Security Measures

Technical and Organizational Safeguards

Effective Date: May 1, 2026
Version: 1.0
Last Updated: April 13, 2026

Introduction

This document describes the security measures Equerra implements to protect your data when using our Software products.

Purpose: Transparency about our security practices and compliance with data protection obligations.

Standards: Our security program follows industry best practices and aligns with:

  • ISO/IEC 27001:2013 (Information Security Management) framework
  • ISO/IEC 27017:2015 (Cloud Security) guidelines
  • ISO/IEC 27018:2019 (Protection of PII in Public Clouds) principles
  • NIST Cybersecurity Framework
  • Cloud Security Alliance (CSA) Security Guidance
  • OWASP Top 10 for application security

Note: While Equerra follows ISO 27001 controls and best practices, we are not currently ISO 27001 certified.

Microsoft Azure: Customer data hosted in Microsoft Azure data centers benefits from Microsoft's certifications (ISO 27001, SOC 2, PCI DSS). Full list: Azure Compliance

1. Access Control and Authentication

1.1 Physical Security

Data Center Security (Microsoft Azure):

  • Biometric access controls
  • 24/7 surveillance and monitoring
  • Visitor management systems
  • Multiple layers of physical security

Equerra personnel have no physical access to data center infrastructure.

1.2 Logical Access Controls

Multi-Factor Authentication (MFA):

  • Required for all employee access to systems processing customer data
  • Individual user accounts (no shared credentials)
  • MFA enforced through Azure Active Directory

Role-Based Access Control (RBAC):

  • Principle of least privilege
  • Access granted only as necessary for job function
  • Regular access reviews (quarterly)
  • Immediate revocation upon termination

Authentication Security:

  • Strong password policies (complexity, rotation)
  • Single sign-on (SSO) with conditional access
  • Session timeouts for inactive users
  • IP restrictions for administrative access

1.3 Access Monitoring

  • Comprehensive logging of authentication attempts
  • Automated alerts for suspicious patterns
  • Regular audit log reviews
  • Failed login attempt tracking

2. Data Encryption

2.1 Data in Transit

Transport Layer Security:

  • TLS 1.2 or higher for all connections
  • Perfect forward secrecy enabled
  • Certificate pinning for critical connections
  • No SSL, TLS 1.0, or TLS 1.1

Protocols: HTTPS only for web interfaces, encrypted channels for all data transmission.

2.2 Data at Rest

Storage Encryption:

  • AES-256 encryption for all customer data
  • Microsoft Azure Storage Service Encryption
  • Database-level encryption
  • File-level encryption for documents

Key Management:

  • Keys stored in Azure Key Vault
  • Hardware Security Modules (HSMs)
  • Regular key rotation
  • Separation of key management from data access

2.3 Backup Encryption

  • All backups encrypted using AES-256
  • Separate encryption for backup data
  • Encrypted transmission of backups
  • Secure backup storage with access controls

3. Network Security

3.1 Network Architecture

Segmentation:

  • Logical separation of customer environments
  • Multi-tenant architecture with tenant isolation
  • Separate networks for production, testing, corporate
  • Virtual Private Clouds (VPCs) with restricted connectivity

Firewalls:

  • Web Application Firewall (WAF) protecting internet-facing services
  • Network firewalls with default-deny rules
  • Regular firewall rule reviews
  • Minimal open ports

3.2 Intrusion Detection and Prevention

Monitoring:

  • Network Intrusion Detection Systems (NIDS)
  • Real-time threat intelligence integration
  • Automated blocking of malicious traffic
  • 24/7 security operations center (SOC)

DDoS Protection:

  • Microsoft Azure DDoS mitigation
  • Rate limiting and traffic shaping
  • Automatic scaling for traffic spikes

3.3 Vulnerability Management

Scanning and Testing:

  • Continuous vulnerability scanning
  • Annual penetration testing by independent third parties
  • Application security testing for all releases
  • Risk-based remediation (critical within 14 days)

