Yes. Server security configurations are regularly reviewed and updated when necessary to fully ensure compliance with all internal policies and documented security standards.
Yes. Our server security configuration standards use established frameworks, are documented and based on vendor recommendations and common industry standards.
Our servers are configured in accordance with all common security standards and are regularly patched and updated. Security standards are documented.
Yes. The necessity of all services on our servers is evaluated regularly and all services deemed unnecessary are shut down.