24 lines
698 B
Markdown
24 lines
698 B
Markdown
# Security Policy
|
||
|
||
Genesis Hosting Technologies enforces strict security practices across all infrastructure and services to protect client data and maintain service integrity.
|
||
|
||
## Core Principles
|
||
|
||
- Least privilege for all users and services
|
||
- Regular audits and patching
|
||
- Encrypted communication and storage
|
||
- Real-time monitoring and alerting
|
||
|
||
## Enforcement Areas
|
||
|
||
- 2FA required for all admin portals
|
||
- SSH access limited to key-based logins
|
||
- Centralized log collection and review
|
||
- All critical assets monitored via Genesis Shield
|
||
|
||
## Review Cycle
|
||
|
||
- Policies reviewed quarterly
|
||
- Logs retained for 30–90 days depending on system
|
||
- Incidents reviewed post-mortem with improvements logged
|