Security Information
Kili Technology’s security practices are multidimensional and reflect the different ways in which Kili Technology interacts with its customers
Corporate governance
Human Resources: personnel are made aware of security
Information and asset classification: information and assets are classified according degree of confidentiality
Incident Management: Kili Technology respond to events that create suspicions of unauthorized data access or processing
Risk management resiliency program: Kili Technology has a business continuity and disaster recovery plan
Kili’s information security practices
Access control: policies and procedures are in place to govern access to and use of data and resources
Network communications security: Kili has guidelines to manage network security
Data Security: Kili has guidelines designed to protect the confidentiality, integrity and availability of data
Laptops: anti-malware, updates and encryption are required
Physical and environmental: controls protect Kili assets, personnel and infrastructure
Communications and operations management: role-based access are in place
Supply chain security: supply chain risk is monitored
Secure Development
Programming Standards: Roadmap, training and guidance for developers are in place to produce secure code
Security analysis and testing: testing is performed, including functional, static and dynamic analysis
Ethical hacking: operational security analysis and penetration testing are run on a regular basis
Secure configuration: Kili Technology products and services must be secure by default