Security Measures
Technical and Organizational Safeguards
Effective Date: May 1, 2026
Version: 1.0
Last Updated: April 13, 2026
Introduction
This document describes the security measures Equerra implements to protect your data when using our Software products.
Purpose: Transparency about our security practices and compliance with data protection obligations.
Standards: Our security program follows industry best practices and aligns with:
- ISO/IEC 27001:2013 (Information Security Management) framework
- ISO/IEC 27017:2015 (Cloud Security) guidelines
- ISO/IEC 27018:2019 (Protection of PII in Public Clouds) principles
- NIST Cybersecurity Framework
- Cloud Security Alliance (CSA) Security Guidance
- OWASP Top 10 for application security
Note: While Equerra follows ISO 27001 controls and best practices, we are not currently ISO 27001 certified.
Microsoft Azure: Customer data hosted in Microsoft Azure data centers benefits from Microsoft's certifications (ISO 27001, SOC 2, PCI DSS). Full list: Azure Compliance
1. Access Control and Authentication
1.1 Physical Security
Data Center Security (Microsoft Azure):
- Biometric access controls
- 24/7 surveillance and monitoring
- Visitor management systems
- Multiple layers of physical security
Equerra personnel have no physical access to data center infrastructure.
1.2 Logical Access Controls
Multi-Factor Authentication (MFA):
- Required for all employee access to systems processing customer data
- Individual user accounts (no shared credentials)
- MFA enforced through Azure Active Directory
Role-Based Access Control (RBAC):
- Principle of least privilege
- Access granted only as necessary for job function
- Regular access reviews (quarterly)
- Immediate revocation upon termination
Authentication Security:
- Strong password policies (complexity, rotation)
- Single sign-on (SSO) with conditional access
- Session timeouts for inactive users
- IP restrictions for administrative access
1.3 Access Monitoring
- Comprehensive logging of authentication attempts
- Automated alerts for suspicious patterns
- Regular audit log reviews
- Failed login attempt tracking
2. Data Encryption
2.1 Data in Transit
Transport Layer Security:
- TLS 1.2 or higher for all connections
- Perfect forward secrecy enabled
- Certificate pinning for critical connections
- No SSL, TLS 1.0, or TLS 1.1
Protocols: HTTPS only for web interfaces, encrypted channels for all data transmission.
2.2 Data at Rest
Storage Encryption:
- AES-256 encryption for all customer data
- Microsoft Azure Storage Service Encryption
- Database-level encryption
- File-level encryption for documents
Key Management:
- Keys stored in Azure Key Vault
- Hardware Security Modules (HSMs)
- Regular key rotation
- Separation of key management from data access
2.3 Backup Encryption
- All backups encrypted using AES-256
- Separate encryption for backup data
- Encrypted transmission of backups
- Secure backup storage with access controls
3. Network Security
3.1 Network Architecture
Segmentation:
- Logical separation of customer environments
- Multi-tenant architecture with tenant isolation
- Separate networks for production, testing, corporate
- Virtual Private Clouds (VPCs) with restricted connectivity
Firewalls:
- Web Application Firewall (WAF) protecting internet-facing services
- Network firewalls with default-deny rules
- Regular firewall rule reviews
- Minimal open ports
3.2 Intrusion Detection and Prevention
Monitoring:
- Network Intrusion Detection Systems (NIDS)
- Real-time threat intelligence integration
- Automated blocking of malicious traffic
- 24/7 security operations center (SOC)
DDoS Protection:
- Microsoft Azure DDoS mitigation
- Rate limiting and traffic shaping
- Automatic scaling for traffic spikes
3.3 Vulnerability Management
Scanning and Testing:
- Continuous vulnerability scanning
- Annual penetration testing by independent third parties
- Application security testing for all releases
- Risk-based remediation (critical within 14 days)
Patch Management:
- Automated patch deployment
- Testing in non-production environments
- Emergency patching for critical vulnerabilities
4. Organizational Security
4.1 Security Policies
Documentation:
- Information Security Policy (reviewed annually)
- Data Protection Policy
- Incident Response Plan (tested quarterly)
- Business Continuity Plan
- Change Management Procedures
Governance:
- Chief Information Security Officer (CISO)
- Privacy Officer
- Clear security responsibilities for all roles
4.2 Personnel Security
Background Checks:
- Background verification for employees with data access (where legally permissible)
- Confidentiality and NDA agreements for all personnel
- Ongoing monitoring for high-risk roles
Training and Awareness:
- Mandatory annual security training for all employees
- Specialized data protection training for personnel handling personal data
- Quarterly phishing awareness training and simulations
- Regular security awareness campaigns
Clear Desk Policy:
- Clean desk requirements
- Screen lock after 10 minutes of inactivity
- Secure disposal of physical documents
5. Incident Detection and Response
5.1 Monitoring
Security Information and Event Management (SIEM):
- Centralized logging of security events
- Real-time correlation and analysis
- Automated alerting for threats
- 12-month log retention minimum
- Tamper-proof log storage
5.2 Incident Response
24/7 Capability:
- Incident response team available around the clock
- Documented procedures and playbooks
- Defined escalation paths
- Regular testing (quarterly tabletop exercises)
Data Breach Response:
- Immediate containment procedures
- Forensic investigation capabilities
- Notification workflows (24-hour target for customer notification)
- Post-incident review and lessons learned
5.3 Security Monitoring
- Continuous monitoring of security controls
- Automated alerting for anomalies
- Regular security metrics and KPIs
- Threat hunting activities
6. Application Security
6.1 Secure Development
Secure Development Lifecycle (SDL):
- Security requirements in design phase
- Threat modeling for new features
- Secure coding standards and guidelines
- Code review with security checks
Testing:
