Skip to main content

Security

Updated over a year ago

Introduction

Sensitive data is one of an organisation’s most important assets, so it makes sense that you prioritise its security. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction” of sensitive records.

Security measures perform four critical roles:

  • It protects the organisation’s ability to function.

  • It enables the safe operation of applications implemented on the organisation’s IT systems.

  • It protects the data the organisation collects and uses.

  • It safeguards the technology the organisation uses.

Information security, often referred to as InfoSec, refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection.

Zerofriction as a SAAS company, take the security of your information very serious.

Zerofriction and ISO 27001

ISO/IEC 27001 is widely known, providing requirements for an information security management system (ISMS), though there are more than a dozen standards in the ISO/IEC 27000 family. Using them enables organizations of any kind to manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties.

Zero Friction adheres to the ISO/IEC 27001 guidelines and has a compliant ISMS. Sep/2022 - Zero Friction is fully certification by Brand Compliance.

Check out the certificate below.

Check out our Security policy here: Zero Friction Security Policy - External use.pdf

Zero Friction TOMS

The Zero Friction Technical and Organizational Measures (TOMS) and the statement of Applicability to ISO27001:2017 can be found here: ZF_TOMS_Security.pdf

Zero Friction and the Microsoft Zero Trust methodology

Zero Friction is developed using the the Zero Trust model.

Based on the principle of verified trust - in order to trust, you must first verify - Zero Trust eliminates the inherent trust that is assumed inside the traditional corporate network. Zero Trust architecture reduces risk across all environments by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.

For more information on the Zero Trust Methodology check out: Microsoft Zero Trust Methodology

For more information on the Microsoft Azure Platform and the GDPR Compliancy, check out: Microsoft General Data Protection Regulation Summary

Did this answer your question?