Security & Compliance
The Safestar cloud is secure thanks to the use of multiple layers of security that protect both infrastructure and user data
We provide security on many levels
Physical security
We place servers and receiving devices in unique server rooms that meet strict security standards. Safestar infrastructure is located in 2 server rooms in the European Union to protect data during accidental events such as fire. Thanks to this, data is safe, and any event will not cause data loss or system downtime for a long time.
Cybersecurity
We protect the system and user data from threats in many layers. We use the full potential of AWS cloud professionals and are continuously working on our application security. Data and passwords are encrypted, which increases the level of protection.
Disaster Recovery
We create backups – each data backup is an additional safeguard. The Safestar system automatically copies the data daily, so you don’t have to remember to do it. However, users can make extra copies of the data anytime – they need to use the data export function. They can download the data to their computer’s disk.
Standards & Procedures
We have implemented internal procedures regulating the principles of access to infrastructure, collected data and performed programming work. We have collected them in our Information Security Management System ISO 27001. The procedures also take into account the principles of processing personal data in order to meet the requirements of the GDPR and NIS2 regulations.
User Internal Security
2FA
A two-step login provides an even higher level of security. It consists of confirming the identity of the user logging into the system using another device, e.g. SMS or token.
IP Filtering
IP filtering allows users to log into the system only from a device associated with a specific IP address. Only employees using particular devices and locations have access to the Safestar system.
ACL
The Safestar system allows you to create different user profiles and assign them the appropriate permissions necessary to perform their duties. This solution makes controlling employee access to specific modules, groups of objects or system functionalities easier.
Password Strength
The basis for secure access to any IT system is a password. Safestar automatically controls the strength of the password being set. To ensure peace of mind, the password should be strong enough. It is best if it consists of a series of letters, numbers and special characters.
GDPR
TOM
In order to ensure the security of data transmission, we provide standard technical and organizational measures appropriate to the level of risk to the security of the services offered.
Transmission encryption
The transmission of customer data from the system to the Customer’s end device is encrypted using protocols securing the transmission of data streams (Secure Socket Layer or other similar).
Data encryption
The System uses selected cryptographic security techniques in relation to selected Customer data or access data to the System (Administrator and End User passwords).
Backup copies
In order to secure customer data entered into the System or other data stored in the System databases, backup copies are created
NIS 2 Compliance
ISO 27001
In order to ensure the security of data transmission, we provide standard technical and organizational measures appropriate to the level of risk to the security of the services provided.
Risk analysis
The transmission of customer data from the system to the Customer’s end device is encrypted using protocols securing the transmission of data streams (Secure Socket Layer or other similar).
SOC
The System uses selected cryptographic security techniques in relation to customer chosen data or access data to the System (Administrator and End User passwords).
Business continuity
In order to secure customer data entered into the System or other data stored in the System databases, backup copies are created