At Encoding.com, only authorized members of the Operations Group have access to production systems. This means that no other employee, contractor, or anyone outside this restricted group can physically enter the place where production systems reside.
All production systems at Encoding.com are accessed through bastion hosts and remote access to the bastion hosts requires multi-factor token-based VPN access.
Encoding.com maintains strict password policy settings related to password strength, length, and expiration time.
At Encoding.com production system access audit logs (success/failure) is logged both locally, and in a central log repository. Access to the logs are restricted to appropriate personnel in the Operations Group.
Encoding,.com follows a strict process in which standard security patches are applied within 30 days of release and critical patches are applied as appropriate to the risk.
At Encoding.com, all systems are built based on a standard build configuration defined by the Operations team and vetted by Security & Risk Management. Changes to the standard build configuration follow the standard change management procedure.
At Encoding.com vulnerability scans are performed and reviewed weekly and third parties are engaged periodically to perform both penetration and application vulnerability testing.
Encoding,.com leverages industry-standard enterprise firewalls for filtering traffic between the production environment and other internal corporate networks.
At Encoding.com, the production application and underlying infrastructure components are monitored 24x7x365 by dedicated NMS (Network Management Systems). Critical alerts generated by these systems are sent to 24x7x365 on-call Operations staff members and escalated as appropriate to Operations management.
Updated 3 months ago