Patch Management:

  • Automated patch deployment
  • Testing in non-production environments
  • Emergency patching for critical vulnerabilities

4. Organizational Security

4.1 Security Policies

Documentation:

  • Information Security Policy (reviewed annually)
  • Data Protection Policy
  • Incident Response Plan (tested quarterly)
  • Business Continuity Plan
  • Change Management Procedures

Governance:

  • Chief Information Security Officer (CISO)
  • Privacy Officer
  • Clear security responsibilities for all roles

4.2 Personnel Security

Background Checks:

  • Background verification for employees with data access (where legally permissible)
  • Confidentiality and NDA agreements for all personnel
  • Ongoing monitoring for high-risk roles

Training and Awareness:

  • Mandatory annual security training for all employees
  • Specialized data protection training for personnel handling personal data
  • Quarterly phishing awareness training and simulations
  • Regular security awareness campaigns

Clear Desk Policy:

  • Clean desk requirements
  • Screen lock after 10 minutes of inactivity
  • Secure disposal of physical documents

5. Incident Detection and Response

5.1 Monitoring

Security Information and Event Management (SIEM):

  • Centralized logging of security events
  • Real-time correlation and analysis
  • Automated alerting for threats
  • 12-month log retention minimum
  • Tamper-proof log storage

5.2 Incident Response

24/7 Capability:

  • Incident response team available around the clock
  • Documented procedures and playbooks
  • Defined escalation paths
  • Regular testing (quarterly tabletop exercises)

Data Breach Response:

  • Immediate containment procedures
  • Forensic investigation capabilities
  • Notification workflows (24-hour target for customer notification)
  • Post-incident review and lessons learned

5.3 Security Monitoring

  • Continuous monitoring of security controls
  • Automated alerting for anomalies
  • Regular security metrics and KPIs
  • Threat hunting activities

6. Application Security

6.1 Secure Development

Secure Development Lifecycle (SDL):

  • Security requirements in design phase
  • Threat modeling for new features
  • Secure coding standards and guidelines
  • Code review with security checks

Testing:

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Dependency scanning for vulnerabilities
  • API security testing

6.2 Software Composition

Third-Party Components:

  • Tracking of all dependencies
  • Automated scanning for known vulnerabilities
  • Regular updates of third-party libraries
  • License compliance verification

6.3 Deployment Security

  • Immutable infrastructure where feasible
  • Automated deployment pipelines
  • Configuration management
  • Strict separation of development, test, production

7. Business Continuity and Disaster Recovery

7.1 Backup and Recovery

Backup Strategy:

  • Daily incremental backups
  • Weekly full backups
  • Geographic redundancy (backups in separate Azure regions)
  • Monthly backup integrity testing

Recovery Objectives:

  • Recovery Time Objective (RTO): 4 hours for critical systems
  • Recovery Point Objective (RPO): 24 hours maximum data loss

7.2 Business Continuity

Planning:

  • Business continuity plans tested annually
  • Backup personnel for critical roles
  • Alternate processing facilities identified
  • Regular plan reviews and updates

Service Availability:

  • Redundant systems and infrastructure
  • Geographic redundancy for critical components
  • Automatic failover capabilities

8. Vendor and Sub-Processor Security

8.1 Third-Party Management

Assessment:

  • Security assessments before engagement
  • Contractual security requirements
  • Regular vendor risk reviews
  • Right to audit security controls

Sub-Processors:

  • Equivalent security obligations required
  • Data Processing Agreements with security terms
  • Regular security reviews
  • Incident notification requirements

Current Sub-Processors: Sub-Processor List

8.2 Vendor Access

  • Vendor access limited to minimum necessary
  • All vendor access logged and monitored
  • Time-limited access grants
  • Multi-factor authentication required

9. Data Protection Measures

9.1 Data Minimization

Collection:

  • Collect only data necessary for services
  • Avoid special categories of personal data
  • Clear purpose specification

Retention:

