Our Controls and Subprocessors

Controls and Subprocessors

Controls

Operational and Security Controls

Infrastructure Protection

  • Restricted Key Access: We limit the ability to manage encryption keys strictly to approved personnel with a verified operational requirement.
  • Individualized User Accounts: To access our systems and apps, every user must provide distinct credentials, such as a unique login and password or a verified Secure Socket Shell (SSH) key.
  • Production Environment Oversight: Entry into our live application and general system infrastructure is strictly limited to cleared users.
  • Management of User Privileges: Our established protocols govern the entire lifecycle of user access, including the onboarding of new staff, role adjustments, and the prompt removal of account permissions.
  • Firewall Governance: Only authorized administrators with a legitimate business need can modify or access firewall settings.
  • Termination Procedures: We utilize comprehensive checklists to ensure that all system access is deactivated for departing employees within agreed-upon timeframes.
  • Production Network Identity: Entry into the production network requires specific authentication through unique user IDs and passwords or authorized SSH keys.
  • Encrypted External Entry: Staff members may only connect to production systems remotely through approved, high-security encrypted channels.
  • Continuous Threat Detection: We employ intrusion detection tools to provide 24/7 surveillance of our network, allowing us to spot and respond to potential security threats early.
  • Event Auditing: Log management software is utilized to record and track events that could influence our ability to meet security commitments.
  • Isolated Network Zones: Our network architecture is segmented into distinct zones to block unauthorized entry into client databases.
  • Annual Perimeter Reviews: We perform a full review of our firewall rule sets at least once a year, tracking all necessary updates to completion.
  • Firewall Implementation: We deploy active firewalls configured specifically to prevent illegitimate access to our environment.
  • Maintenance and Patching: Our service infrastructure receives regular updates and patches as part of both routine upkeep and vulnerability mitigation to defend against evolving threats.

Organizational Safeguards

  • Secure Hardware Retirement: Any electronic storage containing sensitive data is thoroughly wiped or physically destroyed using industry best practices, with official certificates issued for every device.
  • Infrastructure Logging: We maintain a detailed, official list of all assets within our production environment.
  • Removable Drive Security: All portable storage devices are required to use encryption.
  • Malware Protection: Anti-malware software is installed on all systems at risk of attack; these tools are configured for automatic updates and centralized logging.
  • Pre-Employment Screening: We conduct thorough background checks for all incoming staff members.
  • Contractor Ethics: All third-party contractors must agree to a professional code of conduct as part of their engagement.
  • Staff Accountability: Employees must acknowledge our code of conduct upon joining, and any violations result in formal disciplinary measures.
  • Privacy Agreements: Every staff member and contractor must sign a legally binding confidentiality agreement before beginning work.
  • Annual Reviews: Managers perform formal performance assessments for their team members at least once a year.
  • Password Rigor: We enforce a strict password policy across all system components to ensure high security.
  • Mobile Management: A centralized Mobile Device Management (MDM) platform is used to oversee all mobile hardware supporting our services.
  • Physical Security for Guests: All visitors are required to register, wear identification, and remain accompanied by an employee when in secure zones or data centers.
  • Security Literacy: New hires complete security training within 30 days, followed by mandatory annual refresher courses for all staff.

Product and Service Security

  • Database Encryption: All storage systems containing sensitive client information are encrypted while at rest.
  • Self-Verification of Controls: We conduct annual internal assessments to confirm that our security measures are functioning as intended, with corrective actions taken for any findings.
  • Annual Pentesting: External penetration tests are performed at least once a year, followed by a formal remediation plan to address vulnerabilities within defined timelines.
  • Secure Data Transit: We utilize industry-standard protocols to encrypt sensitive data whenever it is moved over public internet connections.
  • Documented Oversight: Official policies govern our approach to managing vulnerabilities and monitoring our systems.

Governance and Internal Procedures

  • Business Resilience Plans: We maintain detailed Disaster Recovery and Business Continuity plans, including communication strategies to maintain security even if key staff are unavailable.
  • Annual Stress Testing: Our recovery and continuity plans are put to the test at least once every year.
  • Cyber Liability Coverage: We hold cybersecurity insurance to mitigate financial risks stemming from potential business interruptions.
  • Standardized Setup: A configuration management system is in place to ensure all environments are deployed with consistent security settings.
  • Change Control: Any updates to software or infrastructure must be documented, tested, and officially authorized before going live.
  • Deployment Restrictions: Only specific, authorized individuals have the permissions required to push changes into the production environment.
  • Secure Development Cycle: We follow a formal Systems Development Life Cycle (SDLC) that dictates how we build, acquire, and maintain our technology.
  • Anonymous Reporting: A whistleblower policy and a private communication channel allow anyone to report fraud or ethical concerns anonymously.
  • Board-Level Oversight: Our Board of Directors receives annual briefings on our privacy and cybersecurity posture to provide guidance and oversight.
  • Independent Board Governance: The board includes independent directors and maintains formal records of their annual meetings regarding internal controls.
  • Data Backup Strategy: Official policies outline how we handle the backup and restoration of customer information.
  • Client Notification: We inform our customers of any significant system changes that could impact their data processing.
  • Defined Organizational Structure: We maintain a formal organization chart and assign specific security responsibilities within job descriptions.
  • Help Desk and Incident Management: We provide an external support system for reporting failures or incidents, and follow a formal policy for tracking and resolving all security events.
  • Vendor and Risk Management: We perform annual risk assessments and maintain formal agreements with all third-party vendors, including strict privacy commitments.
  • Vulnerability Scanning: External-facing systems undergo host-based vulnerability scans at least once a quarter, with high-risk issues tracked until they are fixed.

Data Governance

  • Information Lifecycle: Formal procedures are in place for the secure storage and eventual destruction of both internal and customer data.
  • Offboarding Data Removal: When a customer ends their service, we purge their confidential data from our environment following industry best practices.
  • Classification Protocols: Our data classification policy ensures that confidential information is handled with the appropriate level of security.
  • Privacy Support: We assist our clients (Data Controllers) in meeting their legal privacy obligations through our Data Processing Agreements (DPA).

Authorized Sub-processors

The following third-party entities are engaged to process end-user personal information on behalf of SOBA Network. These partners assist us in delivering our services to our clients.

We are committed to data safety and ensure that every sub-processor meets rigorous security and legal criteria. This includes the execution of a Data Processing Agreement (DPA) and, where necessary, the inclusion of Standard Contractual Clauses (SCCs) to maintain high protection standards.

Core Service Providers

  • Google Cloud EMEA (Ireland): Responsible for providing essential computing power and media processing capabilities. Primary processing takes place within the European Economic Area (EEA).
  • Amazon Web Services (AWS) EMEA SARL (Ireland): Utilized for secure data storage, general computing, and media processing. Operations are primarily centered in the EEA.

Feature-Specific Providers

There are currently no additional sub-processors required for specialized features