LogoLogo
  • Introduction
  • Organizational security
  • Ubidots Architecture
  • Confidentiality
    • Formatting and Data Accumulation
    • Encryption in Transit
    • Encryption at Rest
    • All of Our Hired Personnel Must Sign an NDA
    • We Only Hire Directly
  • Transparency
    • Periodic Checks
    • Status Page
    • Support Channel
    • Open Source
    • Continuous Hacking to our Own Technology
    • Data Leakage Policy
  • Integrity
    • Isolated Websites
    • Code Management
    • Continuous Scanning for Vulnerabilities
  • Resilience
    • Incident Management and Resolution
    • Data Backup
    • Recovery Objective
  • Non-repudiation
    • Extensive Logs
    • Everything as Code
  • Authentication
    • For Clients
    • Internal
  • Privacy
    • Data Management and Retention Policy
  • Compliance
    • FDA 21 CFR Part 11
      • Validation
      • Audit Trails
      • Electronic Signatures
      • System Access Controls
      • Record Retention
      • Record Protection
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Authentication

Internal

Ensuring secure access to our internal systems is a top priority at Ubidots. We achieve this by implementing a business-grade password management system for all employees. Here’s how this system enhances our internal security:

  • Dedicated User Accounts: Every Ubidots employee is provided with a dedicated user account within our password management system. This setup ensures that passwords are stored securely and access is managed efficiently.

  • Password Policies: Our password management system allows us to enforce stringent password policies across the organization. These policies include requirements for password complexity, regular updates, and the prohibition of reused or weak passwords.

  • Centralized Management: With centralized control, we can manage access permissions and monitor password usage across all internal systems. This centralization helps us quickly revoke access when necessary, such as during employee offboarding, ensuring that former employees cannot access company resources.

  • Encrypted Storage: All passwords and sensitive information are stored using robust encryption methods. This ensures that even if the password management system is compromised, the stored data remains secure and inaccessible to unauthorized users.

  • Multi-Factor Authentication (MFA): To further enhance security, our password management system supports multi-factor authentication. This adds an additional layer of protection by requiring a second form of verification, such as a mobile device or hardware token, when accessing sensitive systems.

  • Audit and Reporting: Our system provides detailed audit logs and reporting capabilities, allowing us to track access and detect any unusual or unauthorized activity promptly. This feature is critical for maintaining compliance with security policies and regulatory requirements.

  • Ease of Use: By providing a user-friendly interface, our password management system ensures that employees can easily manage their passwords and access credentials. This ease of use encourages the adoption of secure password practices throughout the organization.

Through the implementation of a comprehensive password management system, Ubidots ensures that all employees adhere to best practices for password security. This approach significantly reduces the risk of password-related breaches and enhances the overall security posture of our internal systems.

PreviousFor ClientsNextPrivacy

Last updated 11 months ago

Was this helpful?