Picture of What Are The Data & Security Protection Protocols at Infigo?

What Are The Data & Security Protection Protocols at Infigo?

Overview

At Infigo, security, reliability, and data protection are core to how we design, build, and operate our platform. We follow industry best practices and continuously invest in safeguarding our customers’ data through secure infrastructure, strong organizational controls, and modern encryption standards.

 

Hosting & Infrastructure

Cloud Platform

Infigo is hosted exclusively on Amazon Web Services (AWS), a leading cloud provider with internationally recognized security certifications, including:

    • ISO/IEC 27001:2013, 27017, 27018, 27701
    • SOC 1/2/3
    • CSA STAR certification

Regional Hosting

    • Platforms for the Americas are hosted in North Virginia (USA)
    • Other platforms are hosted in London (United Kingdom)
    • Each environment is isolated, monitored, and protected using AWS native security controls and industry-standard best practices

Data Security & Encryption

We use multiple layers of encryption and access control to safeguard customer data:

Data in Transit

All traffic to and from the platform is encrypted using TLS (Transport Layer Security) 1.2 or higher

Data at Rest

    • Databases, file storage, and backups are encrypted using industry-standard AES-256 encryption
    • File and media storage is encrypted and protected through secure AWS services

Access Controls

    • Access to systems and data is restricted through strict role-based access controls
    • Multi-factor authentication (MFA) is required for administrative access

Backups, Continuity & Resilience

To ensure data durability and service continuity:

    • Regular encrypted backups are performed in line with our Terms and Conditions
    • AWS cloud infrastructure provides built-in redundancy, environmental protections, and multiple layers of physical and network security
    • Monitoring and alerting systems are in place to detect and respond to unusual activity or performance issues

 

Data Ownership & Data Requests

Ownership

    • Customers always retain ownership of the data uploaded to their Infigo platform
    • Infigo’s intellectual property, codebase, and platform assets remain the property of Infigo

Data Deletion

    • Customer data can be permanently deleted upon request
    • Once data has been deleted, it cannot be recovered
    • Some limited transactional metadata (such as order information and IP addresses) may be retained as required for audit, legal, or operational purposes

Passwords & Account Security

We protect user credentials using:

    • Salted and hashed passwords stored using secure cryptographic methods to protect against rainbow table attacks
    • Configurable password policy options per customer platform
    • Enforcement of modern authentication and session management practices

GDPR & Data Protection Compliance

Infigo is fully committed to data protection and privacy and operates in compliance with:

    • GDPR (General Data Protection Regulation)
    • UK Data Protection Act
    • Customer Data Processing Agreements as applicable
    • We maintain appropriate technical and organizational measures to support GDPR-compliant processing and international data transfers

Secure Development & Coding Standards

Our engineering practices follow modern secure-coding principles:

    • All SQL (Structured Query Language) queries are parameterized to prevent injection attacks
    • User input is sanitized and validated
    • User-generated content is sanitized and escaped when displayed
    • Source control, peer review, automated testing, and secure CI/CD (Continuous Integration/Continuous Deployment) workflows
    • Independent development, QA (Quality Assurance), and pre-production environments

 

Change Management & Vulnerability Management

Change Control

    • Changes are managed through Infrastructure as Code (IaC) and Configuration as Code (CaC) principles
    • Changes are developed on independent feature branches
    • Testing and approval are applied before merging branches into main branches
    • Once a release candidate is signed off, a deployment slot is assigned

Security Monitoring

    • Continuous monitoring is in place for system events and security indicators (internal and external)
    • Regular vulnerability scans are conducted
    • Identified issues are remediated according to our internal SLAs (Service Level Agreements)
    • Updates and patches follow controlled release and approval processes

Penetration Testing

    • Infigo undergoes regular independent penetration testing and security assessments
    • Customers may perform their own penetration testing at their own cost and with prior written approval from Infigo

Use of Data for Support & Troubleshooting

We primarily use synthetic test data for development and investigation purposes. If access to real customer data is ever required to diagnose a production issue outside the production environment, this will only be done with:

    • Prior written approval from the customer
    • Data minimization and obfuscation applied wherever possible
    • Any temporary copies used for troubleshooting are securely deleted upon completion, and written confirmation of deletion is provided

 

Disaster Recovery

Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events. Having a disaster recovery strategy in place enables Infigo to maintain or quickly resume mission-critical functions following a disruption.

