1. Home
  2. FAQ
  3. Security
  4. Certifications and Compliance

Certifications and Compliance

Certifications

The following certifications apply to all data centers used by Hector to host information and data for all its customers.

CertificationDescription
SOC Type IThis is the initial stage of a SOC’s development. At this level, the SOC is typically reactive and primarily focused on monitoring and incident response. It may lack mature processes, automation, and advanced tools.
SOC Type IIA Type II SOC is more mature than Type I. It has improved processes and tools for monitoring and responding to security incidents. It may also have some proactive threat hunting capabilities.
ISO 27001International standard for information security management systems (ISMS). It sets out the criteria for establishing, implementing, maintaining, and continually improving an ISMS within the context of an organization
ISO 27002International standard that provides guidelines for establishing, implementing, maintaining, and continually improving an organization’s information security management system (ISMS). Unlike ISO 27001, which is the standard for information security management system requirements, ISO 27002 is a code of practice that offers a set of detailed security controls and best practices for information security
PCI-DSSPayment Card Industry Data Security Standard, is a set of security standards and requirements designed to ensure the secure handling of payment card information, such as credit card and debit card data.

Vendor Compliance

Microsoft Azure

https://learn.microsoft.com/en-us/azure/compliance/

Vultr

https://www.vultr.com/legal/compliance/

Updated on January 10, 2024

Was this article helpful?

Related Articles