Security Policy
Security Policy
This document outlines the security measures and practices Aglide follows to protect sensitive data. For specific details on how Aglide secures your data, please refer to the Security Page.
Effective 27th August 2024
This Security Policy is written to be incorporated into a separate written agreement between Aglide and Customer. References this document (the “Agreement”) and any terms used but not defined herein shall have the meaning set forth in the Agreement. In the event of any conflict between the terms of the Agreement and this Policy, this Policy shall govern.

Aglide regularly tests and evaluates its Security Program, and may review and update this Policy as a result. Such updates shall be designed to enhance Aglide's Services or Security Program.
1. Aglide's infrastructure and service delivery
Aglide employs a robust security architecture that combines local data processing on the end-users device with server-side encryption, all within a zero-trust model. This approach ensures that sensitive data is protected at all times, with encryption occurring both locally on the user’s device and on Aglide’s cloud infrastructure ("Cloud Environment") hosted on Amazon Web Services (“AWS”), which includes a NodeJS server and Postgres database.
  • Local Data Processing: Operations that involve interaction with an end-user's account (e.g., Sign In, Provisioning, Privilege Control, etc.), are executed directly on the end-user's device.
  • Zero Trust Encryption: Aglide uses a Zero Trust encryption model to ensure sensitive Customer Data is secure. This means that even on Aglide’s servers, data is encrypted in such a way that only authorised end-users can decrypt it.
  • Local & Cloud Environments: Depending on the specific type of data, encryption occurs either within the Cloud Environment or on the end-user's device. The zero-trust model ensures that even when data is processed or stored on the Cloud Environment, it remains inaccessible to unauthorised parties, including Aglide itself.
For more detailed information on how Aglide secures Customer Data, please refer to the Security Page.
2. Hosting Location of Customer Data
The hosting location of Customer Data is the production Cloud Environment in the Republic of Ireland, or such other region mutually agreed to by Customer and Aglide, including as identified on the Order Form.
3. Encryption
Aglide employs robust encryption standards to protect Customer Data both at-rest and in-transit. Customer Data within the Service is encrypted at-rest using AES 256-bit encryption, ensuring that data stored on Aglide’s infrastructure remains secure. For data in-transit over untrusted networks, Aglide uses Transport Layer Security (TLS) 1.2 (or better) to protect Customer Data.

Aglide’s zero-trust model ensures that sensitive data is encrypted in such a way that only the end-user can decrypt it. Encryption keys are never stored in plaintext on Aglide’s servers. Depending on the specific data and operation, encryption may occur either locally on the end-user’s device or in the Cloud Environment.

For clarity, Aglide has no control over the encryption policies established by third-party services or applications that may integrate with Aglide, and has no liability in connection therewith. Aglide logically separates encryption keys from Customer Data, maintaining a clear distinction between data storage and key management to enhance security.

For more detailed information on Aglide’s encryption practices and security measures, please refer to the Security Page.
4. System and network security

a. Application

  • Source Code: Only approved employees have access to Aglide's repositories, and they all must have multi factor authentication enabled. Deployment is safeguarded by a mandatory pull request (PR) procedure, requiring all code changes to undergo peer review.

b. Environment Access

  • Access Controls: Access to Customer Data is limited to approved employees, authenticated into their corporate Aglide account, with a unique key. Access to the Cloud Environment is restricted to a limited number of Aglide employees, and is controlled by AWS IAM policies. Aglide's Zero Trust architecture ensures that even approved Aglide employees cannot access sensitive Customer Data.
  • Environment Isolation: Customer Data is never stored in non-production environments. Customer accounts are logically separated in Aglide's production environment. Aglide has separate development, staging and production environments.

