Security Controls Overview

This document summarizes BRidge’s security architecture and controls. It complements the EULA, Privacy Policy, Terms, and DPA.

Scope: Production application/API, admin portals, storage, logging/observability, and supporting infrastructure. Customer-enabled integrations (e.g., webhooks) are in shared-responsibility scope.

1. Architecture & Tenant Isolation

2. Encryption & Key Management

3. Authentication, Authorization & Session Security

4. API Security

5. Secure-by-Default HTTP Headers

6. Logging, Monitoring & Audit

7. Vulnerability & Patch Management

8. Data Classification & Retention

9. Business Continuity & Disaster Recovery

10. Incident Response

11. Change Management & SDLC

12. Secrets & Configuration

13. Vendor & Subprocessor Management

14. Framework Mapping (Illustrative)

Control AreaBRidge PracticeISO 27001 Annex ASOC 2 Trust / CC
Access ControlRBAC, least-privilege, session hardeningA.5, A.9CC6.x
CryptographyTLS 1.2+, KMS/HSM, at-rest encryptionA.10CC6.7
Operations SecurityLogging, monitoring, patching, backupsA.12CC7.x
Supplier RelationshipsSubprocessor due diligence & contractsA.15CC9.2
Incident ManagementIR runbooks, PIR, breach noticesA.16CC7.4
Business ContinuityRTO/RPO targets, restore testingA.17CC7.3
Development SecuritySDLC controls, code review, CI checksA.14CC8.x

15. Shared Responsibility Model

AreaAtlasCustomer
Application & platform securityDesign, patching, monitoringTenant configuration, role hygiene
Data protectionEncryption, backups, retentionData accuracy; export/erasure requests
Integrations & webhooksSecure endpoints, signingSecure receivers, secret rotation
User accessRBAC framework, auth controlsProvisioning, offboarding, MFA/SSO

16. Coordinated Vulnerability Disclosure

If you believe you’ve found a security issue, email info@atlasipholdingsllc.com. Do not perform denial-of-service or access data you don’t own. Good-faith reports that follow our AUP will be reviewed promptly.