All Collections
Data Privacy and Security
Employee Access and Responsibility
Employee Access and Responsibility

Privacy and security are the responsibility of every member of the Crossbeam team.

Written by Emily Carpenter
Updated over a week ago

The trust in your partners is core to our business. Companies need a secure and compliant way to ensure when you partner with your ecosystem; your data and your partner’s data is secure. From day one, we have prioritized the security of your data to ensure Trust is the primary focus.

✍️ Note

Visit the Security Portal here to gain access to the most recent and sensitive security details at Crossbeam.

Systems Access

Crossbeam employee access to our internal vendor systems is granted based on least privileges. Employees are granted privileges to any system only as needed to perform their role. Access is tracked and audited quarterly. Crossbeam’s production environment is accessed via SSH. The production SSH server is firewalled to restrict access outside of our VPN. Production database access is then accessed via username/password authentication. SSH access is protected by Duo MFA and uses key-based authentication.

Internal policies

Crossbeam Employee Policies and Procedures: All Crossbeam employees are required to follow strict procedures to ensure your data remains secure. Additionally, Crossbeam educates employees on an ongoing basis on their role in protecting your data.

Security policies, privacy policies, disaster recovery plan, incident response plan, and any other pertinent documents related to privacy and security are reviewed, at minimum, on a quarterly basis by Crossbeam’s Security and Disaster Management Committee.

Did this answer your question?