Safe Space For Your Software Product Development

We treat information security and data protection as vital components of doing business. Whether you are our long-standing client or just getting to know us, *instinctools puts a premium on safeguarding your personal data and any project-related assets received from you. 

We embrace the core data privacy and software security regulations

Instinctools follows the requirements of:

  • ISO 2700 family to make sure your data is shielded with the highest level of care.
  • NIST 800 family to keep our software development framework in line with the benchmark security requirements for the SDLC.
  • GDPR to fortify our EU-based clients’ data privacy and security.
  • CCPA to assure the same level of data privacy and security for
    our US-based clients.

Our full-fledged InfoSec approach spreads across five dimensions 

Instinctools’ working model is designed to be secure, trustworthy, and resilient. From a streamlined software development process to robust infrastructure and unwavering focus on data and intellectual property protection, we’re setting the gold standard in safety. 

Secure software development lifecycle
Secure Infrastructure
Intellectual property protection
Personal data protection
Information security procedures

Secure infrastructure

We hold hybrid infrastructure in our offices and third-party data centers in the USA and EU to process European and US customer personal data intra-EU and intra-US, respectively.  

Physical
Network
Application
Data

While crafting robust software solutions for more than two decades, we’ve ruminated over our company’s InfoSec model and excelled in corporate security by combining: 

  • Clark–Wilson model to handle information integrity 
  • Harrison, Ruzzo, Ullman (HRU) model to deal with the integrity of access rights within the system
  • Brewer and Nash (Chinese wall) model to provide dynamically changing information security access control

Along with ensuring the safety of the networking systems, cloud and data center resources, we also take care of the hardware and software assets, such as staff devices. Even when our dedicated team members work off-site, they have to follow the company’s BYOD policies and stay within our protected infrastructure. 

  • Firewalls: WAF, NGFW, stateful inspection firewall, packet filtering firewall, etc.
  • Intrusion detection system (IDS)
  • Password auditing software
  • Penetration testing and network vulnerability analysis software
  • Security information and event management (SIEM)
  • Physical security and access control
  • Antivirus and antimalware solutions
  • Encryption software
  • Authentication solution such as Identity Access Management system

Secure SDLC

Our software development lifecycle is built according to the NIST 800 and zero trust approach, which imply clearly stated requirements for the software development process:

Secure coding practices and architecture requirements
Multi-layer quality assurance practices
Vulnerability reporting and response program
Only secure, restricted-access repositories with high-level security standards
Clear policies for third-party contracts to manage third-party risks
Ability to roll back to the previous development stage
A 100% version control process + 24/7 monitoring and logging on all stages of software development
Code obfuscation

By constantly following this proactive framework, our team creates a safe environment for developing your software products.

Personal data protection

Secure communication is table stakes from the moment you send us your first message.

information-security-img5

Secure communication is table stakes from the moment you send us your first message.

This goes alongside running regular internal audits of information systems, monitoring security events, and logging all actions on information assets. Not only do we operate software that aligns with GDPR and CCPA standards but we also adhere to local privacy laws that go beyond the well-known regulations.

  • Access control
  • Data carrier and mobile device control
  • Availability control
  • Data destruction
  • User activity control
  • Pseudonymisation and anonymisation
  • Input control
  • Data encryption
  • Segregation control
  • Transfer and dissemination control
  • Recoverability

Information security procedures (ISP)

Instinctools’ rules, expectations, and overall information security strategy are well-articulated, documented, and updated in our ISP guidelines following ISO 27001.

Identifying possible risks
100% systems, processes, and data inventory and assessment
Carefully documenting procedures
Train 100% of personnel on a regular basis

Intellectual property protection

When crafting our infrastructure, not only vetted solution architects made their input, but also vetted lawyers advised us on the intricacies of working with the clients’ intellectual property. With IPP policies in place, we can bet our reputation that your intellectual property is safe and sound within our infrastructure.

We run regular internal audits and security exams for employees

Instinctools conducts annual internal audits of IT systems, security documentation, and information assets in accordance with ISO 27001.

Annual internal audits

We have a comprehensive incident response plan (IRP) based on the ISO 27001 InfoSec incident management to tackle any security issues. If a security accident occurs, we perform an emergency audit to instantly spot the problem and mitigate its negative impact on the company’s infrastructure, business processes, and clients’ personal information. 

Furthermore, at *instinctools, comprehensive policies, procedures, guidelines, tech and operations best practices are supported by ongoing staff training. To minimize the probability of human error, we conduct security awareness training for new staff members. Moreover, each employee has to undergo annual security knowledge tests.

Going beyond basic infrastructure security: flawless physical perimeter

We provide a secure physical perimeter for your offshore development center upon request and offer:

Gated and secured buildings
Facility zoning with badge-only access to certain areas
24/7 video monitoring
Personalized access to software
Privacy screens or view guards on potentially confidential information
Door-opening and motion-detection sensors
No photography policy

Meet six vital components of our benchmark information security model

Treating security as our top-of-mind business priority led to development of our InfoSec framework. That’s how we see a robust security model. 

Confidentiality

Our internal infrastructure is designed as a secure closed network with strict access rules and is only available for authorized users.

Non-repudiation

Every single action within our internal infrastructure is logged and tracked. Our security team members can always check who-s, when-s, and where-s of the changes.  

Accountability

Every member of our team who interacts with the clients’ proprietary data is automatically a responsible person for the security of these assets within the overall information security strategy.

Authenticity

No one can access *instinctools’ infrastructure without passing through an identity check. Our employees can only log into the internal systems with the credentials from the reliable corporate systems.

Integrity

To ensure the integrity and reliability of the information, we implement stringent measures against both intentional and inadvertent alterations to system and personal data. At *instinctools, confidential and personal information is stored in the cloud within a secure environment managed by our dedicated administrators. Only staff with high-level rights can modify security settings, and this is always under strict conditions of authorized access, with every action rigorously logged.

Availability

We prepare backup and data recovery plans for every system and all devices within our company’s network where personal data is processed. Furthermore, our team has an uninterruptible power supply (UPS) and high-availability internet connection with automatic failover at all relevant locations to continuously deliver robust software development services, even if the main system goes down. 

Safe data transfer is a given when partnering with *instinctools

Beyond the explicit details of the ISO 2700 and NIST 800 guidelines lies a gray area of nuanced concerns, such as responsibility for data security when data is transferred between our and your infrastructures. With *instinctools by your side, those subtleties are meticulously addressed.

We highlight all the shadow areas to avoid misunderstandings and shortcomings and capture clear agreements on shared responsibility for secure data transfer in the contract.

If your project requires data transfer from the EU zone to the US or vice versa, we provide a secure transfer shield, where we guarantee that your personal information won’t be leaked or stolen.

Industries we serve

Ecommerce
Fintech
Technology
Healthcare
Automotive
Manufacturing
Education
Cryptocurrencies
Ad-Tech
Entertainment
and Media
Energy
Logistics
Anna Vasilevskaya
Anna Vasilevskaya Account Executive

Get in touch

Drop us a line about your project at contact@instinctools.com or via the contact form below, and we will contact you soon.