Skip to content

Security and Privacy

Security practices that protect your data and applications

Security is not just technology, but primarily processes and organizational culture. We present our approach to backups, access control, change audits, and penetration testing.

Backups and Disaster Recovery

Automated backups and data recovery procedures in case of failure

Automated backups

Daily database and file backups performed automatically during night hours with integrity verification.

Geographic redundancy

Backups stored in geographically distributed locations (multi-region) for maximum protection.

Retention policy

Backup retention for 30 days with the possibility of extending the retention period at client request.

Recovery testing

Regular disaster recovery procedure testing (at least quarterly) with documented results.

RTO and RPO

Recovery Time Objective (RTO): up to 4 hours. Recovery Point Objective (RPO): maximum 24 hours.

Backup access

Possibility to provide backup on client request within 48 hours in agreed format.

Access Control and SSO

Advanced authentication and authorization mechanisms

Single Sign-On (SSO)

Integration with SSO providers (Azure AD, Google Workspace, Okta) for convenient and secure login.

Multi-Factor Authentication (MFA)

Mandatory multi-factor authentication (2FA/MFA) for all team members and administrators.

Role-Based Access Control (RBAC)

Role-based access control - each user has only necessary permissions (principle of least privilege).

Login audit

All login attempts and permission changes are logged and regularly reviewed.

Session management

Automatic logout after inactivity period, secure session storage, token rotation.

IP whitelisting

Ability to restrict admin panel access to specific IP addresses.

Change Audit and Version Control

Complete history of code and configuration changes

Git version control

All code changes are versioned in Git with mandatory commit messages following Conventional Commits.

Mandatory code review

Every change goes through code review - minimum one person must approve before merging to main branch.

Audit trail

Complete history of code, configuration, and infrastructure changes with ability to track who, when, and what changed.

Change documentation

Changelog and release notes for each deployment - transparent communication of all changes.

Rollback capability

Ability to quickly rollback changes if issues are detected after deployment.

Change approval process

Production change approval process with appropriate procedures and checklists.

Penetration Testing and Security Audits

Regular security testing and vulnerability analysis

Penetration testing on demand

Possibility to order professional penetration testing by certified external companies (OSCP, CEH).

Automated vulnerability scanning

Regular application scanning for known vulnerabilities (OWASP Top 10, CVE) using SAST and DAST.

Dependency scanning

Automated checking of dependencies (npm, NuGet) for known security vulnerabilities.

Code security audit

Regular code analysis for security best practices (secure coding, OWASP).

Infrastructure security

Audit of infrastructure configuration (firewall rules, network segmentation, encryption).

Reporting and remediation

Detailed reports of identified security issues with remediation plan and priorities.

Client Data Protection

How we protect client privacy and data

Encryption at rest

All data in database and files is encrypted at rest (AES-256) - including backups.

Encryption in transit

Communication always through HTTPS/TLS 1.3 - no unsecured connections.

GDPR compliance

Full compliance with personal data protection regulations - right to deletion, export, and data modification.

Data segregation

In multi-tenant applications, data is logically and physically separated between clients.

Data retention policy

Clear data retention policy - automatic deletion after specified time period.

Data breach response

Procedures for responding to security incidents and data breaches in compliance with GDPR.

Related Policies and Terms

Detailed documents regarding privacy and terms of service

Privacy Policy

Detailed information about personal data processing, cookies, and user rights.

Read more →

Cookie Policy

Information about cookies used and ability to manage them.

Read more →

Terms of Service

Cooperation conditions, liability, and dispute resolution procedures.

Read more →

Frequently Asked Questions

Questions about security?

We'll be happy to discuss details of our security practices and adapt them to your project

Security and Privacy - Security Practices | MDS Software Solutions Group | MDS Software Solutions Group