Cybersecurity //
ensuring secure
benchmarking &
innovation
Cybersecurity // ensuring secure benchmarking & innovation
Robust cybersecurity based on proven technologies
For our solutions within the id-x-platform, ensuring the highest level of application security is woven into the very fabric of our applications. It’s not just a checkbox on a list: it’s an ethos that drives every line of code we write. We recognize the critical importance of safeguarding your data, which is why we relentlessly pursue excellence in cybersecurity for our applications.
Following best practice principles in cybersecurity
INDEC is a member of the Alliance for Cybersecurity (Allianz für Cyber-Sicherheit) of the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, abbreviated as BSI). In addition to OSSTMM and OWASP ASVS standards (see “penetration testing” below), we follow the guidelines of the ISO/IEC 27001 cybersecurity standard in all of our processes. Moreover, we are committed to compliance with the NIS2 Directive of the European Union, ensuring we meet the rigorous cybersecurity standards set forth to protect essential and important services in the EU.
Data privacy and the GDPR
Protecting your personal data is a top priority for us at INDEC. We are dedicated to ensuring that all data processing activities adhere to the General Data Protection Regulation (GDPR) of the European Union. For more information about our data privacy practices and GDPR compliance, please see our Privacy Policy on our website.
Hosting with absolute security
All of our cloud services are hosted with Microsoft Azure, ensuring top-tier cybersecurity through advanced threat protection, robust security protocols and continuous monitoring to safeguard your data and applications. Microsoft Azure is ISO/IEC certified and undergoes regular independent third-party audits for ISO/IEC 27001 compliance.
Latest technologies
Our unwavering commitment to providing you with a safe and secure platform is underscored by our consistent incorporation of the latest and most advanced technologies. We always stay on top of industry standards to create a fortified environment that shields your valuable information from potential threats.
Regular penetration testing
To validate the efficacy of our security measures, we engage in regular and comprehensive penetration testing. These tests are a testament to our dedication to maintaining applications that meet the highest security standards. Our security assessments include meticulous evaluation under “gray box” conditions, in strict alignment with the respected Open Source Security Testing Methodology Manual (OSSTMM) and the rigorous Open Web Application Security Project of the Application Security Verification Standard (OWASP ASVS).