Our internal Disaster Recovery document is an exhaustive plan that contains all the critical information required for us as a business to carry out Disaster Recovery strategy. Although we are not willing to share this, we have created a high level external version that you can download from this article.

Please click here to see our full Disaster Recovery breakdown

 

ISO 27001

As a business Infigo Software is not ISO 27001 accredited, however our entire development, pre-production and production environments are built and hosted in Amazon Web Services which itself is ISO/IEC 27001:2013 compliant.

This widely-recognized international security standard specifies that AWS do the following:

  • Systematically evaluate information security risks, taking into account the impact of threats and vulnerabilities.
  • Design and implement a comprehensive suite of information security controls and other forms of risk management to address customer and architecture security risks.
  • Have an overarching management process to ensure that the information security controls meet their needs on an ongoing basis.

If you wish to obtain a copy of the AWS ISO accreditation certificate you can download it HERE

 

Cookie Information

Infigo uses by default only technical cookies. No tracking cookies will be set unless features are enabled in admin - most tracking code has to be pasted in explicitely.

The following cookies are used by the platform for end users

Name Purpose Expiry
AWSALB Server affinity cookie. Due to the load balanced web farm, this cookie will ensure subsequent requests are handled by the same server. 1 week
AWSALBCORS Server affinity cookie. Due to the load balanced web farm, this cookie will ensure subsequent requests are handled by the same server. 1 week
[PlatformName].AUTH Authentication cookie for a logged in user. This will be used to authenticate the requests. 10 hours
CFTDC Session cookie to identify the currently running server session. session
INF.CUST Unique customer identifier. When no authentication cookie is available, this will uniquely identify guest sessions 1 year
__RequestVerificationToken Used as anti forgery token session

 

In addition, we have a few admin only cookies

Name Purpose
collapsedSidebar Frontend cookie to handle the state of the admin sidebar
CF_SelectedStorefront Used for platform admins to switch accounts

 

Optional cookies - active only when the feature is enabled and used

Name Purpose
cas_gateway_status Cookie name for the CAS SSO implementation. Can be adjusted in the CAS configuration.
_samlIdp Cookie name for the SAML2 SSO implementation.
SAML2Session

Cookie name for the SAML2 SSO implementation

OAuthToken Used by the Flickr Image plugin to maintain the authentication. Only set when this feature is used.
INF.CompareProducts Cookie used for product comparison feature. Only set when this feature is enabled.
INF.RecentlyViewedProducts Cookie used to control the recently viewed product feature. Only set when this feature is enabled.
TDUID_TEMP Google Pixel Cookie
 
 

Security Policy

Infigo is operating an internal network at the offices, uses external cloud based services and hosts its own solution via external cloud services (AWS).

This document outlines the different areas and indicates security risks, policies and procedures in place to mitigate them.

Efforts are done based on security best practices and loosely based on the CLASP (Comprehensive, Lightweight Application Security Process) system - where we implement various of the proposed activities.

Security Levels:

Critical

Vulnerabilities that score in the critical range have most of the following characteristics:

  • Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices
  • Exploitation is usually straightforward, in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user via social engineering to perform any special functions

High

Vulnerabilities that score in the high range usually have some of the following characteristics:

  • Difficult to exploit
  • Exploitation could result in elevated privileges
  • Exploitation could result in a significant data loss or downtime

Medium

Vulnerabilities that score in the medium range have some of the following:

  • Attacker is required to manipulate individual victims via social engineering tactics
  • DNS
  • Exploits that require an attacker to reside on the same local network as the victim
  • Exploitation provides only limited access
  • Vulnerabilities that require user privileges for successful exploitation

Low

The low range typically has very little impact on a business. Exploitation of such usually requires local/physical access.

 

Offices and on-premise architecture

Building Security

Access to the offices are protected via key card and an alarm system, protecting physical access to computer hardware for authorized employees only.

Employees are not allowed to share or exchange the key cards and are responsible for the cards they have been assigned. If the card has been lost or stolen, then the employee must contact management immediately.

Employees are not allowed to bring unattended guests into the building.

