Information Security
at FluidLabs
FluidLabs implements a structured and documented approach to information security. Our goal is to meet the requirements of our clients and minimize risk through consistent processes and controls.
Security Framework
We base our security program on the principles of Confidentiality, Integrity, and Availability (CIA). These principles guide how we handle data and design our systems.
- Confidentiality: Only authorized individuals have access to client and internal data.
- Integrity Data is protected from unauthorized changes.
- Availability: Systems and information remain accessible as required.
Certifications
FluidLabs is certified under ISO/IEC 27001:2022. This standard defines how to build and maintain an Information Security Management System (ISMS). Our ISMS is reviewed regularly by internal teams and external auditors. The certification confirms that we follow documented procedures for managing data security.
We also comply with GDPR requirements and enter into Business Associate Agreements (BAAs) when handling PHI under HIPAA. For relevant projects, personnel complete mandatory HIPAA and GDPR training.
Risk Management Process
We perform regular risk assessments to identify and address threats to our information systems. Risks are rated using impact and likelihood, tracked in a risk register, and reviewed quarterly. Our defined risk appetite is moderate. Risks outside tolerance are treated with mitigation plans, technical controls, or policy updates.
Supplier and Third-Party Management
Third-party providers undergo due diligence before engagement. Data Processing Agreements and contractual clauses are used to ensure security alignment. Third-party access is restricted, logged, and periodically reviewed.
Personnel Security
Before hiring, we verify applicant information, including employment history and references. When required by clients, we also conduct background checks.
All employees sign a Non-Disclosure Agreement (NDA) and complete mandatory security awareness training on their first day. Annual refresher training is required. The training includes topics such as phishing, social engineering, and data handling procedures.
We test training effectiveness through internal simulations and targeted follow-up training for high-risk areas. Employees working on specific regulated projects may also complete additional training (e.g., PCI DSS, OWASP Top 10).
Access Control and Authorization
FluidLabs applies a Zero Trust Model and uses role-based access control (RBAC). All systems enforce multi-factor authentication (MFA). Access is reviewed periodically and adjusted based on role and responsibility.
Cloud and internal systems are segmented. Project data is isolated in logically separated environments. Sensitive resources require VPN access and are protected by firewalls and traffic inspection.
Monitoring and Incident Response
We use a centralized Security Information and Event Management (SIEM) system to collect logs and monitor activity across infrastructure, endpoints, and applications. Events are analyzed and escalated based on severity. Logs are stored in a tamper-resistant environment.
We follow the NIST incident response process. The security team investigates incidents, documents findings, and performs root cause analysis. If needed, long-term remediation actions are tracked through the internal project management system.
Vulnerability and Patch Management
We perform regular internal and external vulnerability scans. Findings are prioritized based on criticality and impact. Patches are tested and deployed following a defined change control process.
The security team monitors vendor notifications, mailing lists, and industry advisories to stay informed about new vulnerabilities and required updates.
Endpoint and Infrastructure Security
All endpoints are protected with DNS filtering, anti-malware software, and host firewalls. Disk encryption is enforced on portable and personal devices connected to corporate systems. Devices are monitored by an Endpoint Detection and Response (EDR) platform.
Our network infrastructure uses firewall-based segmentation. VPN and SASE tools are used to enforce secure access, even for mobile or remote users. Data centers are geographically distributed and include redundancy for high availability.
Cloud systems are evaluated using a four-step approval process. We follow the NIST 800-53 control framework for managing security in cloud environments.
Physical Security
Access to offices and data centers is controlled using access cards, facial recognition, and visitor escorts. Surveillance systems monitor all entry points. Server rooms have restricted access and backup power through generators.
Business Continuity and Disaster Recovery
We maintain documented Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). These plans are tested and updated on a scheduled basis. Plans cover pandemic response, IT outages, and crisis communication procedures.
Data Protection
All data in transit and at rest is encrypted using current encryption standards. We support protected data transfer using tools such as Azure RMS, AIP, Sensitivity Labels, and Office 365 Message Encryption.
Employees are trained on how to select and apply protection labels when sending internal or external communications.
Let's get to know each other
Our CEO will receive this enquiry and will personally get back to you within 24 hours to discuss your vision and requirements