Security and compliance

<< Click to Display Table of Contents >>

Navigation:  Bizagi Cloud Platform > Security >

Security and compliance

Overview

As businesses are increasingly interested in shifting their operations toward the cloud, security and compliance requirements have become more demanding and critical.

This chapter describes how Bizagi Cloud Platform implements governance and security requirements so that data privacy, and overall system security are not a concern for customers wanting to use Bizagi Cloud Platform.

Furthermore, Bizagi Cloud Platform has been designed with security as its top priority.

 

Cloud_Security

Security, our first priority

Bizagi Cloud Platform has been designed with security as its top priority. By using technologies and controls that enable an isolated environment for each customer, Bizagi Cloud Platform delivers a virtual private cloud where customer data is not shared.

This private cloud has further security controls and mechanisms implemented, such as identity and access management; data encryption; and policies and procedures to make sure data privacy for customers, such as the deletion of data upon termination of the subscription, security controls to allow access to data only to authorized personnel, and physical and environmental measures to protect data.

 

What is virtual private cloud?

Bizagi Cloud Platform features a separate cloud environment for each Bizagi Cloud Platform subscription customer.

Each Bizagi Cloud Platform subscription customer uses a different set of assigned services and resources, where customer data is not shared.

Such set of assigned services and resources is located in the geographical location chosen by the customer.​

Having separate services and resources along with data isolation allows for more predictable performance behavior and a base for strict compliance in terms of data privacy.

 

Bizagi Cloud Platform Security controls

Bizagi Cloud Platform has security controls and features which assure the integrity, confidentiality, and availability of data, such as:

An isolated network architecture that limits and filters access.

Maintenance of a secure service and environment, including the application of patches, fixes, and updates across the underlying platform and diverse services that Bizagi Cloud Platform supports.

Data encryption.

Compliance with local regulations, EU model clauses, and security standards, by allowing customers to define the geographical zone where their data is stored.

Identity and access management, supporting best practices for secure environments and integration to your Identity provider systems.

Policies, standards, and procedures that enforce data privacy, such as the deletion of data upon contract termination and a comprehensive set of measures that prevent unauthorized access to data.

Physical and environmental technologies that protect data.

Constant monitoring of the service as a whole and staff who receive alerts about anomalies.

Please note that the above list is not exhaustive.

 

Security in maintenance

Bizagi maintains a secure service and environment which includes ensuring the timely application of patches, fixes and updates to services and underlying infrastructure so that Bizagi Cloud Platform as a whole remains secure from vulnerabilities.


Last Updated 8/16/2023 9:20:59 AM