Compliance and
Security Protocols
- Understanding and fully leveraging the shared responsibility model as applicable within the cloud computing context, wherein the security of the cloud is the CSP’s responsibility and security within the cloud is the customer’s (Freyr's) responsibility.
- Freyr offers technology products and services to our customers in a SaaS model, wherein the customers of Freyr are responsible for their data and the users that have access. This capability is delivered to our customers by providing SSO service across all our products. All applications offered by Freyr can be integrated with the customer’s SSO (Single Sign-On).
- Freyr Partners with cloud service providers to ensure their architectural best practices are followed and applied within our cloud architecture, engineering, and day-to-day operations.
- We provide identity and access management best practices that ensure all authentication and authorization events follow the guardrails that include but are not limited to:
- Applicable Multifactor Authentication Schemes
- Principle of Least Privileges That Are Programmatically Applied and Followed
- Granular Access Controls Based on Pre-Defined Rules and Assigned Roles
- SSO Capabilities Offered to Our Customers
- Just-in-Time Access Principles
- Real-Time Monitoring and Alerting Capabilities
- Encryption of data at rest and in transit in the absence of any applicable end of life hardware and software.
- Backup and a robust disaster recovery mechanism that ensures data and service availability in the event of any unforeseen catastrophic event. BCP is tested at pre-defined intervals, and a standard RTO (Recovery Point Objective) and RPO (Recovery Time Objective) are defined.
- Well-defined procedure to identify, respond, and remediate an IT/security incident.
- Pre-defined timelines based on the severity to manage and remediate security vulnerabilities.
- Regular periodic cadence calls with our CSP resources (e.g. dedicated Technical Account Manager (TAM)).
- Run time security controls – EDR (End Point Detection & Response) within our cloud workloads, that give elementary information for any anomalous behaviours.


