Work confidently using reliable and secure enterprise technology.
The Checkbox platform is highly secure with layers of technical and operational controls in place to protect information. Checkbox maintains an Information Security Management System as part of its governance framework which includes policies and procedures around network security, information handling and data security, access control, incident response, backups, change management, risk management, vulnerability and patch management, and vendor risk management.
Checkbox has been architected for security. Some of our controls include:
Encryption of data at rest and in transit
Automated security patching
Network-based Intrusion Detection Systems (NIDS)
Regular automated vulnerability scanning
Regular web application penetration testing
Hardened Standard Operating Environment images
Firewall policies at the host and service level (micro network segmentation)
Monitoring and logging of all administrative access and network traffic flows