Security
Last revised on January 27th, 2023, effective as of January 27th, 2023.
Authentication and access security
Personnel have the exact level of access required, and user access is regularly audited to ensure data protection. In keeping with National Institute of Standards and Technology (NIST) requirements, data access is protected by multi-factor authentication, password control, keys, and other best practices.
Secure software development lifecycle
Security is baked into our software developmentādevelopers are active participants in securing the code that they write. Security scanning tools and code analysis help them resolve any issues with open-source packaging, misconfigurations, and potential vulnerabilities.
Security Scanning Tools
Developers use embedded security scanning tools in their deployment process. Static code analysis and open-source package management let us flag potential issues or vulnerabilities.
Daily Vulnerability Scans
We scan our product daily, to flag and correct potential vulnerabilities as quickly as possible.
Wasyaps Pty. Ltd., support@dontrelet.com.