Introduction
Here at Positive we are passionate about how we improve leaders’ resilience, adaptability, performance and in turn transform your workforce culture.
With this responsibility we understand that our clients and users trust us with some of their most valuable information. As such, we take information security very seriously and have implemented measures to ensure the confidentiality, integrity, and availability of the data entrusted to us. Our commitment to information security is reflected in our ISO27001 certification, which we obtained after undergoing rigorous independent audits.
Our Teams
Our platform and app
At Positive, we understand that information security is an ongoing process, and we are committed to continuously improving our security measures. We regularly review our security policies and procedures to ensure that we are providing the highest level of protection to our clients' data.
Our online platform, which is used as part of the services we provide, is designed with security in mind. We host our platform using Amazon Web Services (AWS), a best in class secure infrastructure. See here for more information.
Here are some of the other key measures we have taken to protect your data.
Security features
Hosting providers and network
- Positives network architecture is built according to AWS best practices
- Positive uses the Cloudfront CDN to prevent DDoS attacks and brute-force attacks.
- A Web Application Firewall (WAF) is in place for content-based dynamic attack blocking.
- Firewalls are used throughout the network to enforce IP whitelisting and access
Systems development
Our secure engineering lifecycle includes using regularly updated off the shelf applications and frameworks, building security into requirements with secure coding principles.
For each component of our systems, we consider the specific requirements for full functionality, and limit data and resource access to that least privilege access level, including processes, software, and users. In addition to this, components may only be used from trusted sources and authors.
We maintain that any default configuration should reflect a restrictive enforcement of security policy so that it is secure out of the the box. Wherever communication is required between system components, this is appropriately secured e.g., TLS.
- Least privilege access
- Trusted components
- Trusted communications channels
- Accountability
- Traceability
- Secure defaults
Data safety
Encryption and backup of data
All communications are encrypted with the latest transport layer security (TLS 1.3) whilst data is encrypted at rest using AES 256-bit encryption by default.
Whitelisting, domain and country
We back up customers' data submitted to the our online service and use AWS facilities to incrementally manage snapshots of our database at regular intervals.
Authentication
We enforce password strength of 8 characters minimum with no repeating or consecutive characters allowed. Passwords are rotated every 2 months.
Logs
All applications and components of our service have the required administration and event logging enabled.
Threat detection and anti-malware
Our service is protected by AWS Guard Duty, this continuously monitors our system for malicious activity and delivers detailed security findings for visibility and remediation.
Audits
We engage with an independent auditor on an annual basis to review our network configuration and carry out penetration tests.
We hold an ISO 27001 certification and are therefore also subject to an annual audit which is conducted by BSI.