Security
We build QSNAPP with security by design—protecting your data with layered controls.
Overview
Security at QSNAPP follows a defense‑in‑depth approach: secure development practices, encrypted data at rest and in transit, strict access control, continuous monitoring, and tested response procedures.
Security Practices
- Secure SDLC with code reviews, dependency scanning, and secrets management.
- Production access gated by MFA/SSO and role‑based permissions.
- Configuration hardening and least‑privilege IAM policies.
Encryption
All traffic is encrypted with TLS 1.2+ in transit. Data at rest is encrypted using modern ciphers provided by our cloud providers.
Access Control
Access to production systems is limited to authorized personnel with MFA. Changes are tracked and auditable; credentials are rotated regularly.
Infrastructure & Monitoring
We utilize managed infrastructure with automated updates, logging, metrics, and alerting. Backups are encrypted and stored redundantly.
Incident Response
We maintain a documented incident response plan that includes triage, containment, forensic analysis, notification where required, and post‑incident review.
Responsible Disclosure
If you believe you’ve found a vulnerability, please email hello@qsnapp.com. We ask for reasonable time to remediate before public disclosure.
Compliance
QSNAPP is built with South African QS practice in mind and follows industry best practices for data protection and security controls. Formal certifications may be added as we scale.
Business Continuity & Backups
Regular automated backups, tested restoration procedures, and documented disaster recovery guidelines help ensure continuity.