Security Practices

At FormAssembly, we’re dedicated to following security best practices both for our customers and our organization. Read on to learn about how we keep your account and data safe with different security policies and features, like our incident response policy, web application firewall, and intrusion detection system.

Personnel Security

All FormAssembly employees undergo background checks and privacy and security training. FormAssembly also maintains a comprehensive and regularly updated information security policy that covers a wide range of best practices for secure workplace procedures.

Incident Response Policy

FormAssembly has an established incident response policy and procedures that activate upon a security breach. In the event of an incident, a member of our team will notify you immediately of any unauthorized access to your data.

Disaster Recovery

FormAssembly maintains a disaster recovery plan with redundancy built across our network in the event of a major disaster.

Logging Practices

FormAssembly maintains a centralized logging environment where logs are reviewed daily.

Integrated security products also feed logs into this centralized environment. Log analysis of information collected from critical systems and services provides important insight that helps us ensure we maintain confidentiality, availability, and integrity of all data.

Web Application Firewall

Network firewalls across our environment are configured with deny-by-default policies. FormAssembly also maintains a web application firewall to protect your data against common web attacks.

Intrusion Detection System

FormAssembly utilizes an Intrusion Detection System that monitors our network and alerts upon any unauthorized access attempts. Logs from that system are reviewed regularly, along with other system, authentication, and security logs.

More Resources

Your security is of utmost importance to us.
Questions? Concerns?

Pin It on Pinterest