As a payments infrastructure company, our security continually evolves to meet the rigorous standards of the global financial industry. Fipto has implemented multiple controls to maintain the highest level of security.
Product Security
7 Controls
Secure Software Development Lifecycle established
Penetration Testing conducted
Change Management procedures enforced
Vulnerability scanning procedures established
Secure product architecture defined
Production environment segregation enforced
Intrusion Detection systems utilised
Access Management
9 Controls
Role Based Access Control (RBAC) established
Multi Factor Authentication implemented
User Access Reviews conducted
Password policy enforced
Restricted production access maintained
Privilege access restricted
Access control policies and procedures defined
Production database access restricted
Access request and approval process defined
Security and Continuity Procedures
7 Controls
Business Continuity and Disaster Recovery plans established
Continuity and Disaster Recovery plans tested
Incident Response plan tested
Data backups and restoration procedures tested
Production multi-availability zones utilised
Production monitoring implemented
Audit logging established
Data Security
4 Controls
Encryption at rest implemented
Encryption in transit implemented
Encryption key management process established
Network and firewall access restricted
Organisation Security
9 Controls
Risk Assessment and treatment established
Vendor Risk Management established
Asset Management maintained
Security Awareness Training implemented
Secure Development LifeCycle (SDLC) Training implemented
Defined roles and responsibilities established
Service Level Agreement established
Candidates screening checks
Confidentiality agreement acknowledged by employees