Security Policy
Our comprehensive approach to securing your data and maintaining the highest standards of cybersecurity.
Last Updated: January 1, 2025
Data Encryption
All data is encrypted at rest using AES-256 and in transit using TLS 1.3.
Access Control
Role-based access control with multi-factor authentication for all systems.
Continuous Monitoring
24/7 security monitoring with automated threat detection and response.
Infrastructure Security
Hardened infrastructure with regular patching and vulnerability management.
1. Overview
At IT Origin, security is not just a feature—it's the foundation of everything we do. As a cybersecurity company, we hold ourselves to the highest standards of security practices and continuously work to protect our clients' data and systems.
This Security Policy outlines our commitment to maintaining a secure environment for our services, employees, and customers.
2. Information Security Management
We maintain a comprehensive Information Security Management System (ISMS) that includes:
- Documented security policies and procedures
- Regular risk assessments and security audits
- Continuous improvement based on lessons learned
- Management commitment and resource allocation
- Employee security awareness training
- Incident response and business continuity planning
3. Data Protection
Encryption
- Data at Rest: AES-256 encryption for all stored data
- Data in Transit: TLS 1.3 for all network communications
- Key Management: Hardware Security Modules (HSMs) for cryptographic key storage
Data Classification
We classify data based on sensitivity levels and apply appropriate security controls:
- Confidential: Customer data, security reports, credentials
- Internal: Business operations, employee information
- Public: Marketing materials, public documentation
4. Access Control
We implement strict access controls to protect systems and data:
- Least Privilege: Users receive minimum access necessary for their role
- Multi-Factor Authentication: Required for all system access
- Regular Access Reviews: Quarterly reviews of user access rights
- Password Policy: Strong passwords with regular rotation requirements
- Session Management: Automatic timeout and session controls
- Privileged Access Management: Enhanced controls for administrative access
5. Network Security
Our network infrastructure is protected by multiple layers of security:
- Next-generation firewalls with intrusion prevention
- Network segmentation and micro-segmentation
- DDoS protection and mitigation
- Web Application Firewall (WAF) for application protection
- VPN with strong encryption for remote access
- Network monitoring and anomaly detection
6. Application Security
We follow secure software development practices:
- Secure Software Development Lifecycle (SSDLC)
- Regular code reviews and static analysis
- Dynamic application security testing (DAST)
- Dependency vulnerability scanning
- Regular penetration testing by internal and external teams
- Security training for all developers
7. Endpoint Security
All endpoints are protected with comprehensive security measures:
- Endpoint Detection and Response (EDR) solutions
- Full-disk encryption on all devices
- Mobile Device Management (MDM) for mobile devices
- Automated patch management
- Host-based firewalls and intrusion detection
- USB and removable media controls
8. Physical Security
Our physical facilities are protected by:
- 24/7 security personnel and CCTV surveillance
- Biometric access controls for sensitive areas
- Visitor management and escort requirements
- Environmental controls (fire suppression, climate control)
- Clean desk policy
- Secure disposal of physical media
9. Incident Response
We maintain a comprehensive incident response program:
- Documented incident response procedures
- 24/7 Security Operations Center (SOC)
- Incident classification and prioritization
- Rapid containment and remediation capabilities
- Forensic investigation capabilities
- Post-incident analysis and lessons learned
- Regular incident response drills and tabletop exercises
10. Business Continuity
We ensure service continuity through:
- Documented Business Continuity Plan (BCP)
- Disaster Recovery Plan with defined RTOs and RPOs
- Regular backups with offsite storage
- Geographic redundancy for critical systems
- Annual business continuity testing
- Crisis communication procedures
11. Vendor Management
Third-party vendors are subject to:
- Security assessments before engagement
- Contractual security requirements
- Regular security reviews and audits
- Data processing agreements where applicable
- Vendor risk categorization and monitoring
12. Employee Security
Our employees are a critical part of our security program:
- Background checks for all employees
- Security awareness training at onboarding and annually
- Phishing simulation exercises
- Clear acceptable use policies
- Confidentiality agreements
- Secure offboarding procedures
13. Certifications & Compliance
We maintain the following certifications and compliance standards:
ISO 27001
Information Security Management System
SOC 2 Type II
Service Organization Control
GDPR Compliant
General Data Protection Regulation
HIPAA Compliant
Health Insurance Portability and Accountability Act
14. Vulnerability Disclosure
We maintain a responsible disclosure program for security researchers. If you discover a security vulnerability in our systems:
- Report vulnerabilities to security@itorigin.com
- Provide detailed information about the vulnerability
- Allow reasonable time for us to address the issue
- Do not access or modify data belonging to others
We commit to acknowledging reports within 48 hours and providing updates on remediation progress.
15. Contact Information
For security-related inquiries or to report a security concern:
IT Origin Security Team
Email: security@itorigin.com
PGP Key: Available upon request
Emergency: +91-7439490434

