Security Documentation

Security

Documentation

Last Updated: January 15, 2025

Version: 1.0

This document provides comprehensive information about Actuals' security measures, compliance frameworks, and technical safeguards implemented to protect customer data and ensure service availability.

Security Commitment

Actuals is committed to maintaining the highest standards of information security. We implement industry-leading security practices and are actively working toward achieving ISO 27001 certification and SOC 2 Type II compliance.

1. Security Framework Overview

1. Security Framework Overview

1.1 Security Governance

1.1 Security Governance

Our security program is built on the following foundations:

  • Security by Design: Security considerations integrated into all development processes

  • Risk-Based Approach: Regular risk assessments and threat modeling

  • Continuous Monitoring: 24/7 security monitoring and incident response

  • Compliance First: Adherence to industry standards and regulations

  • Regular Audits: Internal and external security assessments

1.2 Compliance Frameworks

1.2 Compliance Frameworks

We align our security practices with the following frameworks:

  • ISO 27001: Information Security Management System (in progress)

  • SOC 2 Type II: Service Organization Control (in progress)

  • GDPR: General Data Protection Regulation compliance

  • CCPA: California Consumer Privacy Act compliance

  • NIST Cybersecurity Framework: Risk management and security controls

2. Infrastructure Security

2. Infrastructure Security

2.1 Cloud Infrastructure

2.1 Cloud Infrastructure

Our infrastructure is hosted on leading cloud platforms:

  • Primary Cloud Provider: Amazon Web Services (AWS)

  • Secondary Providers: Google Cloud Platform, Microsoft Azure

  • Certifications: All providers maintain SOC 2, ISO 27001, and other certifications

  • Data Centers: Tier III/IV data centers with physical security controls

  • Redundancy: Multi-region deployment for high availability

2.2 Network Security

2.2 Network Security

  • Firewalls: Next-generation firewalls with intrusion prevention

  • Network Segmentation: Isolated network zones for different services

  • DDoS Protection: Distributed denial-of-service attack mitigation

  • VPN Access: Secure remote access for authorized personnel

  • Load Balancing: Distributed traffic management and failover

2.3 Server Security

2.3 Server Security

  • Hardening: Security-hardened operating systems and configurations

  • Patch Management: Automated security updates and vulnerability patching

  • Monitoring: Real-time system monitoring and alerting

  • Backup Systems: Regular backups with tested recovery procedures

  • Antimalware: Enterprise-grade endpoint protection

3. Data Protection

3. Data Protection

3.1 Encryption

3.1 Encryption

We implement comprehensive encryption across all data states:

  • Data at Rest: AES-256 encryption for all stored data

  • Data in Transit: TLS 1.3 for all network communications

  • Database Encryption: Transparent data encryption (TDE) for databases

  • Backup Encryption: All backups encrypted with separate key management

  • Key Management: Hardware Security Modules (HSMs) for key storage

3.2 Data Classification

3.2 Data Classification

We classify data based on sensitivity levels:

