Security Policy at Nano Net Technologies Inc. Effective day 10th June 2021
Our infrastructure and security team includes people who’ve played lead roles in designing, building, and operating highly secure Internet facing systems at companies ranging from startups to large public companies.
Incident Response Plan
We have implemented a formal procedure for security events and have educated all our staff on our policies.
When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
After a security event is fixed we write up a post-mortem analysis.
The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
Nanonets will promptly notify you in writing upon verification of a security breach of the Nanonets services that affects your data. Notification will describe the breach and the status of Nanonets’s investigation.
All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
Nanonets uses a backup solution for datastores that contain customer data.
All customer data is stored in the USA.
Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
Each Nanonets system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
Nanonets engages certain subprocessors to process customer data. These subprocessors are listed here: List of Subprocessors, as may be updated by Nanonets from time to time.
All data sent to or from Nanonets is encrypted in transit using 256-bit encryption.
Our API and application endpoints are TLS/SSL only and score an "A+" rating on SSL Labs' tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled.
We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
Nanonets is served 100% over https.
There are no corporate resources or additional privileges from being on Nanonets’s network.
We have two-factor authentication (2FA) and strong password policies on Google, AWS to ensure access to cloud services are protected.
Permissions and Admin Controls
Nanonets enables permission levels to be set for any employees with access to Nanonets.
Permissions and access can be set to include app settings, billing, user data, or the ability to send/edit manual messages and auto messages.
On an application level, we produce audit logs for all activity, ship logs to our service providers for analysis, and use S3/Glacier for archival purposes.
All access to Nanonets applications is logged and audited.
Bastion hosts are used to login to devices.
All actions taken on production consoles or in the Nanonets application are logged.
Security Audits and Certifications
We bi-annually engage with well-regarded third-party auditors to audit our code-base, and work with them to resolve potential issues.
We use technologies to provide an audit trail over our infrastructure and the Nanonets application. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
We are SOC 2 compliant and have an attested SOC 2 Type I report. To receive a copy of the report please sign our NDA and contact [email protected].
We are in the process of obtaining an SOC 2 Type II report.