Security Practices
Designed to support SOC 2 and ISO 27001 programs across cloud, on-prem, or air-gapped deployments.
Last updated: 8/31/2025
Tenant Isolation
- Logical isolation at data and application layers
- Scoped service accounts and least-privilege access
Encryption
- In transit: TLS for client and service traffic
- At rest: provider or customer-managed encryption keys (where supported)
Identity & Access
- SSO via CrocLock or your IdP (SAML/OIDC)
- Role-based access; administrative actions auditable
Vulnerability & Patch Management
- Routine dependency updates and security patches
- Issue triage based on severity and exploitability
Customer Responsibilities
Customers manage configuration, user provisioning, and data retention. Security outcomes depend on customer environment and controls.
This page summarizes practices and is not a certification or legal commitment. For audit materials, see the Audit Pack Guide.