Security Measures

Version 15.06.2023

This document summarizes the measures taken by Izix to ensure the security of our clients’ data.


Data center and network security


Physical security


1. Facilities:

Izix servers are hosted on AWS at SOC 2 Type II- and ISO 27001-compliant facilities located within the borders of the European Union. In addition, the data center facilities are powered by redundant power—each with UPS and backup generators. Furthermore, hosting providers have no access to customer data.


2. On-site security:

Our data center facilities are secured with a perimeter of multi-level security zones, 24/7 manned security, and CCTV video surveillance. In addition, they're secured via multifactor identification with biometric access control, physical locks, and security breach alarms.


3. Monitoring:

An automatic monitoring system is in place to continuously check the state of the services, sending alerts to the appropriate personnel at Izix when necessary. Physical security, power, and internet connectivity are monitored by the facilities providers.


Network Security

4. Protection:

Our network is protected by redundant firewalls, secure HTTPS transport over public networks, regular audits, and Intrusion Detection Systems (IDS) which monitor and/or block malicious traffic and network attacks.

5. Architecture:

Our network security architecture consists of multiple security zones. More sensitive systems, like database servers, are protected in our most trusted zones that are not accessible from the public internet. Data transferred between Izix servers use a private network.

6. Third-party penetration tests:

In addition to our extensive internal scanning and testing program, penetration tests are performed on a yearly basis.

7. Logical access:

Access to the Izix production network is restricted by an explicit need-to-know basis, utilizing least privilege. It is audited and monitored frequently, and controlled by our Management Team. Employees accessing the Izix production servers are required to use multiple factors of authentication when supported.

8. Security incident response:

In case of a system alert, events are escalated to our 24/7 teams. Employees are trained on security incident response processes, including communication channels and escalation paths.


Encryption

9. Encryption in transit:

Communications between you and Izix servers are encrypted via industry best practices: HTTPS and Transport Layer Security (TLS) over public networks.

10. Encryption at rest:

The hard disks of all servers are encrypted.



Availability & Continuity

11. Redundancy:

Izix employs service clustering and network redundancies to eliminate single points of failure. Our strict backup regime ensures customer data is actively replicated across geographically distinct data centers.

12. Disaster recovery:

Our Disaster Recovery (DR) program ensures that our services remain available or are easily recoverable in the case of a disaster. This is accomplished by building a robust technical environment and creating disaster recovery plans that are continuously updated and tested.


Application security



Secure development

13. Security training:

Engineers participate in secure code training covering OWASP Top 10 security flaws, common attack vectors, and Izix security controls.

14. QA:

Our dedicated QA engineers test all software developments using automated and manual tests before roll-out to production.

15. Separate environments:

Testing and staging environments are separated both physically and logically from the production environment.

16. Patches:

Patches and updates to systems occur as needed.



Application vulnerabilities

17. Static code analysis:

The source code repositories are continuously scanned for security issues via our integrated static analysis tool.

18. Security penetration testing:

Application security is also part of the annual penetration tests conducted by third-party experts.


Product security features



Authentication security

19. Authentication options:

Izix offers authentication options including username-password, SSO via Oauth and SAML2.0. Aim is to make Izix compatible with most SSO portals. Api and remote system can also connect using OAuth 2.0.

20. Secure credential storage:

When it comes to secure credential storage, Izix follows best practices: storing credentials in a password management system.

21. API security & authentication:

The Izix API is SSL-only. User must be a verified user to make API requests. API access and authentication are possible via OAuth 2.0 protocols.



Additional product security features

22. Access rights & roles:

Access to data within Izix is governed by access rights and can be configured to define granular access privileges. Izix has various permission levels for users (e.g. Admin, Reception, Security, Assistants, etc.).

23. Transmission security:

All communications with Izix servers are encrypted using industry standard HTTPS over public networks. This ensures that all traffic between you and Izix remains secure during transit.

24. Data segregation:

Logical segmentation of customer data is enforced at code level.

25. Data collection and retention:

Izix acts as a data processor in the context of the GDPR. This means that Izix does not own any user data and does not retain the right to use personal data for any other purpose than the service provided by the Izix application. Izix is only entitled to collect personal data in the strict context of the service. Users or admins can delete profiles at any point in time which will delete any personal data and anonymize any statistical data. You can read more about this topic in Izix DPA and Privacy Policy. Databases are purged of outdated personal data regularly.

26. Audit trail:

Audit trails including time of change and user responsible for the change are in place on critical objects.

27. Subprocessors:

Izix carefully selects its third-party data subprocessors and reviews them regularly. All such processors are contractually bound by Izix to keep customer data confidential.


Compliance certifications, memberships, and external assessments

28. GDPR:

Izix takes the sensitivity of your personal data seriously. We strive to follow all recommendations and operational measures reasonably possible to be and remain in full GDPR compliance.

29. SecurityScorecard:

SecurityScorecard is an information security company that collects, attributes, and scores the overall health of enterprise cybersecurity through the identification of exposed vulnerabilities on corporate digital assets discovered on the public internet. Izix's score is A.

30. Level A:

Our API and application endpoints are TLS/SSL-only. This means communications between you and Izix servers are encrypted via industry best practices: HTTPS and Transport Layer Security (TLS) over public networks.


Additional security methodologies



Policies

Izix has developed a comprehensive set of security policies covering a range of topics. These policies are shared with, and made available to all employees and contractors with access to Izix information assets.



Background checks

Izix performs background checks on all new employees in accordance with local laws. Criminal background checks are a part of these employee background checks. All newly-hired employees are screened through the hiring process and required to sign Non-Disclosure and Confidentiality Agreements.