Follow

How is access to data controlled? | Threat Manager FAQ

All access to any production level system is strictly controlled and monitored by Alert Logic®. The use of firewalls and centralized jump boxes ensures that only those originating from designated locations can ever gain access. In other words, Alert Logic appliances only allow connections from Alert Logic IP address space. In addition, Alert Logic follows a stringent policy of “least privilege” and “need to know”. Only those resources specifically needing production level access to perform their duties is granted access, and the least level of privilege necessary is given.

For more information about Alert Logic practices for data security, refer to our How Alert Logic Secures & Protects Customer Data | Feature Education article.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.