InterScripts Security and Privacy teams establish policies and controls, monitor compliance with those controls, and prove our security and compliance to third-party auditors.
- Access is limited to only those with a legitimate business need and granted based on the principle of
least privilege.
- Security controls are implemented and layered according to the principle of defense-in-depth.
- Security controls are applied consistently across all areas of the enterprise.
- The implementation of controls is iterative, continuously maturing across the dimensions of improved effectiveness, increased audibility, and decreased friction.