Security Policy
This policy is effective as of 15th January 2023
1. Overview
At MOOST we take the protection of customer data extremely seriously. This MOOST Security Policy describes the organizational and technical measures MOOST implements platform wide designed to prevent unauthorized access, use, alteration or disclosure of customer data. The MOOST services operate on Amazon Web Services (“AWS”); this policy describes activities of MOOST within its instance on AWS unless otherwise specified.
2. Best Practices
2.1. Incident Response Plan
- We have implemented a formal procedure for security events and have educated all our staff on our policies.
- When security events are detected they are escalated to our security team.
- After a security event is fixed we write up a post-mortem analysis.
- MOOST will promptly notify you in writing upon verification of a security breach of the MOOST services that affects your data. Notification will describe the breach and the status of MOOST’s investigation.
2.2. Build Process Automation
- We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes.
- We typically deploy code dozens of times a day, so we have high confidence that we can get a security fix out quickly when required.
3. Infrastructure
- All of our services run in the cloud. MOOST does not run our own routers, load balancers, DNS servers, or physical servers.
- All of our services and data are hosted in AWS facilities and protected by AWS security, as described at http://aws.amazon.com/security/sharing-the-security-responsibility. MOOST services have been built with disaster recovery in mind.
- All of our infrastructure is spread across 3 AWS availability zones and will continue to work should any one of those zones fail unexpectedly. Amazon does not disclose the location of its data centers. As such, MOOST builds on the physical security and environmental controls provided by AWS. See http://aws.amazon.com/security for details of AWS security infrastructure.
- All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
- MOOST uses a backup solution for datastores that contain customer data.
4. Data
MOOST services and data are hosted in Amazon Web Services (AWS) facilities in Frankfurt (eu-central-1).
Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
Each MOOST system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
4.1. Data Transfer
- All data sent to or from MOOST is encrypted in transit using 256-bit encryption.
- We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
5. Authentication
- MOOST is served 100% over https. MOOST runs a zero-trust corporate network.
- There are no corporate resources or additional privileges from being on MOOST’s network.
5.1. Permissions and Admin Controls
- MOOST enables permission levels to be set for any employees with access to MOOST.
- Permissions and access can be set to include app settings, billing or user data.
6. Customer Responsibilities
- Managing your own user accounts and roles from within the MOOST services.
- Compliance with the terms of your services agreement with MOOST, including with respect to compliance with laws.
- Promptly notifying MOOST if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the MOOST services or your account.
- You may not perform any security penetration tests or security assessment activities without the express advance written consent of MOOST.