Security at Mining Sentry
Protecting customer data and maintaining trust is a core priority at Mining Sentry. We design our systems and processes with security in mind from day one.
1. Commitment to Security
Mining Sentry is committed to protecting customer information, maintaining system availability, and continuously improving our security posture. Security considerations are embedded into our product development, infrastructure, and operational processes.
2. Organizational Security
Security oversight is managed by senior leadership at Mining Sentry. All team members with access to production systems receive security awareness training and follow documented security policies and procedures.
3. Data Protection
Customer data is protected using industry-standard safeguards. Data is encrypted in transit using TLS and encrypted at rest within our cloud infrastructure. Customer data is logically segregated by organization, and we retain data only as long as necessary to provide our services or meet legal obligations.
4. Access Controls
Access to systems and data is restricted based on job responsibilities and the principle of least privilege. Access rights are reviewed periodically and promptly revoked when no longer required.
5. Infrastructure Security
Mining Sentry is hosted on major cloud infrastructure providers that maintain strong physical and environmental security controls. Our infrastructure leverages firewalls, network segmentation, and continuous monitoring to protect against unauthorized access.
6. Application Security
We follow secure software development practices including code reviews, dependency management, and regular patching. Our systems are monitored for vulnerabilities, and issues are prioritized based on risk and impact.
7. Incident Response
Mining Sentry maintains an incident response process to detect, investigate, and remediate security incidents. In the event of a confirmed data breach, we are committed to notifying affected customers in accordance with applicable laws and contractual obligations.
8. Compliance
Mining Sentry is actively maturing its security and compliance program. We align our practices with widely recognized security frameworks and industry best practices, including principles from SOC 2, NIST, and ISO 27001.
9. Responsible Disclosure
We welcome responsible disclosure of potential security issues. Security concerns or vulnerabilities can be reported by emailing rsmith@mining-sentry.com. All reports are reviewed and investigated promptly.
10. Updates
This Security page is reviewed and updated periodically to reflect changes to our security practices and compliance posture.