Information Security
This Security Statement is aimed at providing you with more information about our security position and practices.
Information Security Policy
Makaye InfoSec maintains a written Information Security policy that defines employee’s responsibilities and acceptable use of information system resources. This policy is periodically reviewed and updated as necessary.
Organizational Security
Makaye InfoSec follows the NIST Cybersecurity Framework with layered security controls to help identify, prevent, detect, and respond to security incidents. We track incidents, vulnerability assessments, threat mitigation, and risk management.
Personnel Security
Makaye InfoSec employees are required to conduct themselves in a manner consistent with the company’s guidelines. All newly hired employees are required to sign confidentiality agreements and to acknowledge the Makaye InfoSec code of conduct policy.
Physical & Environmental Security
Makaye InfoSec outsources it’s data center operations to a Tier 1 provider with policies, procedures, and infrastructure that handle both physical security of its data centers as well as the environment from which the data centers operate.
Change Management
Makaye InfoSec maintains a change management process to ensure that all changes made to the production environment are applied in a deliberate manner.
Auditing and Logging
We audit logs on systems. These logs provide an account of which personnel have accessed which systems. Access to our auditing and logging tool is controlled by limiting access to authorized individuals.
Antivirus and Malware Protection
Antivirus and malicious code protection are centrally managed and configured to retrieve the updated signatures and definitions available.
System Backups
Makaye InfoSec has backup standards and guidelines and associated procedures for performing backup and restoration of data in a scheduled and timely manner.
Network Security
Our infrastructure servers reside behind firewalls and are monitored for the detection and prevention of various network security threats.
Vulnerability Management
Ongoing vulnerability scans are done to identify vulnerabilities and to determine the effectiveness of the patch management program. Each vulnerability is reviewed to determine if it is applicable, ranked based on risk, and assigned to the appropriate team for remediation.
Incident Management
Makaye InfoSec has a formalized incident response plan (Incident Response Plan) and associated procedures in case of an information security incident.
Data Protection
Makaye InfoSec takes all reasonable steps to protect information we receive from our users from loss, misuse or unauthorized access, disclosure, alteration and/or destruction.
Business Continuity and Disaster Recovery
To minimize service interruption due to hardware failure, natural disaster, or other catastrophe, we implement a backup and disaster recovery program to protect critical systems.