View & download sensitive informationAsk for informationRequest Access
Overview
Welcome to KABi's Trust Center. Our commitment to data privacy and security is embedded in every part of
our business. Use this portal to learn about our security posture and request access to our security
documentation.
We regularly perform self-assessments according to the the
Consensus Assessment Initiative Questionnaire (CAIQ).Request
Access
GDPR
Auditor
Elias Neocleous & Co LLC
We comply with the European Union’s General Data
Protection Regulation, which governs data protection and privacy for all individuals
citizens of the European Union and the European Economic Area.We underwent a GDPR attestation audit as a form of
external party assurance for data privacy.
SOC 2
Auditor
TAG Global
Elevatus underwent a SOC 2 Type II audit over the period
from January 1st, 2023 until October 31st, 2023 and attained an attestation report
from TAG Global.Request
Access
We generate and maintain a versioned history of CycloneDX
SBOM files exported deterministically through our build processes.
Data Privacy
Employee Privacy Training
Employees perform annual Security Training through Drata
to protect organization data and the workplace.
Access Control
Data Access
We enforce IAM and RBAC policies across all
services.
Password Security
Password complexity is met, we require a minimum of 16
characters that are mixed.Bitwarden is currently being rolled out at Elevatus as a
dedicated password and key management solution.
All laptop devices are required to be encrypted prior to
assignment of access.We use FileVault, Bitlocker and LUKS to encrypt data on
our corporate laptops.
Network Security
Firewall
Traffic Filtering
Corporate Security
HR Security
Our employees undergo a thorough on-boarding cycle that
involves MFA setup, policy review and acceptance, agent installation (for lite
mobile device management), hardening of IT systems, and security awareness
training.
Internal Assessments
We perform assessments across the CCM domains regularly in
an ad-hoc fashion in addition to the annual review. This happens in specific events
such as the acquisition of a new vendor, or a change in cloud infrastructure.
Internal SSO
We use Google as an Identity Provider with full
enforcement of MFA.
Penetration Testing
We perform penetration testing annually or when
significant infrastructure changes are made. Following the initial report, we
address the issues and retest in order to have a remediation report that ensures the
points tested are covered.
Our Netherlands datacenter on Google Cloud
Platform.
A+
Elevatus Portal - Eemshaven
Our Netherlands datacenter on Google Cloud
Platform.
A+
Legal
Subprocessors
Company
Location
Additional Details
Google Cloud
Netherlands
Cloud
Provider
Oracle
Jeddah
Jeddah
Sovren
EU
Resume
Parsing
Bitbucket
EU
Software
Version Control
Slack
EU
Team
Communication
Agora
EU
Video
Recording
Customer Audit Rights
Customers are able to audit our security protocols
with penetration and vulnerability tests as long as we are notified a week in
advance and the proper procedures and protocols have been adhered to.
Privacy Policy
Our Privacy Policy ensures the protection and
confidentiality of user data, outlining how information is collected, used, and
shared in accordance with applicable laws and regulations.