fabric enforces strong security measures across its platform. This topic outlines key fabric security practices.

Authentication and Access Control

Access to fabric systems is controlled and monitored.

  • Authentication: All users must authenticate through secure login procedures. Multi-factor authentication is supported where applicable.
  • Access Control: Role-based access control ensures users only have access to the data and actions that are relevant to their role. Permission can be scoped by:
    • Tenant: Restricts access to a specific customer or environment
    • Module: Restricts access to specific services or features.

Data Encryption and Storage

fabric protects customer data through robust encryption practices and secure infrastructure.

  • Data at Rest:

    • Encrypted using industry-standard algorithms such as AES-256.
    • Stored in secure cloud environments with restricted access controls.
    • Backups ensure data durability and support recovery.
  • Data in Transit:

    • Secured using HTTPS and TLS 1.2 or higher.
    • Applies to all external and internal service communications.
  • Ongoing Security Monitoring:

    • Continuous monitoring is in place to detect vulnerabilities in storage and infrastructure.
    • Infrastructure and services are reviewed to maintain compliance and security standards.

Tenant Isolation

fabric enforces strict separation between tenants to ensure data integrity and privacy.

  • Each tenant’s data is isolated at all levels of the platform.
  • Access controls are implemented programmatically and enforced across services.
  • Controls are reviewed to ensure consistent tenant separation.

Monitoring, Auditing, and Incident Response

fabric actively monitors its systems to maintain platform security and ensure rapid response to potential issues.

  • Monitoring and Alerts:

    • Continuous monitoring detects unauthorized access, anomalies, and system failures.
    • Real-time alerting systems notify teams of suspicious activity.
  • Auditing:

    • All access logs and system changes are recorded and auditable.
    • Logs are retained based on internal data retention policies.
  • Incident Response:

    • Defined procedures ensure rapid triage and remediation.
    • Relevant stakeholders are notified during incidents as part of the response process.

Secure Software Development

fabric integrates security into every stage of the software development lifecycle.

  • Code Reviews:

    • All code is reviewed for security vulnerabilities before deployment.
  • CI/CD Safeguards:

    • Continuous integration and deployment (CI/CD) pipelines enforce automated build-time checks and security gates.
  • Developer Training:

    • Developers receive ongoing training in secure coding practices and industry-standard security protocols.

Regulatory Readiness and Data Governance

fabric implements data protection and privacy controls aligned with industry standards.

  • Data Protection Principles:

    • Core practices such as encryption, access control, and secure storage are enforced across the platform.
  • Governance Policies:

    • Internal policies define how customer data is collected, accessed, retained, and deleted in accordance with applicable laws and regulations.
  • Transparency and Accountability:

    • fabric maintains clear processes for data handling and supports customer compliance with regional regulations, such as privacy and data residency requirements.

fabric enforces strong security measures across its platform. This topic outlines key fabric security practices.

Authentication and Access Control

Access to fabric systems is controlled and monitored.

  • Authentication: All users must authenticate through secure login procedures. Multi-factor authentication is supported where applicable.
  • Access Control: Role-based access control ensures users only have access to the data and actions that are relevant to their role. Permission can be scoped by:
    • Tenant: Restricts access to a specific customer or environment
    • Module: Restricts access to specific services or features.

Data Encryption and Storage

fabric protects customer data through robust encryption practices and secure infrastructure.

  • Data at Rest:

    • Encrypted using industry-standard algorithms such as AES-256.
    • Stored in secure cloud environments with restricted access controls.
    • Backups ensure data durability and support recovery.
  • Data in Transit:

    • Secured using HTTPS and TLS 1.2 or higher.
    • Applies to all external and internal service communications.
  • Ongoing Security Monitoring:

    • Continuous monitoring is in place to detect vulnerabilities in storage and infrastructure.
    • Infrastructure and services are reviewed to maintain compliance and security standards.

Tenant Isolation

fabric enforces strict separation between tenants to ensure data integrity and privacy.

  • Each tenant’s data is isolated at all levels of the platform.
  • Access controls are implemented programmatically and enforced across services.
  • Controls are reviewed to ensure consistent tenant separation.

Monitoring, Auditing, and Incident Response

fabric actively monitors its systems to maintain platform security and ensure rapid response to potential issues.

  • Monitoring and Alerts:

    • Continuous monitoring detects unauthorized access, anomalies, and system failures.
    • Real-time alerting systems notify teams of suspicious activity.
  • Auditing:

    • All access logs and system changes are recorded and auditable.
    • Logs are retained based on internal data retention policies.
  • Incident Response:

    • Defined procedures ensure rapid triage and remediation.
    • Relevant stakeholders are notified during incidents as part of the response process.

Secure Software Development

fabric integrates security into every stage of the software development lifecycle.

  • Code Reviews:

    • All code is reviewed for security vulnerabilities before deployment.
  • CI/CD Safeguards:

    • Continuous integration and deployment (CI/CD) pipelines enforce automated build-time checks and security gates.
  • Developer Training:

    • Developers receive ongoing training in secure coding practices and industry-standard security protocols.

Regulatory Readiness and Data Governance

fabric implements data protection and privacy controls aligned with industry standards.

  • Data Protection Principles:

    • Core practices such as encryption, access control, and secure storage are enforced across the platform.
  • Governance Policies:

    • Internal policies define how customer data is collected, accessed, retained, and deleted in accordance with applicable laws and regulations.
  • Transparency and Accountability:

    • fabric maintains clear processes for data handling and supports customer compliance with regional regulations, such as privacy and data residency requirements.