  • Public: Information that can be freely shared

  • Internal: Information for internal use only

  • Confidential: Sensitive business information

  • Restricted: Highly sensitive data requiring special handling

  • Personal Data: Information subject to privacy regulations

3.3 Data Loss Prevention (DLP)

3.3 Data Loss Prevention (DLP)

  • Content Inspection: Automated scanning for sensitive data

  • Policy Enforcement: Automated blocking of unauthorized data transfers

  • Monitoring: Real-time monitoring of data movement

  • Reporting: Detailed logs and alerts for security incidents

4. Access Control and Identity Management

4. Access Control and Identity Management

4.1 Authentication

4.1 Authentication

  • Multi-Factor Authentication (MFA): Required for all system access

  • Single Sign-On (SSO): Centralized authentication management

  • Strong Password Policy: Enforced complexity and rotation requirements

  • Biometric Authentication: Available for high-security access

  • Session Management: Automatic timeout and session monitoring

4.2 Authorization

4.2 Authorization

  • Role-Based Access Control (RBAC): Granular permission management

  • Principle of Least Privilege: Minimum necessary access rights

  • Segregation of Duties: Critical operations require multiple approvals

  • Regular Access Reviews: Quarterly access certification process

  • Privileged Access Management: Special controls for administrative access

4.3 Identity Lifecycle Management

4.3 Identity Lifecycle Management

  • User Provisioning: Automated account creation and configuration

  • Access Modifications: Workflow-based permission changes

  • Deprovisioning: Immediate access revocation upon termination

  • Audit Trails: Complete logging of all access changes

5. Application Security

5. Application Security

5.1 Secure Development Lifecycle (SDLC)

5.1 Secure Development Lifecycle (SDLC)

  • Security Requirements: Security considerations in all development phases

  • Threat Modeling: Risk assessment for all new features

  • Code Reviews: Mandatory security-focused code reviews

  • Static Analysis: Automated security testing in CI/CD pipeline

  • Dynamic Testing: Runtime security testing and penetration testing

5.2 Web Application Security

5.2 Web Application Security

  • OWASP Top 10: Protection against common web vulnerabilities

  • Input Validation: Comprehensive input sanitization and validation

  • Output Encoding: Prevention of injection attacks

  • Session Security: Secure session management and CSRF protection

  • API Security: OAuth 2.0, rate limiting, and API gateway protection

5.3 AI/ML Security

5.3 AI/ML Security

  • Model Security: Protection against adversarial attacks

  • Data Poisoning Prevention: Input validation and anomaly detection

  • Model Versioning: Secure model deployment and rollback procedures

  • Privacy-Preserving ML: Differential privacy and federated learning

  • Explainable AI: Transparent and auditable AI decision-making

6. Monitoring and Incident Response

6. Monitoring and Incident Response

6.1 Security Monitoring

6.1 Security Monitoring

  • SIEM (Security Information and Event Management): Centralized log analysis

  • Real-time Alerting: Immediate notification of security events

  • Threat Intelligence: Integration with threat intelligence feeds

  • Behavioral Analytics: User and entity behavior analysis

  • Vulnerability Scanning: Regular automated security scans

6.2 Incident Response

6.2 Incident Response

  • 24/7 Security Operations Center (SOC): Round-the-clock monitoring

  • Incident Response Team: Dedicated team for security incidents

  • Response Procedures: Documented incident response playbooks

  • Forensic Analysis: Digital forensics capabilities

  • Communication Plan: Stakeholder notification procedures

6.3 Business Continuity

6.3 Business Continuity

  • Disaster Recovery: Comprehensive DR plan with regular testing

  • Backup Strategy: Multiple backup locations and recovery points

  • High Availability: 99.9% uptime SLA with redundant systems

  • Failover Procedures: Automated failover to backup systems

7. Third-Party Security

7. Third-Party Security

7.1 Vendor Management

7.1 Vendor Management

  • Security Assessments: Comprehensive evaluation of all vendors

  • Contractual Requirements: Security clauses in all vendor agreements

  • Ongoing Monitoring: Regular review of vendor security posture

  • Incident Coordination: Joint incident response procedures

7.2 Key Third-Party Providers

7.2 Key Third-Party Providers

Provider

Service

Security Certifications

Data Location

Amazon Web Services

Cloud Infrastructure

SOC 2, ISO 27001, FedRAMP

Multiple regions

Google Cloud Platform

AI/ML Services

SOC 2, ISO 27001, CSA STAR

Global

Microsoft Azure

Additional Services

SOC 2, ISO 27001, HIPAA

Global

Stripe

Payment Processing

PCI DSS Level 1, SOC 2

Global

Provider

Service

Security Certifications

Data Location

Amazon Web Services

Cloud Infrastructure

SOC 2, ISO 27001, FedRAMP

Multiple regions

Google Cloud Platform

AI/ML Services

SOC 2, ISO 27001, CSA STAR

Global

Microsoft Azure

Additional Services

SOC 2, ISO 27001, HIPAA

Global

Stripe

Payment Processing