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Dependency scanning for vulnerabilities
- API security testing
6.2 Software Composition
Third-Party Components:
- Tracking of all dependencies
- Automated scanning for known vulnerabilities
- Regular updates of third-party libraries
- License compliance verification
6.3 Deployment Security
- Immutable infrastructure where feasible
- Automated deployment pipelines
- Configuration management
- Strict separation of development, test, production
7. Business Continuity and Disaster Recovery
7.1 Backup and Recovery
Backup Strategy:
- Daily incremental backups
- Weekly full backups
- Geographic redundancy (backups in separate Azure regions)
- Monthly backup integrity testing
Recovery Objectives:
- Recovery Time Objective (RTO): 4 hours for critical systems
- Recovery Point Objective (RPO): 24 hours maximum data loss
7.2 Business Continuity
Planning:
- Business continuity plans tested annually
- Backup personnel for critical roles
- Alternate processing facilities identified
- Regular plan reviews and updates
Service Availability:
- Redundant systems and infrastructure
- Geographic redundancy for critical components
- Automatic failover capabilities
8. Vendor and Sub-Processor Security
8.1 Third-Party Management
Assessment:
- Security assessments before engagement
- Contractual security requirements
- Regular vendor risk reviews
- Right to audit security controls
Sub-Processors:
- Equivalent security obligations required
- Data Processing Agreements with security terms
- Regular security reviews
- Incident notification requirements
Current Sub-Processors: Sub-Processor List
8.2 Vendor Access
- Vendor access limited to minimum necessary
- All vendor access logged and monitored
- Time-limited access grants
- Multi-factor authentication required
9. Data Protection Measures
9.1 Data Minimization
Collection:
- Collect only data necessary for services
- Avoid special categories of personal data
- Clear purpose specification
Retention:
- Active subscription: Data retained as necessary
- After termination: 30-day retrieval, then deletion
- Backup retention: 90 days maximum
- Legal holds documented and time-limited
9.2 Data Segregation
Multi-Tenancy:
- Logical separation of customer data
- Tenant-level isolation
- Access controls prevent cross-tenant access
9.3 Secure Deletion
Deletion Methods:
- Secure deletion preventing recovery
- Multi-pass overwriting where applicable
- Destruction certificates for physical media
- Deletion audit trails maintained
10. Compliance and Certification
10.1 Current Status
Equerra:
- Follows ISO 27001 controls and best practices
- Regular third-party security assessments
- Annual penetration testing by independent firms
- Continuous security improvement program
Note: Equerra is not currently ISO 27001 certified. Our security program implements ISO 27001 controls and undergoes regular independent assessment.
Microsoft Azure (inherited):
- ISO 27001, ISO 27017, ISO 27018
- SOC 1 Type 2, SOC 2 Type 2, SOC 3
- PCI DSS Level 1 (where applicable)
- Regional certifications per tenant location
10.2 Independent Verification
Regular Assessments:
- Annual third-party security audits
- External penetration testing (minimum annually)
- Application security testing per release
- Code security reviews
10.3 Continuous Improvement
Review Cycles:
- Quarterly security measure reviews
- Annual policy updates
- Post-incident improvements
- Regular threat modeling
11. Security Incident Notification
11.1 Notification to Customers
If we identify a security incident affecting your data:
Timeline: Within 24 hours of becoming aware (where feasible)
Information Provided:
- Nature of the incident
- Data affected
- Impact assessment
- Containment and remediation actions
- Contact for questions
11.2 Regulatory Notification
We comply with breach notification requirements:
- NZ: Privacy Commissioner within 72 hours if serious harm likely
- AU: OAIC as soon as practicable if serious harm likely
- GDPR: Supervisory authority within 72 hours
Full Details: Privacy Policy and Data Processing Agreement
12. Your Security Responsibilities
12.1 Account Security
You Are Responsible For:
- Maintaining confidentiality of account credentials
- Implementing strong passwords
- Enabling multi-factor authentication
- Promptly reporting suspected unauthorized access
- Managing user access within your organization
12.2 Data Classification
Appropriate Use:
- Don't input data more sensitive than necessary
- Inform us if you'll process special categories of personal data
- Follow your own data classification policies
12.3 Incident Reporting
Report to Us:
- Suspected security incidents
- Lost or stolen credentials
- Unusual account activity
- Potential vulnerabilities
Contact: security@equerra.com (for security incidents)
13. Security Updates and Communication
13.1 Update Frequency
This document is reviewed and updated:
- Quarterly by security team
- Annually by external auditors
- Following security incidents
- When new threats identified
- When adopting new technologies
13.2 Notification of Changes
Material changes communicated via:
- Updates to this page
- Email to account administrators (for significant changes)
- In-product notifications where appropriate
Current Version: Available at www.equerra.com/security
14. Security Questions and Assessments
14.1 Security Questionnaires
We respond to reasonable security questionnaires from customers and prospects.
Request: Email security@equerra.com
Typical Response Time: 10 business days
14.2 Security Documentation
Available upon request under NDA:
- Security policies and procedures
- Third-party audit summaries
- Penetration test results (redacted)
- Compliance certifications
Contact Information
Security Team: security@equerra.com
Privacy Officer: privacy@equerra.com
General Support: support@equerra.com
Postal Address:
Equerra Limited
2nd Level
40 Lady Elizabeth Lane
Wellington Central
New Zealand 6011
Related Documents
Version Control
| Version | Date | Changes |
|---|---|---|
| 1.0 | May 1, 2026 | Initial publication |
Equerra Limited
Strategic Solutions for Modern Business
© 2026 Equerra Limited. All rights reserved.