Dernière mise à jour
Politiques de cybersécurité à Cenareo
L'objectif de ces politiques de cybersécurité informatique est de piloter en interne et de mettre à jour nos normes, en garantissant la protection optimale de nos systèmes d'information, de nos données confidentielles et de notre propriété intellectuelle contre les accès non autorisés, les intrusions, les logiciels malveillants, les ransomwares et d'autres cybermenaces. Enfin, nous avons pris la décision d'accorder à nos clients l'accès aux politiques publiques de Cenareo. De plus, notre équipe s'engage à collaborer avec nos clients pour leur fournir des informations plus détaillées.
Risk Management
This policy outlines Cenareo’s approach to managing data security and cybersecurity risks, protecting our assets, and ensuring the confidentiality, integrity, and availability of customer's data throughout its lifecycle.
Access Management
This policy ensures that access to sensitive information and systems is granted based on the principle of least privilege and helps to mitigate the risk of unauthorized access.
Data Protection
This Data Protection Policy outlines the technical and organizational controls Cenareo implements to safeguard customers’ data entrusted to us.
Vulnerability Management
This policy outlines the formal procedures for vulnerability & patch management within Cenareo. It ensures timely identification, prioritization, and deployment of security patches for all applications and systems processing data.
Incident Management
This policy outlines our formal process for detecting, identifying, analyzing, responding to, and recovering from security incidents or crises.
Change and Release Management
This policy outlines the formal procedures for Change and Release Management within Cenareo. It ensures secure and controlled development, testing, deployment, and management of changes to our software applications, systems, and infrastructure.