Yes. Our servers are configured in accordance with all common security standards and are regularly patched and updated. Security standards are documented, reflecting security best practices and organizational requirements.
Yes, we employ servers which transmit, process and store Scoped Data and which meet all relevant security and compliance criteria according to current standards
Our server security configuration standards use established frameworks, are documented and based on vendor recommendations and common industry standards.
Yes. Server security configurations are regularly reviewed and updated when necessary to fully ensure compliance with all documented security standards.
Yes. The necessity of all services on our servers is evaluated regularly and all services deemed unnecessary are shut down.