1. Security & Compliance Overview
EFROS operates as a cybersecurity-first managed service provider. Every engagement runs under documented controls aligned to recognised frameworks. Independent attestations and partner-tier letters are reviewed annually and provided under NDA to qualified prospects.
2. Certifications & Partner Evidence
EFROS operates against the certifications, partner programs, and frameworks listed below. Each piece of supporting evidence — Statement of Applicability, attestation report, partner-tier letter, individual engineer credentialing — is released under mutual non-disclosure agreement to qualified clients and their insurance, legal, or audit reviewers.
- ISMS aligned to ISO/IEC 27001:2022 — Statement of Applicability under NDA
- AICPA SOC 2 Trust Services Criteria controls — attestation report under NDA
- Microsoft — Solutions Partner program (tier letter under NDA)
- AWS — Technology Partner program (tier letter under NDA)
- Cisco — Partner program designation (tier letter under NDA)
- Individual engineer credentialing (CompTIA, vendor-specific) — list under NDA
3. Documentation Available Under NDA
The following are released to qualified clients and their insurance, legal, or audit reviewers under mutual non-disclosure agreement.
- SOC 2 Type II Report (current period)
- ISO 27001 Statement of Applicability (SoA)
- Information Security Policy + supporting standards
- Business Continuity & Disaster Recovery Plan
- Incident Response Playbook (sanitised)
- Third-party penetration test executive summary
- Insurance certificates — cyber, professional indemnity, general liability
- Sub-processor list with data flow diagram
4. Data Handling
Client data remains in the client's own tenant by default. EFROS engineers operate with the minimum-necessary access required for the engagement. Read-only auditor or global-reader roles are preferred where the task allows; elevated access is time-boxed, logged, and reviewed.
- Default: data stays in client tenant; EFROS does not retain custody
- Encryption at rest: AES-256 on all EFROS-managed systems
- Encryption in transit: TLS 1.2+ with HSTS + MTA-STS enforcement
- Audit logs: 12-month minimum retention; longer for regulated scope
- Access reviews: quarterly for all client tenants
- Sub-processor disclosure: complete list under NDA
5. Privacy & Confidentiality
EFROS operates against GDPR, UK GDPR, CCPA / CPRA, HIPAA (where BAA in place), and PIPEDA expectations. Every engagement contract includes confidentiality covenants. Employees are bound by individual confidentiality agreements and trained annually on data-handling procedures.
- Annual data-protection training for every employee
- Background screening for production access
- Multi-factor authentication on every system
- Privileged access management (PAM) with session recording for sensitive systems
- Onboarding / offboarding within 4 business hours under documented runbook
6. Incident Response Process
If an incident affects a client environment, the 24×7 SOC contains first, communicates with the client's designated incident contact, and follows the runbook documented during the engagement onboarding. Severity classification and SLA targets are the canonical P1-P4 matrix below (Section 6a).
- Designated incident contact named at engagement start, validated quarterly
- Forensic readiness: timeline preservation, memory captures, chain-of-custody
- Regulatory notification timing tracked against jurisdiction (e.g. OCR for HIPAA, NYDFS 23 NYCRR 500 §500.17, GDPR 72-hour clock)
- Post-incident review with root-cause analysis and remediation roadmap
6a. Incident Response SLA Matrix
Canonical priority bands and response SLAs for incident response under EFROS Fortress SOC engagements. Lower-tier programs (Core IT, Secure Operations) follow the same bands with business-hours-only coverage on P3 and P4.
| Priority | Definition | Acknowledge | Containment status | Mitigation target | Formal notification |
|---|
| P1 — Critical | Customer-impacting outage or active confirmed incident | 30 minutes | 1 hour | 4 hours | ≤ 24 hours |
| P2 — High | Degraded service or contained security alert | 1 hour | 4 hours | 1 business day | If regulatory clock applies |
| P3 — Medium | Non-urgent issue or standard change request | 4 business hours | n/a | 3 business days | n/a |
| P4 — Low | Informational, scheduled change or maintenance | 1 business day | n/a | 5 business days | n/a |
Regulatory-notification clocks (HIPAA OCR, NYDFS Part 500 §500.17 72-hour, GDPR/UK GDPR 72-hour, state breach statutes) run in parallel with this matrix and are tracked per-incident against jurisdiction. Performance against this matrix is reported quarterly under NDA via the Trust Center.
7. Insurance & Risk Documentation
EFROS carries cyber-liability, professional-indemnity, and commercial-general-liability coverage. Certificates of insurance are provided to qualified prospects under NDA. Carrier-specific attestations available for clients whose own cyber insurance requires vendor-side documentation (Beazley, Chubb, AIG, Travelers, and the major specialty markets).
8. Vendor Due Diligence Contact
For procurement reviewers, security questionnaires (SIG, CAIQ, SAQ, custom), and audit requests, route directly to our compliance team. We typically return completed questionnaires within five business days.
- Email: [email protected]
- Standardised: SIG Core, SIG Lite, CSA CAIQ
- Custom questionnaires: returned with evidence references and policy excerpts
- Audit calls: scheduled within 10 business days, attended by EFROS security lead
- Privacy resources: Privacy Policy (/privacy/) · Sub-processors (/privacy/#sub-processors) · DPA request ([email protected])
9. Responsible Disclosure
Security researchers reporting vulnerabilities in EFROS-operated systems or client environments under our scope are welcomed. We follow a coordinated disclosure model and do not pursue legal action against researchers who act in good faith.
- Contact: [email protected]
- PGP key + security.txt published at /.well-known/security.txt
- Triage: acknowledged within 2 business days
- Validation window: typically 7-30 days depending on scope
- Coordinated disclosure window: 90 days by default, adjustable for active exploitation