  • Active subscription: Data retained as necessary
  • After termination: 30-day retrieval, then deletion
  • Backup retention: 90 days maximum
  • Legal holds documented and time-limited

9.2 Data Segregation

Multi-Tenancy:

  • Logical separation of customer data
  • Tenant-level isolation
  • Access controls prevent cross-tenant access

9.3 Secure Deletion

Deletion Methods:

  • Secure deletion preventing recovery
  • Multi-pass overwriting where applicable
  • Destruction certificates for physical media
  • Deletion audit trails maintained

10. Compliance and Certification

10.1 Current Status

Equerra:

  • Follows ISO 27001 controls and best practices
  • Regular third-party security assessments
  • Annual penetration testing by independent firms
  • Continuous security improvement program

Note: Equerra is not currently ISO 27001 certified. Our security program implements ISO 27001 controls and undergoes regular independent assessment.

Microsoft Azure (inherited):

  • ISO 27001, ISO 27017, ISO 27018
  • SOC 1 Type 2, SOC 2 Type 2, SOC 3
  • PCI DSS Level 1 (where applicable)
  • Regional certifications per tenant location

10.2 Independent Verification

Regular Assessments:

  • Annual third-party security audits
  • External penetration testing (minimum annually)
  • Application security testing per release
  • Code security reviews

10.3 Continuous Improvement

Review Cycles:

  • Quarterly security measure reviews
  • Annual policy updates
  • Post-incident improvements
  • Regular threat modeling

11. Security Incident Notification

11.1 Notification to Customers

If we identify a security incident affecting your data:

Timeline: Within 24 hours of becoming aware (where feasible)

Information Provided:

  • Nature of the incident
  • Data affected
  • Impact assessment
  • Containment and remediation actions
  • Contact for questions

11.2 Regulatory Notification

We comply with breach notification requirements:

  • NZ: Privacy Commissioner within 72 hours if serious harm likely
  • AU: OAIC as soon as practicable if serious harm likely
  • GDPR: Supervisory authority within 72 hours

Full Details: Privacy Policy and Data Processing Agreement

12. Your Security Responsibilities

12.1 Account Security

You Are Responsible For:

  • Maintaining confidentiality of account credentials
  • Implementing strong passwords
  • Enabling multi-factor authentication
  • Promptly reporting suspected unauthorized access
  • Managing user access within your organization

12.2 Data Classification

Appropriate Use:

  • Don't input data more sensitive than necessary
  • Inform us if you'll process special categories of personal data
  • Follow your own data classification policies

12.3 Incident Reporting

Report to Us:

  • Suspected security incidents
  • Lost or stolen credentials
  • Unusual account activity
  • Potential vulnerabilities

Contact: security@equerra.com (for security incidents)

13. Security Updates and Communication

13.1 Update Frequency

This document is reviewed and updated:

  • Quarterly by security team
  • Annually by external auditors
  • Following security incidents
  • When new threats identified
  • When adopting new technologies

13.2 Notification of Changes

Material changes communicated via:

  • Updates to this page
  • Email to account administrators (for significant changes)
  • In-product notifications where appropriate

Current Version: Available at www.equerra.com/security

14. Security Questions and Assessments

14.1 Security Questionnaires

We respond to reasonable security questionnaires from customers and prospects.

Request: Email security@equerra.com

Typical Response Time: 10 business days

14.2 Security Documentation

Available upon request under NDA:

  • Security policies and procedures
  • Third-party audit summaries
  • Penetration test results (redacted)
  • Compliance certifications

Contact Information

Security Team: security@equerra.com

Privacy Officer: privacy@equerra.com

General Support: support@equerra.com

Postal Address:

Equerra Limited

2nd Level

40 Lady Elizabeth Lane

Wellington Central

New Zealand 6011

Related Documents

Version Control

Version Date Changes
1.0 May 1, 2026 Initial publication

Equerra Limited
Strategic Solutions for Modern Business

© 2026 Equerra Limited. All rights reserved.