Comprehensive Security COMPLIANCE

Enterprise-Grade Security, By Design

We operate with rigorous security standards and SOC 2 compliance, ensuring the highest level of protection for our customers.

Identity governance

Secure Personnel

Vetted personnel only

BlueFlag Security takes the security of its data and that of its clients and customers seriously and ensures that only vetted personnel are given access to their resources.

Background Checks

All BlueFlag Security contractors and employees undergo background checks  in accordance with local laws and industry best practices.

Confidentiality First

Confidentiality or other types of Non-Disclosure Agreements (NDAs) are signed by all employees, contractors, and others who need access to sensitive or internal information.

Introductory Training

We conduct employee security training & testing using current and emerging techniques and attack vectors.

Secure Development

Protected developer
identities and tools

BlueFlag Security protects developer identities and their tools throughout the software development lifecycle (SDLC).

SDLC Principles

All BlueFlag Security projects including on-premises software products, support services, and our Digital Identity Cloud follow SDLC principles.

Security Requirements

All development of new products, tools, and services, and major changes to existing ones, undergo a design review to ensure security requirements are incorporated.

Secure Development Training

All team members involved in any system development undergo annual secure development training in coding or scripting languages they utilize plus other relevant trainings.

OWASP Top 10

Software development is conducted in line with OWASP Top 10 recommendations for web application security.

Secure Testing

Third-party testing
and scanning

BlueFlag Security deploys third party penetration testing and vulnerability scanning of all production and Internet facing systems on a regular basis.

Initial Deployment Scanning

All new systems and services are scanned prior to being deployed to production.

Penetration Testing

We perform penetration testing both by internal security engineers and external penetration testing companies on new systems and products or major changes to existing systems, services, and products to ensure a comprehensive and real-world view from multiple perspectives.

Application Security Testing

We perform static and dynamic software application security testing of all code, including open source libraries, as part of our software development process.

SECURE CLOUD

Modern, multi-tenant
cloud architecture

BlueFlag Security Cloud provides maximum security with complete customer isolation in a modern, multi-tenant cloud architecture.

Isolation Approach

All customer cloud environments and data are isolated and stored within a dedicated trust zone to prevent any accidental or malicious co-mingling.

Continuous Monitoring

Our entire platform is continuously monitored and all data is encrypted at rest and in transmission to prevent any unauthorized access or data breaches.

Encryption

We separate each customer's data and our own, utilizing unique encryption keys to ensure data is protected and isolated.

Role-based Access

We implement role-based access controls and the principles of least privileged access, and review revoke access as needed.

OUR SECURITY COMMITMENT

BlueFlag Security is committed to providing secure products and services to safely and easily manage billions of digital identities across the globe. Our external certifications provide independent assurance of our dedication to protecting our customers by regularly assessing and validating the protections and effective security practices we have in place.

SOC 2 Type II Certification
Trusted and validated

BlueFlag Security successfully completed the AICPA Service Organization Control (SOC) 2 Type II audit. The audit confirms that BlueFlag Security information security practices, policies, procedures, and operations meet the SOC 2 standards for security.

BlueFlag Security was audited by Prescient Assurance, a leader in security and compliance certifications for B2B, SAAS companies worldwide. For more information about Prescient Assurance, you may reach out them at info@prescientassurance.com.

BlueFlag Security was audited by Customers and prospects can request access to the audit report here here.

Get in touch with us

Have a question or want to see BlueFlag Security in action? Contact us or schedule a demo and somebody will get back to you as soon as possible.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Secure your software development life cycle