Permissions and Authentication
- Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
- Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.
Least Privilege Access Control
- We follow the principle of least privilege with respect to identity and access management.
Quarterly Access Reviews
- We perform quarterly access reviews of all team members with access to sensitive systems.
Password Requirements
- All team members are required to adhere to a minimum set of password requirements and complexity for access.
Password Managers
- All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.