Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

1a. Customer Data

No

  1. Sensitive Data

No

  1. Security Policy

https://doc.rixter.se/display/RP/EULA+and+Privacy+Policy

  1. Release Management

Releases follow our Software Development Process described here:
https://doc.rixter.se/display/RP/Rixter+Software+Development+Process+%28SDLC%29+-+RSDLC

  1. Audits

No, external audits have been done. We do internal audits so far.

  1. Accreditation

No

  1. Penetration Testing

We have done security pen-tests on some products to find wholes.
This is not a regular task, more case by case or in a procurement process. The tests is the top 10 OWASP security vulnerabilities

  1. Notifying Atlassian

Notifications is done by any employee submitting a request Atlassian

  1. Employee Access

No

10. Confidentiality

Yes

11. Managing Security Vulnerabilities

https://doc.rixter.se/display/RP/Rixter+Software+Development+Process+%28SDLC%29+-+RSDLC

12. Disaster Recovery

Today we only have forge app and DC apps, both of them being managed by the customers ops teams or by Atlassian when it comes to forge.

13. Data Recovery

We donĀ“t have access to any customer environment to conduct such activity.

  • No labels