Security Policy
SentryLink Global implements layered security to protect client data, operations, and outcomes.
Access Control
- Role-based access with least privilege.
- Multi-factor authentication where supported.
- Regular access reviews and revocation upon role changes.
Data Protection
- Encryption in transit for dashboards and alert channels.
- Segregated client contexts and managed retention schedules.
- Secure disposal procedures for temporary artifacts.
Operations
- Monitoring of privileged actions and audit logging.
- Change management and maintenance windows coordination.
- Vendor risk assessment for critical providers.
Incident Response
We follow documented procedures for identification, containment, eradication, recovery, and post-incident reviews. See the Incident Response Policy for details.