Built on Accountability
How Intellizu protects client data, systems access, and confidential information across every engagement.
Control Domains
The following controls govern how Intellizu handles client systems, data, and access. Each domain is reviewed on an ongoing basis.
- Network firewalls enforced Implemented
Firewalls are configured on all networks used to access client environments, restricting unauthorized inbound and outbound traffic.
- Remote access encrypted Implemented
All remote access to client infrastructure occurs over approved encrypted connections (TLS, SSH tunnels, or VPN). Unencrypted access is not permitted.
- Remote access MFA enforced Implemented
Remote access to client systems requires multi-factor authentication. Password-only access is not permitted for any privileged session.
- Production access restricted by role Implemented
Access to client production environments—applications, databases, and networks—is restricted to personnel with a documented business need for that engagement.
- Unique authentication per system Implemented
Each system and datastore requires unique credentials. Shared accounts and default credentials are not used.
- Log management Implemented
Access, change, and error events on client systems are captured in a log management system. Logs are retained for a minimum of 90 days and are available for investigation when alerts or anomalies are identified.
- Infrastructure monitoring Implemented
Client infrastructure managed under retainer engagements is monitored for performance and availability. Threshold-based alerting is configured to surface issues proactively.
- Multi-factor authentication Implemented
MFA is required on all accounts with access to client infrastructure, source control, and internal tooling.
- Password policy enforced Implemented
Accounts follow a strong password policy: minimum length, no reuse, and storage in a password manager. Passwords are not shared or transmitted in plaintext.
- Least-privilege IAM Implemented
Access is scoped to the minimum permissions required per engagement. Elevated roles require justification and are reviewed regularly.
- Short-lived credentials Implemented
Temporary credentials (AWS STS, GCP Workload Identity, etc.) are used wherever possible over long-lived static API keys.
- SSH key management Implemented
SSH keys are unique per engineer, rotated at least annually, and removed upon role change or engagement end.
- Access revocation on offboarding Implemented
All client access is revoked within 24 hours of engagement close or any personnel change.
- Confidentiality by default Implemented
All client data, credentials, and architecture details are treated as confidential. NDAs are signed at engagement start.
- Encryption at rest Implemented
Any client data stored during an engagement (configuration, backups, artifacts) is encrypted at rest using AES-256 or equivalent.
- Encrypted communications Implemented
Standard communication channels (email, Slack, video) use encryption in transit. Client secrets are not transmitted over unencrypted channels.
- Secret management practices Implemented
Secrets are stored in dedicated vaults (AWS Secrets Manager, HashiCorp Vault, etc.) and never committed to version control.
- No persistent client data retention Implemented
Intellizu does not retain copies of client production data beyond active work sessions unless explicitly required and agreed upon in writing.
- Defined data retention limits Implemented
Engagement artifacts (docs, configs, credentials) are purged or transferred to client ownership within 30 days of engagement close.
- Full disk encryption Implemented
All engineer workstations use full disk encryption (FileVault, BitLocker, or equivalent).
- Endpoint antivirus / EDR Implemented
Workstations run active malware detection. Suspicious activity triggers immediate investigation.
- Automatic screen lock Implemented
Devices lock automatically after an idle period. Manual lock on leave is required practice.
- OS and dependency patching Implemented
Security patches are prioritized based on severity and applied on a risk-informed timeline. Systems are reviewed monthly for outstanding updates.
- Incident response plan Implemented
A documented IR plan defines roles, escalation paths, and communication templates for security events.
- Client notification SLA Implemented
Clients are notified within 24 hours of any confirmed security event that affects their environment.
- Post-incident review Implemented
All security incidents result in a written post-mortem shared with affected clients within 5 business days.
- Annual risk assessments Implemented
Threats and changes—environmental, regulatory, and technological—are assessed at least annually. Identified risks are formally documented and tracked to resolution.
- Control self-assessments Implemented
Security controls are reviewed at least annually to verify they are in place and operating effectively. Findings drive corrective action.
- Subprocessor list maintained Implemented
Intellizu maintains a list of SaaS tools and subprocessors used in delivery (communication, cloud providers, CI/CD). Available on request.
- Vendor security review Implemented
New tools that will access client data are evaluated for security posture before adoption.
- Secure code review Implemented
Production code changes are reviewed through pull request workflows before deployment. Direct commits to main branches are not permitted.
- Dependency vulnerability scanning Implemented
Application dependencies are scanned for known vulnerabilities using automated tooling. Findings are triaged and remediated based on severity.
- CI/CD access controls Implemented
Deployment pipelines and build systems require authenticated access and are restricted to authorized personnel.
- Environment separation Implemented
Development, staging, and production environments are logically separated. Production data is not used in non-production environments without explicit sanitization.
- Encrypted backups Implemented
Critical systems and configuration data managed under retainer engagements are backed up on a defined schedule. Backups are encrypted at rest.
- Backup restoration testing Implemented
Backup restoration procedures are tested periodically to validate recovery integrity and confirm backups are usable.
- Security awareness training Implemented
Personnel with access to client systems complete periodic security awareness training covering current threat patterns and safe handling practices.
- Phishing awareness Implemented
Engineers are trained to identify and report phishing attempts. Suspicious communications are escalated before action is taken.
- Knowledge documentation Implemented
Critical runbooks, architecture decisions, and access inventories are documented and not siloed with a single engineer.
- Backup engineer coverage Implemented
Retainer clients can request a designated backup contact for urgent issues during primary engineer unavailability.
- Engagement handoff process Implemented
Structured offboarding ensures clients receive all documentation, credentials, and artifacts before engagement close.
Questions about our security posture?
Clients and prospects can request our subprocessor list, NDA template, or schedule a call to discuss specific compliance requirements.