PCI DSS Level 1, SOC 2

Global

8. Human Resources Security

8. Human Resources Security

8.1 Personnel Security

8.1 Personnel Security

  • Background Checks: Comprehensive screening for all employees

  • Security Training: Regular security awareness training

  • Confidentiality Agreements: All staff sign confidentiality agreements

  • Security Clearance: Role-based security clearance levels

  • Termination Procedures: Secure offboarding process

8.2 Security Awareness

8.2 Security Awareness

  • Regular Training: Quarterly security awareness sessions

  • Phishing Simulations: Regular phishing awareness tests

  • Security Policies: Comprehensive security policy documentation

  • Incident Reporting: Clear procedures for reporting security concerns

9. Physical Security

9. Physical Security

9.1 Office Security

9.1 Office Security

  • Access Control: Badge-based access to office facilities

  • Visitor Management: Escort requirements for all visitors

  • Surveillance: CCTV monitoring of all entry points

  • Clean Desk Policy: Mandatory clean desk and screen lock policies

  • Secure Storage: Locked storage for sensitive documents

9.2 Data Center Security

9.2 Data Center Security

  • Physical Access: Biometric access controls

  • Environmental Controls: Temperature, humidity, and power monitoring

  • Fire Suppression: Advanced fire detection and suppression systems

  • Security Guards: 24/7 on-site security personnel

10. Compliance and Audit

10. Compliance and Audit

10.1 Compliance Monitoring

10.1 Compliance Monitoring

  • Regular Assessments: Quarterly compliance assessments

  • Gap Analysis: Identification and remediation of compliance gaps

  • Policy Updates: Regular updates to reflect regulatory changes

  • Training Programs: Compliance training for all staff

10.2 Audit and Certification

10.2 Audit and Certification

  • Internal Audits: Regular internal security audits

  • External Audits: Annual third-party security assessments

  • Penetration Testing: Quarterly penetration testing

  • Certification Programs: Working toward ISO 27001 and SOC 2 certification

11. Security Metrics and Reporting

11. Security Metrics and Reporting

11.1 Key Performance Indicators

11.1 Key Performance Indicators

  • Mean Time to Detection (MTTD): Average time to detect security incidents

  • Mean Time to Response (MTTR): Average time to respond to incidents

  • Vulnerability Metrics: Time to patch critical vulnerabilities

  • Security Training Completion: Percentage of staff completing training

  • Compliance Score: Overall compliance with security frameworks

11.2 Reporting

11.2 Reporting

  • Monthly Security Reports: Executive summary of security posture

  • Incident Reports: Detailed analysis of security incidents

  • Compliance Reports: Status of regulatory compliance

  • Customer Reports: Security status reports for enterprise customers

12. Contact Information

12. Contact Information

Security Team

Security Officer: Saurabh Srivastava

Email: security@actuals.co.in

Phone: +91 8073 879 031

Emergency: security-emergency@actuals.co.in

Security Assurance

This document represents our current security posture and is updated regularly to reflect improvements and changes to our security program. For the most current information or specific security questions, please contact our security team.

ACTUALS AI

ACTUALS AI

ALL RIGHTS RESERVED

© 2025 Actuals

Semantic that takes artificial intelligence closer to human intelligence

In-progress

ALL RIGHTS RESERVED

© 2025 Actuals

Semantic that takes artificial intelligence closer to human intelligence

In-progress

Semantic that takes artificial intelligence closer to human intelligence

In-progress

Product

Product Features

Architecture

Intelligence

Pricing

Integration

Recognition

Legal & Compliance

Terms & Conditions

Cookie Policy

Data Processing Agreement

Privacy Rights

Privacy Request Form

Do Not Sell My Info

Security Documentation

Manage Cookie Preferences

ALL RIGHTS RESERVED

© 2025 Actuals

Semantic that takes artificial intelligence closer to human intelligence

In-progress

Product

Product Features

Architecture

Intelligence

Pricing

Integration

Recognition

Legal & Compliance

Terms & Conditions

Cookie Policy

Data Processing Agreement

Privacy Rights

Privacy Request Form

Do Not Sell My Info

Security Documentation

Manage Cookie Preferences

ALL RIGHTS RESERVED

© 2025 Actuals

Semantic that takes artificial intelligence closer to human intelligence

In-progress

Product

Product Features

Architecture

Intelligence

Pricing

Integration

Recognition

Legal & Compliance

Terms & Conditions

Cookie Policy

Data Processing Agreement

Privacy Rights

Privacy Request Form

Do Not Sell My Info

Security Documentation

Manage Cookie Preferences

ALL RIGHTS RESERVED

© 2025 Actuals

Semantic that takes artificial intelligence closer to human intelligence

In-progress

Product

Product Features

Architecture

Intelligence

Pricing

Integration

Recognition

Legal & Compliance

Terms & Conditions

Cookie Policy

Data Processing Agreement

Privacy Rights

Privacy Request Form

Do Not Sell My Info

Security Documentation

Manage Cookie Preferences

ALL RIGHTS RESERVED

© 2025 Actuals