IT Security and Compliance

Our Compliance Stack at ResGuard

Our commitment to data protection and security is embedded in every area of our organisation.
Use this Trust Center to learn more about our security measures and to review our security documentation.

Platform and Network Security

The foundation of security at ResGuard is infrastructure security. ResGuard relies on our Virtual Private Cloud (VPC) to logically isolate our internal networks. We maintain configured security groups to control and restrict network access through defined inbound and outbound rules.

Availability

We develop highly available products that meet a variety of monitoring and observability requirements of our customers through the scalability of our CSP. We uphold our Service Level Agreements (SLAs) with an availability of 99.7%. For more information about our SLA, please refer to our Master Services Agreement.

Personnel Security

At ResGuard, we encourage all employees to participate in protecting customer data and company assets. Where legally permissible, ResGuard conducts background checks prior to joining the organisation. All ResGuard employees complete regular security and privacy awareness training that integrates security into both technical and non-technical roles. Our training materials are role-specific to ensure that employees have the tools to address the specific security challenges of their work.

Product Security

Product security is a top priority at ResGuard. We integrate security from the outset into the design of our products within the Software Development Lifecycle. We develop products following common Agile methodologies and integrate security throughout the Agile Release Cycle. This allows us to discover vulnerabilities earlier and remediate them faster than would be possible with longer release cycles. Clearly defined change management policies and procedures determine when and how changes are made. This philosophy is central to DevOps security and the development practices that have driven the adoption of ResGuard.

Patch Management

ResGuard releases software patches as part of our continuous integration process. We strive to deliver patches that may affect end users as quickly as possible and within our defined Service Level Agreements (SLA), by sending end-user notifications and scheduling maintenance windows.

Physical Security

As a SaaS provider, ResGuard's production infrastructure is hosted in Cloud Service Provider (CSP) environments. These CSPs manage the physical and environmental security controls for ResGuard's production servers, including buildings, locks and door keys.

Physical security measures at ResGuard offices include strict enforcement of badge access to enter the building as well as access to ResGuard floors and secured work areas. All visitors must present identification to receive a visitor badge and are accompanied by a ResGuard employee at all times.

Access Management

ResGuard grants access to resources and confidential information on a need-to-know basis according to role. Access is controlled on the principle of least privilege, meaning users only have the level of access required to perform their duties. In addition, we enforce multi-factor authentication, which includes strong passwords and a second factor. Third parties of ResGuard do not have direct access to production systems.

We monitor and log access to all production environments for security purposes. In addition, access is audited and baselined to meet our security and compliance requirements.

Protection of Customer Data

Data submitted by authorised users to the ResGuard service is considered confidential. This data is protected during transmission over public networks and encrypted at rest. Customer data may only leave the ResGuard production environment in limited cases, for example to support a customer request.

All data transmitted between ResGuard and our users is protected by Transport Layer Security (TLS) and HTTP Strict Transport Security (HSTS). If encrypted communication is interrupted, the ResGuard application becomes unreachable.

ResGuard has implemented controls to ensure the integrity and confidentiality of administrative credentials and access mechanisms, and we enforce disk encryption and unique credentials for workstations.

Monitoring

ResGuard monitors critical infrastructure for security-relevant events using a proprietary implementation of open-source and commercial technologies. Activity data such as API calls and operating system calls are centrally logged, where the information passes through a series of custom rules designed to detect malicious or unauthorised behaviour. The results of these rules are fed into an orchestration platform that triggers automated actions -- including direct notification of the security team or requiring additional authentication.

CSP Hosting

AWS Cloud -- ResGuard does not operate its own on-premise data centres.

Audit Logging

ResGuard has an extensive product logging mechanism including a customer-accessible audit log console. In addition, audit logging is enabled for all customer support, web end-user and technical operations applications as well as staging and production management infrastructure.

Multi-Factor Authentication

A centralised identity provider and multi-factor authentication are enabled for all customer support, web end-user and technical operations applications as well as staging and production management infrastructure. ResGuard users are required to use multi-factor authentication when accessing the production environment.

Role-Based Access Control

Formal role-based access controls restrict access to systems and system components and are enforced by the access control system. Where formal role-based access controls are not possible, authorised user IDs with two-factor authentication are used. ResGuard also follows the principle of least privilege.

Daily Backups

ResGuard maintains a real-time backup that can be restored immediately at any time, unless a disaster event has occurred. Backups are performed daily, with full incremental backups every week. We do not use tapes. We archive data and back it up incrementally to ensure that the data is usable and available at all times.

Encryption at Rest

Data at rest is encrypted with AES 256.

Encryption in Transit

All data transmitted between ResGuard and ResGuard users is protected by Transport Layer Security (TLS) and HTTP Strict Transport Security (HSTS). If encrypted communication is interrupted, the ResGuard application becomes unreachable.

Code Analysis

As part of our secure development lifecycle, peer reviews, static analysis and dynamic analysis testing take place before code is deployed to production.

Vulnerability & Patch Management

ResGuard performs monthly scans of servers and networks, and identified vulnerabilities are tracked and remediated in accordance with ResGuard's vulnerability management procedures. ResGuard also performs monthly vulnerability scans of critical environments as well as static code analysis to ensure the security and integrity of ResGuard's environments and products. All identified vulnerabilities are assigned to a responsible owner and remediated in accordance with ResGuard's vulnerability management procedures.

Password Security

Multi-factor authentication is required to access the ResGuard production environment. Where multi-factor authentication is not possible, ResGuard follows the following password standards:

  • Minimum length of 8 characters
  • At least one lowercase letter
  • At least one number
  • At least one non-alphanumeric character
Network Time Protocol

Systems and network devices use a common time synchronisation service. The NTP check is included in the ResGuard agent.

Separate Production Environment

ResGuard maintains a staging environment separate from the production environment for testing.

Endpoint Security

Disk Encryption: All ResGuard employee laptops use full disk encryption.

Endpoint Detection & Response: Anti-malware controls protect workstations and servers. The engines of these anti-malware tools are continuously updated.

Network Security

Firewall: ResGuard's firewall rules are set to block by default.

SIEM: All security-relevant log data is ingested into our centralised SIEM system to analyse and detect suspicious activity across all technical layers.

Incident Response

At ResGuard, when an incident is detected, a security incident ticket is created with the details of the event, including the date and time of the incident, the type of incident and the impact on customers. The creation of the ticket triggers the notification of the responsible security team members. They immediately initiate an investigation to assess the scope and impact of the situation and to determine the actions necessary for remediation.

Penetration Testing

Regular penetration tests are conducted by third-party providers.

Security Operations Center

ResGuard has a dedicated 24x7 incident response capability with on-call personnel to handle critical incidents and service outages. If the incident is determined to be security-related, the responsible security team members are included in the response procedures.

Qualys SSL Labs
Standard Support

Our standard support covers all issues, incidents or requests regarding our RCM cloud solution:

  • Request: support(at)resguard-solutions.com
  • SLA: Initial response within 24 hours
Enhanced Support

Support with enhanced SLA definitions can be provided through individual subscription models. Please contact your Account Manager for further details.

Maintenance Window

Regular patch, update and feature upgrade activities are carried out during our scheduled maintenance window on the first Sunday of every month between 02:00 CET and 03:00 CET. Customers are informed about planned downtime via the information table below.

RCM Platform

Compliance Modules for Every Requirement

Expert Services

Hands-On Support from Certified Professionals

Contact Form