Enterprise Security

Security Policy

Our comprehensive approach to securing your data and maintaining the highest standards of cybersecurity.

Last Updated: January 1, 2025

Data Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3.

Access Control

Role-based access control with multi-factor authentication for all systems.

Continuous Monitoring

24/7 security monitoring with automated threat detection and response.

Infrastructure Security

Hardened infrastructure with regular patching and vulnerability management.

1. Overview

At IT Origin, security is not just a feature—it's the foundation of everything we do. As a cybersecurity company, we hold ourselves to the highest standards of security practices and continuously work to protect our clients' data and systems.

This Security Policy outlines our commitment to maintaining a secure environment for our services, employees, and customers.

2. Information Security Management

We maintain a comprehensive Information Security Management System (ISMS) that includes:

  • Documented security policies and procedures
  • Regular risk assessments and security audits
  • Continuous improvement based on lessons learned
  • Management commitment and resource allocation
  • Employee security awareness training
  • Incident response and business continuity planning

3. Data Protection

Encryption

  • Data at Rest: AES-256 encryption for all stored data
  • Data in Transit: TLS 1.3 for all network communications
  • Key Management: Hardware Security Modules (HSMs) for cryptographic key storage

Data Classification

We classify data based on sensitivity levels and apply appropriate security controls:

  • Confidential: Customer data, security reports, credentials
  • Internal: Business operations, employee information
  • Public: Marketing materials, public documentation

4. Access Control

We implement strict access controls to protect systems and data:

  • Least Privilege: Users receive minimum access necessary for their role
  • Multi-Factor Authentication: Required for all system access
  • Regular Access Reviews: Quarterly reviews of user access rights
  • Password Policy: Strong passwords with regular rotation requirements
  • Session Management: Automatic timeout and session controls
  • Privileged Access Management: Enhanced controls for administrative access

5. Network Security

Our network infrastructure is protected by multiple layers of security:

  • Next-generation firewalls with intrusion prevention
  • Network segmentation and micro-segmentation
  • DDoS protection and mitigation
  • Web Application Firewall (WAF) for application protection
  • VPN with strong encryption for remote access
  • Network monitoring and anomaly detection

6. Application Security

We follow secure software development practices:

  • Secure Software Development Lifecycle (SSDLC)
  • Regular code reviews and static analysis
  • Dynamic application security testing (DAST)
  • Dependency vulnerability scanning
  • Regular penetration testing by internal and external teams
  • Security training for all developers

7. Endpoint Security

All endpoints are protected with comprehensive security measures:

  • Endpoint Detection and Response (EDR) solutions
  • Full-disk encryption on all devices
  • Mobile Device Management (MDM) for mobile devices
  • Automated patch management
  • Host-based firewalls and intrusion detection
  • USB and removable media controls

8. Physical Security

Our physical facilities are protected by:

  • 24/7 security personnel and CCTV surveillance
  • Biometric access controls for sensitive areas
  • Visitor management and escort requirements
  • Environmental controls (fire suppression, climate control)
  • Clean desk policy
  • Secure disposal of physical media

9. Incident Response

We maintain a comprehensive incident response program:

  • Documented incident response procedures
  • 24/7 Security Operations Center (SOC)
  • Incident classification and prioritization
  • Rapid containment and remediation capabilities
  • Forensic investigation capabilities
  • Post-incident analysis and lessons learned
  • Regular incident response drills and tabletop exercises

10. Business Continuity

We ensure service continuity through:

  • Documented Business Continuity Plan (BCP)
  • Disaster Recovery Plan with defined RTOs and RPOs
  • Regular backups with offsite storage
  • Geographic redundancy for critical systems
  • Annual business continuity testing
  • Crisis communication procedures

11. Vendor Management

Third-party vendors are subject to:

  • Security assessments before engagement
  • Contractual security requirements
  • Regular security reviews and audits
  • Data processing agreements where applicable
  • Vendor risk categorization and monitoring

12. Employee Security

Our employees are a critical part of our security program:

  • Background checks for all employees
  • Security awareness training at onboarding and annually
  • Phishing simulation exercises
  • Clear acceptable use policies
  • Confidentiality agreements
  • Secure offboarding procedures

13. Certifications & Compliance

We maintain the following certifications and compliance standards:

ISO 27001

Information Security Management System

SOC 2 Type II

Service Organization Control

GDPR Compliant

General Data Protection Regulation

HIPAA Compliant

Health Insurance Portability and Accountability Act

14. Vulnerability Disclosure

We maintain a responsible disclosure program for security researchers. If you discover a security vulnerability in our systems:

  • Report vulnerabilities to security@itorigin.com
  • Provide detailed information about the vulnerability
  • Allow reasonable time for us to address the issue
  • Do not access or modify data belonging to others

We commit to acknowledging reports within 48 hours and providing updates on remediation progress.

15. Contact Information

For security-related inquiries or to report a security concern:

IT Origin Security Team

Email: security@itorigin.com

PGP Key: Available upon request

Emergency: +91-7439490434