QSNAPP
Updated 9/26/2025

Security

We build QSNAPP with security by design—protecting your data with layered controls.

Overview

Security at QSNAPP follows a defense‑in‑depth approach: secure development practices, encrypted data at rest and in transit, strict access control, continuous monitoring, and tested response procedures.

Least Privilege
Production access is tightly scoped, audited, and time‑bound.
Encryption Everywhere
TLS in transit and industry‑standard encryption at rest.
Continuous Monitoring
Automated alerts and logging across infrastructure.

Security Practices

  • Secure SDLC with code reviews, dependency scanning, and secrets management.
  • Production access gated by MFA/SSO and role‑based permissions.
  • Configuration hardening and least‑privilege IAM policies.

Encryption

All traffic is encrypted with TLS 1.2+ in transit. Data at rest is encrypted using modern ciphers provided by our cloud providers.

Access Control

Access to production systems is limited to authorized personnel with MFA. Changes are tracked and auditable; credentials are rotated regularly.

Infrastructure & Monitoring

We utilize managed infrastructure with automated updates, logging, metrics, and alerting. Backups are encrypted and stored redundantly.

Incident Response

We maintain a documented incident response plan that includes triage, containment, forensic analysis, notification where required, and post‑incident review.

Responsible Disclosure

If you believe you’ve found a vulnerability, please email hello@qsnapp.com. We ask for reasonable time to remediate before public disclosure.

Compliance

QSNAPP is built with South African QS practice in mind and follows industry best practices for data protection and security controls. Formal certifications may be added as we scale.

Business Continuity & Backups

Regular automated backups, tested restoration procedures, and documented disaster recovery guidelines help ensure continuity.

FAQs

Do you store card data?
No. Payments are handled by PCI‑compliant providers.
Is data encrypted at rest?
Yes, using cloud‑provider encryption at rest.
Do you support SSO/MFA?
MFA is required for admin access; SSO options are planned.
Where is data hosted?
In reputable cloud regions with redundancy.

Have a security question?

Contact our team—responsible disclosure welcome.

Contact Security