698 B
Raw Blame History

Security Policy

Genesis Hosting Technologies enforces strict security practices across all infrastructure and services to protect client data and maintain service integrity.

Core Principles

  • Least privilege for all users and services
  • Regular audits and patching
  • Encrypted communication and storage
  • Real-time monitoring and alerting

Enforcement Areas

  • 2FA required for all admin portals
  • SSH access limited to key-based logins
  • Centralized log collection and review
  • All critical assets monitored via Genesis Shield

Review Cycle

  • Policies reviewed quarterly
  • Logs retained for 3090 days depending on system
  • Incidents reviewed post-mortem with improvements logged