Table of Contents |
---|
Security Tasks
...
Initial Setup Tasks
When you subscribe to Taskmonk, we send you separate emails containing the credentials required to log into your account. This is a Super-Administrator login. Once you log into your instance, you must perform the following tasks to get started:
Change your password
Create Administrator Users. See Creating Users.
Manage Roles. See Managing Roles in Taskmonk.
Security in Taskmonk
Role-Based Access Control
Taskmonk enables you to allow access to granular data and functions based on the role assigned to a user.
Your organization's data governance standards can easily be mapped onto Taskmonk.
Privacy
Taskmonk has no in-built tracking.
We do not use cookies or any other fingerprinting technology.
Serverless Authentication: All our key management is done through Google Firebase, ensuring that Taskmonk never has access to your passwords.
Data Security
By default, users are denied access to all data and functions.
With Taskmonk, your data stays where you want it to be. Taskmonk can render data directly onto on to the platform from your database, without it ever reaching Taskmonk’s servers.
If you choose to host your data with us, we ensure that all our data centres centers are SOC 2, ISO 27001, and HITRUST compliant.
Secure and Scalable Infrastructure
All our data is stored in physically secure Microsoft Azure facilities that include 24X7 on-site onsite security, camera surveillance, and more. For more information see Azure security documentation.
All our databases operate in a cluster configuration ensuring data redundancy and resilience.
Taskmonk’s application tier scales using uses load balancing technology , allowing us to meet variable demand without any hiccups.
All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests from getting to our internal network.
Security Compliance
SOC 2, Type 1: Taskmonk’s SOC 2 Type I report covers the trust services categories of
Security, Confidentiality, and Availability, and is audited annually.All our data centres centers are SOC 2, ISO 27001 and HITRUST compliant.
Additional Security Measures
Training: All employees of Taskmonk undergo a mandatory annual Security and Awareness training
annually.Policies: Taskmonk has developed a comprehensive set of security policies covering a range of
topics that are shared with all employees.Employee Vetting: Taskmonk performs background (employment and criminal) checks on all new employees in accordance with local laws.
Confidentiality: All employee contracts include a confidentiality agreement.