Security Information

Security Information

Kili Technology’s security practices are multidimensional and reflect the different ways in which Kili Technology interacts with its customers

Corporate governance

  • Human Resources: personnel are made aware of security
  • Information and asset classification: information and assets are classified according degree of confidentiality
  • Incident Management: Kili Technology respond to events that create suspicions of unauthorized data access or processing
  • Risk management resiliency program: Kili Technology has a business continuity and disaster recovery plan

Kili’s information security practices

  • Access control: policies and procedures are in place to govern access to and use of data and resources
  • Network communications security: Kili has guidelines to manage network security
  • Data Security: Kili has guidelines designed to protect the confidentiality, integrity and availability of data
  • Laptops: anti-malware, updates and encryption are required
  • Physical and environmental: controls protect Kili assets, personnel and infrastructure
  • Communications and operations management: role-based access are in place
  • Supply chain security: supply chain risk is monitored

Secure Development

  • Programming Standards: Roadmap, training and guidance for developers are in place to produce secure code
  • Security analysis and testing: testing is performed, including functional, static and dynamic analysis
  • Ethical hacking: operational security analysis and penetration testing are run on a regular basis
  • Secure configuration: Kili Technology products and services must be secure by default