Overview
Pricemaster has been designed with security, performance, and data
integrity at its core. This document outlines the technical and security measures implemented to ensure the
confidentiality, integrity, and availability of customer data, as well as the shared responsibilities
between us (the application provider) and the underlying server infrastructure provider.
Server Security
Pricemaster is hosted on secure, enterprise-grade
cloud servers that follow a shared responsibility security
model. This means that while the server provider is responsible for securing the
underlying infrastructure, we maintain responsibility for securing the application stack, access controls,
and customer data.
Server-Side Security Responsibilities
Physical & Environmental Security
- Secure data centers with 24/7 surveillance and access
control.
- Environmental safeguards including fire detection, water leakage
monitoring, and HVAC systems.
- Disaster recovery and failover capabilities across multiple
regions.
Network & Infrastructure Security
- Built-in DDoS protection to mitigate common attack vectors.
- Hardware and software firewalls to guard internal systems.
- Intrusion Detection & Prevention Systems (IDPS) on network
edges.
Disk Encryption
- All storage volumes are encrypted at rest using strong encryption algorithms.
- Snapshots and backups are also encrypted.
Compliance & Certifications
- Data centers are compliant with PCI DSS,
SOC 2, and ISO 27001 standards.
- Regular audits are conducted to maintain certification
status.
Application Security Testing (Server Tools)
- Regular vulnerability assessments on server management tools.
- Penetration testing conducted by the server provider’s
security team.
Client-Side Responsibilities
Application Security
- Our development team follows OWASP
guidelines for secure coding practices.
- We implement regular patching of application libraries and core components.
- Use of input validation and output sanitization to prevent injection
attacks.
Access Control
- Customer administrators manage user roles and permissions.
- Access to backend servers is secured using SSH
keys or strong passwords only.
- All sessions are secured via HTTPS using TLS 1.3.
Network Security
- Configurable IP whitelisting and
application-level firewalls.
- Rate-limiting and bot protection mechanisms are in place.
Monitoring & Auditing
- Logs are monitored for suspicious behavior and retained for audit
purposes.
- Real-time monitoring and alerting for login anomalies or potential
intrusions.
Application Data Security
We take extensive measures to protect sensitive customer data both in transit and at
rest.
Database & Field-Level Encryption
- MySQL Encryption is used to secure the
database at the storage level.
- Sensitive data fields (e.g., cost prices, sales figures, stock levels) are
encrypted using a hybrid encryption model:
- Asymmetric Encryption (RSA) for key
exchanges.
- Symmetric Encryption (AES-256) for
efficient data handling.
- These fields are encrypted with keys derived from the user's password hash, which is stored using BCRYPT for maximum protection.
Data Visibility Controls
- Internal staff (including support and development teams) cannot access sensitive fields such as cost prices and sales
figures.
- Access to business-critical data is restricted and logged, with all
encryption keys handled securely.
Authentication & Account Security
- Two-Factor Authentication (2FA) is available for
all accounts. The default method is email-based verification, with optional support for authenticator apps (upon request).
- Brute-force protections and rate limits are in place on login
endpoints.
- All passwords are stored using BCRYPT
hashing with a configurable work factor to adapt to current CPU
capabilities.
Compliance, Backups & Uptime
- Daily encrypted backups with
multi-region redundancy.
- 99.9% uptime SLA supported by server
provider infrastructure and our own monitoring.
- GDPR-compliant data processing and retention policies.
Ongoing Improvements
We continually invest in improving our application’s security posture
through:
- Routine penetration testing by third-party firms.
- Code audits and automated dependency vulnerability scans.
- A public Responsible Disclosure Policy to encourage ethical hacking practices.
Contact & Support
If you have specific security concerns or require additional information regarding
compliance, data handling, or penetration test reports, please contact our support or security team:
[email protected]