Security Measures
*This document summarizes the measures taken by BePark to ensure the security of our clients’ data.
Data center and network security
Physical security
1. Facilities:
BePark servers are hosted on AWS at SOC 2 Type II- and ISO 27001-compliant facilities located within the borders of the European Union. In addition, the data center facilities are powered by redundant power—each with UPS and backup generators. Furthermore, hosting providers have no access to customer data.
2. On-site security:
Our data center facilities are secured with a perimeter of multi-level security zones, 24/7 manned security, and CCTV video surveillance. In addition, they're secured via multifactor identification with biometric access control, physical locks, and security breach alarms.
3. Monitoring:
An automatic monitoring system is in place to continuously check the state of the services, sending alerts to the appropriate personnel at BePark when necessary. Physical security, power, and internet connectivity are monitored by the facilities providers.
Network Security
4. Protection:
Our network is protected by redundant firewalls, secure HTTPS transport over public networks, regular audits, and Intrusion Detection Systems (IDS) which monitor and/or block malicious traffic and network attacks.
5. Architecture:
Our network security architecture consists of multiple security zones. More sensitive systems, like database servers, are protected in our most trusted zones that are not accessible from the public internet. Data transferred between BePark servers use a private network.
6. Third-party penetration tests:
In addition to our extensive internal scanning and testing program, penetration tests are performed on a yearly basis.
7. Logical access:
Access to the BePark production network is restricted by an explicit need-to-know basis, utilizing least privilege. It is audited and monitored frequently, and controlled by our Management Team. Employees accessing the BePark production servers are required to use multiple factors of authentication when supported.
8. Security incident response:
In case of a system alert, events are escalated to our 24/7 teams. Employees are trained on security incident response processes, including communication channels and escalation paths.
Encryption
9. Encryption in transit:
Communications between you and BePark servers are encrypted via industry best practices: HTTPS and Transport Layer Security (TLS) over public networks.
10. Encryption at rest:
The hard disks of all servers are encrypted.
Availability & Continuity
11. Redundancy:
BePark employs service clustering and network redundancies to eliminate single points of failure. Our strict backup regime ensures customer data is actively replicated across geographically distinct data centers.
12. Disaster recovery:
Our Disaster Recovery (DR) program ensures that our services remain available or are easily recoverable in the case of a disaster. This is accomplished by building a robust technical environment and creating disaster recovery plans that are continuously updated and tested.
Application security
Secure development
13. Security training:
Engineers participate in secure code training covering OWASP Top 10 security flaws, common attack vectors, and BePark security controls.
14. QA:
Our dedicated QA engineers test all software developments using automated and manual tests before roll-out to production.
15. Separate environments:
Testing and staging environments are separated both physically and logically from the production environment.
16. Patches:
Patches and updates to systems occur as needed.
Application vulnerabilities
17. Static code analysis:
The source code repositories are continuously scanned for security issues via our integrated static analysis tool.
18. Security penetration testing:
Application security is also part of the annual penetration tests conducted by third-party experts.
Product security features
Authentication security
19. Authentication options:
BePark offers authentication options including username-password, SSO via Oauth and SAML2.0. Aim is to make BePark compatible with most SSO portals. Api and remote system can also connect using OAuth 2.0.
20. Secure credential storage:
When it comes to secure credential storage, BePark follows best practices: storing credentials in a password management system.
21. API security & authentication:
The BePark API is SSL-only. User must be a verified user to make API requests. API access and authentication are possible via OAuth 2.0 protocols.
Additional product security features
22. Access rights & roles:
Access to data within BePark is governed by access rights and can be configured to define granular access privileges. BePark has various permission levels for users (e.g. Admin, Reception, Security, Assistants, etc.).
23. Transmission security:
All communications with BePark servers are encrypted using industry standard HTTPS over public networks. This ensures that all traffic between you and BePark remains secure during transit.
24. Data segregation:
Logical segmentation of customer data is enforced at code level.
25. Data retention:
You can automatically delete profiles after a given retention period, which allows you to comply more easily with privacy regulations such as the GDPR.
26. Audit trail:
Audit trails including time of change and user responsible for the change are in place on critical objects.
27. Subprocessors:
BePark carefully selects its third-party data subprocessors and reviews them regularly. All such processors are contractually bound by BePark to keep customer data confidential.
Compliance certifications, memberships, and external assessments
28. GDPR:
BePark is in full GDPR compliance.
29. SecurityScorecard:
SecurityScorecard is an information security company that collects, attributes, and scores the overall health of enterprise cybersecurity through the identification of exposed vulnerabilities on corporate digital assets discovered on the public internet. BePark's score is A.
30. Level A:
Our API and application endpoints are TLS/SSL-only. This means communications between you and BePark servers are encrypted via industry best practices: HTTPS and Transport Layer Security (TLS) over public networks.
Additional security methodologies
Policies
BePark has developed a comprehensive set of security policies covering a range of topics. These policies are shared with, and made available to all employees and contractors with access to BePark information assets.
Background checks
BePark performs background checks on all new employees in accordance with local laws. Criminal background checks are a part of these employee background checks. All newly-hired employees are screened through the hiring process and required to sign Non-Disclosure and Confidentiality Agreements.