Security policy

BetterFlow is built by BetterQA (Better Quality Assurance S.R.L.), a company with 8+ years of experience. According to a study by IBM, the average cost of a data breach reached $4.45 million in 2023. We protect your data through documented security standards and regular audits.

What security certifications does BetterFlow hold?

Our organization adheres to these standards and frameworks:

  • ISO 27001:2013 — Information Security Management
  • ISO 9001:2015 — Quality Management Systems
  • GDPR — General Data Protection Regulation

We maintain designated security officers. We conduct regular security assessments. 100% of code changes undergo security-focused review.

How does BetterFlow control access?

Authentication

  • Strong password requirements (8+ characters, mixed case)
  • Separate portals for staff and clients
  • Automatic lockout after failed login attempts
  • Session timeout policies

Authorization

Role-based access control follows a strict hierarchy:

  • Super Admin — Full system access
  • Admin — Organization-level management
  • Employee — Standard user access
  • Client — Limited project-specific access

We follow least-privilege principles. We conduct regular permission reviews.

How does BetterFlow protect data in transit and at rest?

Encryption

  • In transit: TLS 1.2+ for all data transmission
  • At rest: AES-256 encryption for databases

Data classification

Data is classified into these categories:

  • Public — Publicly available information
  • Internal — Business operational data
  • Confidential — Sensitive business information
  • Restricted — Highly sensitive personal data

4. Infrastructure security

  • Enterprise-grade firewall protection
  • Intrusion detection and prevention systems
  • DDoS mitigation services
  • Hardened server configurations
  • Automated security patching
  • Kubernetes container security

How does BetterFlow handle security incidents?

Audit logging

  • 30-day activity log retention
  • Tamper-proof storage
  • Comprehensive action tracking

Incident response

  • 24-hour initial response commitment
  • 72-hour GDPR breach notification compliance
  • Documented incident response procedures

Backup strategy

  • Daily automated backups
  • 30-day backup retention
  • Geographically distributed storage
  • 4-hour Recovery Time Objective (RTO)
  • 24-hour Recovery Point Objective (RPO)

6. Physical and third-party security

Data center security

  • Tier 3+ certified data centers
  • 24/7 physical security monitoring
  • Biometric access controls

Vendor management

  • Security assessments for all vendors
  • OAuth 2.0 integration controls
  • Data Processing Agreements in place

7. Security testing practices

As a product built by a QA company, BetterFlow undergoes rigorous testing. Our testing program includes:

  • Quarterly penetration testing by certified ethical hackers
  • Automated OWASP Top 10 vulnerability scanning
  • Static code analysis in the CI/CD pipeline
  • Dependency vulnerability monitoring with alerts
  • Annual third-party security audit and compliance review

100% of code changes undergo security-focused review. We respond to reported issues within 48 hours.

8. Employee security training

All BetterFlow team members complete mandatory training. Our program covers:

  • Annual security awareness training
  • OWASP secure coding training for developers
  • Quarterly phishing simulation exercises
  • Background checks for team members with data access
  • NDA and confidentiality agreements for all personnel

9. Contact information

Security incidents: [email protected]

Vulnerability disclosure: [email protected]

Phone: +40 751 289 399