Security and compliance

<< Click to Display Table of Contents >>

Navigation:  Automation Service Overview >

Security and compliance

Overview

As businesses are increasingly interested in shifting their operations toward the cloud, security and compliance requirements have become more demanding and critical.

This chapter describes how Automation Service and Bizag implements governance and security requirements so that data privacy, and overall system security are not a concern for customers wanting to use Automation Service services.

Furthermore, Automation Service has been designed with security as its top priority.

Security is one of the three main pillars offered by Automation Service, as described in the Automation Service overview. By using technologies that enable an isolated environment for each customer, Automation Service delivers a virtual, private cloud where customer data is not shared.  

 

Cloud_Security

 

Security, our first priority

Automation Service has been designed with security as its top priority. By using technologies and controls that enable an isolated environment for each customer, Automation Service delivers a virtual private cloud where customer data is not shared.

This private cloud has further security controls and mechanisms implemented, such as identity and access management; data encryption; and policies and procedures to make sure data privacy for customers, such as the deletion of data upon termination of the subscription, security controls to allow access to data only to authorized personnel, and physical and environmental measures to protect data.

 

What is virtual private cloud?

Automation Service features a separate cloud platform for each customer, where all the environments (e.g, testing and production) for that platform are isolated.

Each Automation Service customer uses a different set of assigned services and resources, where customer data is not shared.

Such set of assigned services and resources is located in the geographical location chosen by the customer.​

Having separate services and resources along with data isolation allows for more predictable performance behavior and a base for strict compliance in terms of data privacy.

 

Automation Service Security controls

Automation Service has security controls and features which assure the integrity, confidentiality, and availability of data, such as:

An isolated network architecture that limits and filters access.

Maintenance of a secure service and environment, including the application of patches, fixes, and updates across the underlying platform and diverse services that Automation Service supports.

Data encryption.

Compliance with local regulations, EU model clauses, and security standards, by allowing customers to define the geographical zone where their data is stored.

Identity and access management, supporting best practices for secure environments and integration to your Identity provider systems.

Policies, standards, and procedures that enforce data privacy, such as the deletion of data upon contract termination and a comprehensive set of measures that prevent unauthorized access to data.

Physical and environmental technologies that protect data.

Constant monitoring of the service as a whole and staff who receive alerts about anomalies.

Please note that the above list is not exhaustive.

 

Security in maintenance

Bizagi maintains a secure service and environment which includes ensuring the timely application of patches, fixes and updates to services and underlying infrastructure so that Automation Service as a whole remains secure from vulnerabilities.