Governance
Our policies are based on the following four foundational principles:- Least Privilege. Access should be limited to only those with legitimate business needs, based on the principle of least privilege.
- Consistency. Security controls should be applied consistently across all areas of the enterprise.
- Defense in Depth. Security controls should be implemented and layered according to the principle of defense-in-depth.
- Continuous Improvement. The implementation of controls should be iterative, continuously improving effectiveness and decreasing friction.
Data protection
Data at rest
All datastores are encrypted at rest. Sensitive collections and tables also use row-level encryption.
Data in transit
Stenoa uses TLS 1.3 or higher everywhere data is transmitted over potentially insecure networks.
Data backup
Stenoa backs-up all production data using a point-in-time approach. Backups are persisted for 7 years, and are replicated for resiliency against regional disasters.
Product security
Penetration testing
Stenoa engages with third-party firms to conduct penetration testing annually. All areas of the Stenoa product and cloud infrastructure are in-scope for these assessments, and source code is fully available to the testers in order to maximize the effectiveness and coverage.Enterprise security
Endpoint protection
All company devices are equipped with anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage.We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.
Security education
Stenoa provides comprehensive security training to all employees upon onboarding. We also conduct threat briefings with employees to inform them of important security and safety-related updates that require special attention or action.
Identity and access management
Stenoa employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.Multi-factor authentication is required for all employees to access company applications.