Skip to content

Infrastructure & Operational Security

  • Last Updated: 9 Mar 2026
  • Next Review: 1 Jul 2026

This page covers the security practices that apply to Enprivacy’s own internal infrastructure — the systems used to build, test, and distribute Invisiq. Because Invisiq is self-hosted by customers, this section focuses on the integrity of our development and delivery pipeline rather than a hosted service.

  • Access to production build systems, code repositories, and distribution infrastructure requires SSO authentication with MFA enforced.
  • Access is provisioned on a least-privilege basis and reviewed quarterly.
  • Privileged access (e.g. admin access to CI/CD pipelines, artifact registries) is logged and subject to additional review.
  • Access is revoked within the same day of employee off-boarding.
  • The customer portal / release registry requires authenticated access.
  • Customers can manage their own user accounts, API tokens, and access controls within the portal.
  • Build pipelines run on GitHub Actions with network egress controls limiting outbound connections to approved registries and package mirrors.
  • Artefact registries (container image registry, package registry) are access-controlled. Write access requires MFA.
  • All artefacts are signed before publication (see Supply Chain Security).
  • Artefact integrity is verified on download via Cosign signature.

All Enprivacy engineering endpoints are managed and must comply with the following baseline:

  • Full disk encryption enabled
  • Endpoint detection and response (EDR) agent installed
  • Automatic OS and security patch application
  • Screen lock enforced after 15 minutes of inactivity
  • Internal systems are segmented by function (development, CI/CD, corporate).
  • VPN or Zero Trust Network Access (ZTNA) is required to access internal systems remotely.
  • All internal traffic between sensitive systems uses TLS.

Enprivacy maintains logging and monitoring of internal systems including:

  • Authentication events (success, failure, MFA bypass attempts)
  • Privileged actions on CI/CD and distribution systems
  • Anomalous network activity

Alerts are reviewed by the security team. Logs are retained for a minimum of 3 months.

Enprivacy uses the following categories of subprocessors and vendors in the delivery of Invisiq:

CategoryExamplesPurpose
Source controlGitHubCode hosting
CI/CDGitHub ActionsBuild and test automation
Artifact registryGitHub PackagesContainer image distribution

Third-party vendors with access to our development environment are subject to security review before onboarding and periodic review thereafter. A full list of subprocessors is available at Subprocessors or on request.

  • Build and distribution systems have documented recovery procedures.
  • The target Recovery Time Objective (RTO) for our release pipeline is 4 hours.
  • Critical systems are backed up with a Recovery Point Objective (RPO) of 24 hours.
  • Business continuity plans are reviewed and tested annually.
AssessmentFrequencyScopeLast completed
Internal infrastructure penetration testAnnualBuild and distribution systemsNot yet started
Vendor security reviewOn onboarding + annualAll vendors with code/build accessOngoing
Access reviewQuarterlyAll internal systems31 January 2026
Business continuity testAnnualRelease pipelineNot yet started