blob: 7ed282f2c24e16582452d1234c0d6724cba43581 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
# Security Policy
Genesis Hosting Technologies enforces strict security practices across all infrastructure and services to protect client data and maintain service integrity.
## Core Principles
- Least privilege for all users and services
- Regular audits and patching
- Encrypted communication and storage
- Real-time monitoring and alerting
## Enforcement Areas
- 2FA required for all admin portals
- SSH access limited to key-based logins
- Centralized log collection and review
- All critical assets monitored via Genesis Shield
## Review Cycle
- Policies reviewed quarterly
- Logs retained for 30–90 days depending on system
- Incidents reviewed post-mortem with improvements logged
|