Security
Below is a summary of the key elements of RMT’s security protocols, activities and controls:
1. Organisational Security Awareness
We issue guidance and provide training to our business and technical staff on an ongoing basis to ensure the delivery of your service, the systems, data, premises, etc. remain secure. There are designated roles responsible for the implementation and continuous improvement of information security.
2. Security Clearances
General staff are security assessed as part of the on-boarding process and again if their role changes to a more security onerous area of the business. Minimum standard is a Police Clearance. Specific Support or Project Staff also have AGSVA Baseline Clearance or NV1 Clearance depending on their role.
3. Colocation Security
The RMT SaaS environment is wholly hosted on RMT-owned hardware in a colocation model in the NextDC environment. This takes full advantage of their industry-leading and continually evolving security processes and practices, compliance and certifications, physical and environmental security, security tools and utilities, etc.
4. Access Control and Privacy/Confidentiality
Your data remains your property. Client Data stored in RMT SaaS delivered products is treated as confidential. Access to the data and the RMT infrastructure is strictly limited to RMT staff on a role requirement basis to enable services to be provided to the client. Client Data held in these systems is never shared with third parties without the client’s consent.
5. Security Embedded in the SDLC
Security is built in to every stage of RMT software product development lifecycle, and the change control process for the software and infrastructure. This includes security testing of the infrastructure and the RMT applications.
6. Robust Encryption
Client Data is encrypted in transit and at rest. Web traffic is encrypted using SSL accepting TLS1.2 and TLS1.3, and non-web traffic with IPSec/SSH tunneling, with AES-256 is applied at rest.
Data is encrypted from the user’s browser through to our servers
Before being saved any password is encrypted (full encryption at rest)
Client databases are isolated from each other
RMT utilises cutting-edge security processes to encrypt data and decryption keys
7. Infrastructure Protection
Infrastructure security tools are deployed to provide anti-virus, anti-malware, IDS/IPS and other controls within the RMT infrastructure.
8. High Availability
The RMT SaaS has multiple redundant components (at least N+1). In addition RMT’s uses a geographically separate NextDC data centre for Disaster Recovery, within an agreed Region, with multiple, redundant, hardware and services. RMT clients can have very high confidence in RMT’s SaaS availability.
9. Extensive Logging and Monitoring
RMT use a suite of tools to provide extensive logging and monitoring of traffic, activity, config changes, performance etc. in the RMT SaaS infrastructure, with logs being stored in a robust and tamper-protected format.
10. Incident Response
RMT have incident response processes covering data loss, technology attacks, compromise of physical security, etc.