concerns, contact our security team:

Security Team: security@cyber-periscope.com
General Inquiries: info@cyber-periscope.com
Address: Blue 1 Square, Udyog Vihar Phase 4 Rd, Phase IV, Udyog Vihar, Sector 18, Gurugram, Haryana 122016

Cookie Preferences

We value your privacy and data protection

We use cookies and similar technologies to enhance your experience on our website, analyze usage patterns, and provide personalized content. By continuing to use our site, you consent to our use of cookies as described in our Privacy Policy and Cookie Policy.