Technical Documentation
Ctrlk
WebsiteLinkedIn
  • Technical Documentation
  • Admin Guides
    • Epiphany Intelligence Platform Administrator Guide
    • Epiphany Validation Engine User's Guide
    • Data Usage Guide
    • Epiphany Security and Trust
      • Introduction
      • Program Details
      • Primary Risks
      • Our Responsibility to You
      • Your Responsibility to Yourself
      • Supplemental Information
      • Secure by Design
      • Conclusion
  • Use Cases
  • Epiphany Workflows
  • Site Collectors
  • Data Sources
  • Data Sources (Early Access)
  • Changelog
  • Legal Notice
Powered by GitBook
On this page
  • Table of Contents
  • Introduction
  • Program Details
  • Primary Risks
  • Our Responsibility to You
  • Your Responsibility to Yourself
  • Supplemental Information
  • Secure by Design
  • Conclusion
  1. Admin Guides

Epiphany Security and Trust

This document is for clients who are either intending to use, or are using Reveald’s Epiphany Intelligence Platform. Its purpose is to help you understand how we protect the data the platform accesses

Table of Contents

Introduction

Program Details

Primary Risks

Our Responsibility to You

Your Responsibility to Yourself

Supplemental Information

Secure by Design

Data Ingestion, Storage, and Privacy

Network Security and Server Hardening

Endpoint Security

Access Control Provisioning

Authentication

Password Management

System Monitoring, Logging, and Alerting

Data Retention and Disposal

Disaster Recovery and Business Continuity Plan

Responding to Security Incidents

Vendor Management

External Validation

Conclusion

PreviousData Privacy and SecurityNextIntroduction

Last updated 1 year ago