c. Monitoring & Logging

  • Network Monitoring: Systems and alarms are setup to monitor the performance and key metrics for Aglide's servers, database, and other network components. These alert when services are acting irregularly to help identify issues or attacks.
  • Error Logging: Aglide captures logs of certain activities and changes to detect malicious activity and errors. Logs are only accessible to necessary Aglide employees and care is taken to ensure that sensitive data is not logged.
  • User Logging: Data about end-users interacting with the Aglide Services is collected to improve performance. Logs are only accessible to necessary Aglide employees and care is taken to ensure sensitive, session-specific data is not captured.

d. Vulnerability Detection

  • Vulnerability Scans: Vulnerability scanning and package monitoring are performed on all Aglide infrastructure, with services being patched on a regular basis.
  • Penetration Testing: Aglide will conduct regular penetration tests to identify and address potential vulnerabilities in its infrastructure. These tests will be conducted by third-party security experts and are designed to simulate real-world attacks.
5. Administrative Controls

a. Training & Legal

  • Employee Training: Aglide maintains a mandatory security awareness and training program for its employees.
  • Confidentiality: All Aglide employees sign non-disclosure and confidentiality agreements.
  • Responsibility: Employees are required to sign Aglide's information security policy, which includes acknowledging responsibility for reporting security incidents involving Customer Data.

b. Privilege & Access

  • Access Reviews: Aglide internally leverages the principle of Least Privilege for access. Regular access reviews are conducted to ensure that continued access to critical systems is still required.
  • Access Controls: Employees can only access Aglide systems through Single Sign On or using credentials stored in a password manager, with Multi-Factor Authentication enforced where possible. Employees must use high entropy passwords and 2-factor authentication to access Single Sign On applications or the password manager.

c. Physical Security

  • Aglide Premises: Equipment capable of accessing Aglide services is only available in Aglide's office, which is secured with a keycard system.
  • Data Centres: Aglide defers all data center physical security controls to AWS. Details of AWS’s physical security controls can be found on their website.
6. Incident Detection & Response

Reporting:

If Aglide becomes aware of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Customer Data (a "Security Incident"), Aglide shall notify Customer without undue delay, and in any case, where feasible, notify Customer within 72 hours after becoming aware.

Investigation:

In the event of a Security Incident as described above, Aglide shall promptly take reasonable steps to contain, investigate, and mitigate any Security Incident. Any logs determined to be relevant to a Security Incident shall be preserved for at least one year.

Communication:

Aglide shall provide Customer timely information about the Security Incident to the extent known to Aglide, including, but not limited to, the nature and consequences of the Security Incident, the measures taken and/or proposed by Aglide to mitigate or contain the Security Incident, the status of Aglide's investigation, a contact point from which additional information may be obtained, and the categories and approximate number of data records concerned. Notwithstanding the foregoing, Customer acknowledges that because Aglide personnel do not have visibility to the content of Customer Data, it will be unlikely that Aglide can provide information as to the particular nature of the Customer Data, or where applicable, the identities, number, or categories of affected data subjects. Communications by or on behalf of Aglide with Customer in connection with a Security Incident shall not be construed as an acknowledgment by Aglide of any fault or liability with respect to the Security Incident.

7. Customer Responsibilities
The Customer takes responsibility for managing and protecting its end-user roles and credentials, including but not limited to (i) requiring that all end-users keep credentials confidential, (ii) reporting to Aglide any suspicious activity or if a user credential has been compromised, (iii) appropriately configuring end-user and role-based access controls, taking into account the nature of its Customer Data, and (iv) maintaining appropriate password entropy.

The Customer will ensure end-users promptly update client software (Aglide Desktop, Aglide Extension).

The Customer agrees that Aglide is not obligated to assess Customer Data for the purposes of identifying compliance with legal, regulatory, or other requirements, and the Customer is responsible for making appropriate use of the Service to ensure a level of security appropriate to the particular content of Customer Data.

The Customer will appropriately manage and protect any Customer-managed encryption keys, including but not limited to administrative recovery keys, to ensure the integrity, availability, and confidentiality of the key and Customer Data encrypted with such key.