Access is via email address and password, with Multi-Factor authentication for all accounts.
New deployments to production systems are subject to code review and testing before release.
Data is encrypted in transit and at rest.
We host all our products on Amazon Web Services (AWS).
A security provider assesses and monitors potential vulnerabilities of the U-Reg platform on an ongoing basis. Experts continuously probe the security of our platform.
We maintain records of security privileges of individuals, and adopt a policy of least privilege. Management event tracking is deployed through CloudTrail on AWS.
We conduct internal security audits on a regular basis, focused on Architectonic Design, Security Evaluation and Source Code Evaluation.
U-Reg follows all best practices and has deployed systems to ensure best in class Intrusion Prevention and Intrusion Detection measures are in place.
A threat and vulnerability on the physical security and environment controls of the data centre has been performed by AWS for the following:
U-Reg uses the services of an external Data Privacy Officer (DPO). U-Reg’s Data Protection Impact Assessment (DPIA), which has been performed by our DPO, is available on request.