⟵ Return to Trust Center
Kasbah Labs Safeguards
Explore the safeguards we use to help protect you.
Safeguards
Identification & Authentication
Access to sensitive data is limited to those with a business need
Accounts are actively managed in line with security best practices
Identity and access controls are formally managed
Least privilege is enforced for users, services, and processes
Logical access is enforced according to least privilege
Multi-factor authentication is enforced for high-risk access
Privileged access is restricted and tightly managed
Role-based access controls enforce need-to-know access
User access is granted and removed through a formal provisioning process
Network Security
Critical systems are isolated through network segmentation
Sensitive data is protected during transmission over public networks
Technology Development & Acquisition
Development, testing, and production environments are kept separate
Endpoint Security
Endpoints are protected through layered security controls
Continuous Monitoring
Event logs and audit tools are protected from unauthorized access and tampering
Privileged actions are logged and regularly reviewed
Incident Response
Incident response operations are governed by documented processes
Incidents are managed through the full response lifecycle
The incident response plan is maintained, updated, and accessible to relevant stakeholders
Vulnerability & Patch Management
Newly identified vulnerabilities are addressed on an ongoing basis
Operating systems, applications, and firmware are patched regularly
Regular vulnerability scans are performed to identify system and application weaknesses
Vulnerabilities are identified, tracked, and resolved through a defined remediation process
Vulnerability and patch management is governed through a formal program
Business Continuity & Disaster Recovery
Recurring backups are created, verified, and aligned to recovery objectives
Cryptographic Protections
Sensitive data at rest is protected with encryption