 

Intranet and physical computer hardware

The machines are managed and maintained by our third party supplier Matmos which is responsible for:

  • Patching and repairing the machines
  • Keeping a centralized anti-virus software installed and monitored
  • Having the internal intranet firewall and router running and patched
  • Maintain ActiveDirectory access
    • User Accounts are created with a need to know base
    • Enforcing Infigo’s Password policy
  • Maintain and secure the VPN connection
  • Maintain the Company Wifi Network
    • Protected with WPA2
  • Security scan and audits on the network
  • Automatically lock the screen after a short period of time of inactivity
  • Email
  • Backups

 

User Policies

  • Clean desk policy - not leaking confidential information and passwords physically
  • Lock computer when leaving the desk
  • Handle password and sensitive information confidentiality

 

Cloud based services

  • Jira
  • Confluence
  • Bitbucket
  • Hubspot
  • Dropbox
  • Zoom
  • Slack
  • Xero
  • Smartsheets
  • CharlieHR
  • Zendesk
  • StatusCake

Where user accounts are created with a need to know base and access level permissions are utilized to protect sensitive and critical data from being exposed.

 

COOKIES

  • We store functional cookies only
  • Out of the box we do not offer any optional cookies
  • Our cookies are non-tracking, required essential session cookies according to GDPR standards. Therefore the cookie banner that we provide as an optional feature covers the legal needs to notify the customer but doesn’t offer them the ability to opt-in to any additional cookies/tracking services.

 

Processes

Security Awareness in Development Tasks

Each task is carefully created and reviewed by the security implications and we use best practices and measurements to avoid any exposure during the specification step

Activity 1: Institute security awareness program

Ensure project members consider security to be an important project goal through training and accountability

Activity 5: Identify resources and trust boundaries

Providing a structured foundation for understanding the security requirements of a system

Activity 7: Document security-relevant requirements

Activity 10: Apply security principles to design

Harden application design, design secure protocols and APIs

Activity 14: Perform security analysis of system requirements and design

Assess likely system risks, identify high-level system threads

Activity 16: Implement interface contracts

Provide unit level semantic input validation and identify reliability errors

 

Testing and Code Review

Additional steps after implementation will also look out for security related areas and try to mitigate any vulnerabilities

Activity 1: Institute security awareness program

Activity 17: Implement and elaborate resource policies and security technologies

Following specification

 Activity 21: Verify security attributes of resources

 

Security Tests

Internal and on-request external Penetration tests

Activity 9: Identify attack surface

Activity 18: Address reported security issues

Activity 20: Identify, implement and perform security tests

Activity 2: Capture security metrics

 

Customer Communication

If risks of a medium/high/critical level have been identified, we will have to communicate those to our customers in a sensible manner using a disaster task force

Activity 24: Manage security issue disclosure process

 

Disaster Recovery

Regular checks to perform disaster recovery on several levels

  • Outage and recovery of data/databases
  • Outage of a single server
  • Outage of a whole environment

 

Hosting Environment

Environments
AWS Account setup to establish hard boundaries between environments. All Environments are fully separated and there is no direct access to any of them.

We do have the following environments configured:

  • Ops: used to run operational servers (CI, etc.)
  • QA: used to run current test builds
  • PP: Preproduction environment to run test sites as a replica of live
  • Live: two live environments (UK/US)

 

Individual user accounts

  • Are created on a master account
  • No leaked orphans
  • Single point for policies and permissions
  • Assuming roles for the individual environments
  • Using groups and policies on a need to know base (Activity 6)
  • Strict password policy
  • MFA required to use accounts

 

Access

  • Management and building servers are IP restricted
  • Zoned (public/private) subnets and restricted port access on all environments
  • Hardened server, no exposed RDP connection, local management only via Systems Manager
  • Any access and any commands executed are logged to an S3 audit

 

Servers and Infrastructure setup

  • Encryption on the file level for any user data
  • Servers are being refreshed weekly with latest OS patches
  • Infrastructure changes are applied automatically going through a validation and approval process
    • Operating environment is defined (Activity 3)
  • Automatic Backups
  • Automatic recovery procedures

If you wish to download our Security Policies document you can do so HERE

Tutorial Video

Step by Step Guide

Tutorial Video Transcript

Incomplete