This policy defines behavioral, process, technical, and governance controls pertaining to security at Hirelexa that all personnel are required to implement in order to ensure the confidentiality, integrity, and availability of the Hirelexa service and data ("Policy"). All personnel must review and be familiar with the rules and actions set forth below.
This Policy was created in close collaboration with and approved by Hirelexa executives. At least annually, it is reviewed and modified as needed to ensure clarity, sufficiency of scope, concern for customer and personnel interests, and general responsiveness to the evolving security landscape and industry best practices.
The Hirelexa security team oversees the implementation of this Policy, including procurement, provisioning, maintenance, retirement, and reclamation of corporate computing resources, all aspects of service development and operation related to security, privacy, access, reliability, and survivability, ongoing risk assessment, vulnerability management, incident response, and security-related human resources controls and personnel training.
Hirelexa is committed to protecting its customers, personnel, partners, and the company from illegal or damaging actions by individuals, either knowingly or unknowingly in the context of its established employment culture of openness, trust, maturity, and integrity.
The first line of defense in data security is the informed behavior of personnel, who play a significant role in ensuring the security of all data, regardless of format.
Each individual having access to any Hirelexa-controlled system does so via a unique user account. User accounts are required to have a unique username, a strong password, and two-factor authentication (2FA).
Hirelexa adheres to the principle of least privilege, and every action attempted by a user account is subject to access control checks.
Hirelexa maintains the following Data Confidentiality Levels:
The Hirelexa security team maintains an internal Incident Response Policy which contains steps for preparation, identification, containment, investigation, eradication, recovery, and follow-up/postmortem.
Hirelexa services are configured to withstand long-term outages to individual servers, availability zones, and geographic regions. Infrastructure and data are replicated in multiple geographic regions to ensure high availability.
Hirelexa targets a Data Recovery Point Objective (RPO) of 5 minutes for at least 3 days, and no longer than is permissible by law. Hirelexa targets a Data Recovery Time Objective (RTO) of no longer than 24 hours.
Last updated: July 15, 2024