Skip to main content
All CollectionsData Privacy and Security
Data Security Policies for Crossbeam Employees
Data Security Policies for Crossbeam Employees

Privacy and security are the responsibility of every member of the Crossbeam team.

E
Written by Erin Bates
Updated over 2 months ago

The trust in your partners is core to our business. Companies need a secure and compliant way to ensure when you partner with your ecosystem; your data and your partner’s data is secure. From day one, we have prioritized the security of your data to ensure Trust is the primary focus.


✍️ Note

Visit the Security Portal here to gain access to the most recent and sensitive security details at Crossbeam.


Systems Access

Crossbeam employee access to our internal vendor systems is granted based on least privileges. Employees are granted privileges to any system only as needed to perform their role. Access is tracked and audited quarterly. Crossbeam’s production environment is accessed via SSH. The production SSH server is firewalled to restrict access outside our VPN. Production database access is then accessed via username/password authentication. SSH access is protected by Duo MFA and uses key-based authentication.

Internal policies

Crossbeam Employee Policies and Procedures: All Crossbeam employees are required to follow strict procedures to ensure your data remains secure. Additionally, Crossbeam educates employees on an ongoing basis on their role in protecting your data.

Security policies, privacy policies, disaster recovery plan, incident response plan, and any other pertinent documents related to privacy and security are reviewed, at minimum, on a quarterly basis by Crossbeam’s Security and Disaster Management Committee.


📄 Related Articles

Did this answer your question?