Security & Compliance
IronWifi is designed with security at its core. This page documents our compliance certifications (ISO 27001, SOC 2, GDPR), infrastructure security, data protection measures, and vulnerability management practices.
Compliance Certifications
ISO 27001
IronWifi maintains ISO 27001 certification, demonstrating our commitment to information security management.
GDPR
We comply with the General Data Protection Regulation for handling EU personal data. See our GDPR Compliance Statement.
Privacy Shield
We participate in the EU-US Privacy Shield Framework for transatlantic data transfers.
SOC 2
Our infrastructure and processes are designed to meet SOC 2 Type II standards.
Infrastructure Security
Cloud Infrastructure
- Hosted on Google Cloud Platform
- Multi-region availability
- Automatic failover and redundancy
- Regular backups
Network Security
- DDoS protection
- Web Application Firewall (WAF)
- Network segmentation
- Intrusion detection systems
Physical Security
- Data centers with 24/7 security
- Biometric access controls
- Video surveillance
- Environmental controls
Data Security
Encryption
- In Transit: TLS 1.2+ for all communications
- At Rest: AES-256 encryption for stored data
- RADIUS: Support for RadSec (RADIUS over TLS)
Access Control
- Role-based access control (RBAC)
- Multi-factor authentication available
- Principle of least privilege
- Regular access reviews
Data Handling
- Data minimization
- Purpose limitation
- Secure deletion procedures
- Audit logging
Application Security
Secure Development
- Secure coding practices
- Code review process
- Automated security testing
- Dependency scanning
Vulnerability Management
- Regular vulnerability scans
- Penetration testing
- Bug bounty program
- Rapid patching process
Authentication
- Strong password requirements
- Secure password storage (bcrypt)
- Session management
- Brute force protection
Operational Security
Monitoring
- 24/7 system monitoring
- Security event logging
- Anomaly detection
- Real-time alerting
Incident Response
- Documented incident response plan
- Trained response team
- Regular tabletop exercises
- Post-incident reviews
Business Continuity
- Disaster recovery plan
- Regular backup testing
- Geographic redundancy
- Defined RTO and RPO
Employee Security
Background Checks
- Pre-employment screening
- Regular re-verification
Training
- Security awareness training
- GDPR training
- Phishing simulations
- Role-specific training
Access Management
- Need-to-know access
- Regular access reviews
- Immediate revocation upon termination
Third-Party Security
Vendor Assessment
- Security questionnaires
- Due diligence process
- Contractual requirements
- Regular reviews
Sub-Processors
We carefully vet all sub-processors for security compliance.
Reporting Security Issues
Responsible Disclosure
If you discover a security vulnerability:
- Email: security@ironwifi.com
- Do not publicly disclose until resolved
- Provide detailed reproduction steps
Response
We will:
- Acknowledge within 24 hours
- Investigate promptly
- Keep you informed of progress
- Credit researchers (if desired)
Security Documentation
Available upon request:
- Security whitepaper
- Penetration test summaries
- Compliance certifications
- Data Processing Agreement
Contact security@ironwifi.com for security-related inquiries.