Security posture
How we protect our systems and how we help protect yours.
Principles
How we design security
Foundational principles that guide our internal stack and client engagements.
Least privilege by default
Defense-in-depth across identity, network, and app
Secure-by-default configurations with reviewed exceptions
Auditability with traceable changes and approvals
Recovery readiness through tested restores and runbooks
Internal controls
How we operate internally
Operational controls we run inside PaQva, with evidence and cadence.
Identity & Access
MFA/2FA on admin surfaces, scoped roles, and SSO where supported.
- RBAC for consoles, code, and data with quarterly access reviews
- Hardware-based or app-based MFA for administrators
- Least-privilege service accounts with rotation playbooks
Backups & Recovery
Encrypted backups with clear RPO/RTO targets and restore drills.
- Daily encrypted backups for core systems; retention per system tier
- Documented RPO/RTO targets with variance tracking
- Quarterly restore tests with evidence of outcomes
Endpoint & Patch Management
Managed updates, EDR/AV coverage, and baseline hardening.
- OS and browser patch windows with rollout waves
- EDR/AV alerts triaged with response playbooks
- Baseline hardening for laptops/servers (disk encryption, screensaver locks)
Monitoring & Logging
Centralized alerts with retention tuned to risk and compliance needs.
- Health and security alerts with documented severities
- Log retention by system criticality; clock sync enforced
- Runbook links embedded in alerts for faster response
Change Management
Reviews and approvals for code, infra, and access changes.
- Peer review required for infrastructure and app changes
- Rollback and maintenance windows documented pre-change
- Access elevation requests recorded with expiry
Incident Response
Playbooks, roles, and communications ready for containment and recovery.
- Named roles for incident command, comms, and forensics
- Tabletop drills for critical scenarios (quarterly)
- Customer and stakeholder comms templates prepared
Client controls
Controls we recommend for clients
Sized to your org, industry, and stack.
We tailor controls to company size, industry, and existing stack.
MFA and password policy
Enforce MFA, password managers, and scoped admin roles.
Backup strategy with restores
Define RPO/RTO by system; test restores on a cadence.
Device compliance
Baseline hardening, disk encryption, and EDR coverage.
Vulnerability scanning
Light scanning with prioritization and patch SLAs.
Email security
Phishing controls, DMARC/SPF/DKIM, and user reporting.
Firewall and access policies
Least privilege for networks, VPN/zero trust where applicable.
Least privilege for apps
RBAC, scoped API keys, and offboarding hygiene.
Security awareness
Short trainings and phishing drills with metrics.
90-day plan
Typical 90-day plan
Sequenced for quick wins, hardening, monitoring, and handoff.
Weeks 1-2
Baseline + quick wins
- Access and asset inventory; MFA baseline
- Backup verification and critical restores
- Email security checks (DMARC/SPF/DKIM)
Weeks 3-6
Hardening + monitoring
- Endpoint hardening and patch SLAs
- Logging and alert routes with owners
- Vulnerability scan with remediation list
Weeks 7-10
Audits + drills
- Access review and least-privilege clean-up
- Backup restore drill with RPO/RTO check
- Tabletop or phishing drill with actions
Weeks 11-12
Documentation + handoff
- Runbooks and escalation paths finalized
- Metrics and next-quarter plan
- Handoff with owners and KPIs
Certifications
Certifications and credentials
No claims without verification. Status is transparent and evidence can be shared under NDA.
Certifications and attestations can be shared or validated under NDA.
We follow industry frameworks for alignment only (not as formal certifications).
SOC 2
PlannedNot certified; control mapping available upon request.
ISO 27001
PlannedNot certified; roadmap available upon request.
CIS Controls / NIST CSF alignment
In progressAlignment of practices; no certification implied.
Customer security questionnaires
In progressCompleted upon request with evidence-backed answers.
Certifications available upon request
We provide questionnaires or attestations with evidence on request.
Request a security reviewPolicies
Policies and documents (on request)
Shared privately under NDA; not published publicly.
- Security overview (under NDA)
- Incident response summary
- Backup and DR policy summary
- Access review procedure snapshot
FAQ
Security FAQ
Clear answers without over-promising.