Contact

Security Policy

How Zenith Workflows protects your systems and data

Security Policy

Last Updated: May 1, 2025

Introduction

At Zenith Workflows, security isn't just a feature - it's fundamental to how we operate. This Security Policy outlines the measures we take to protect your systems, data, and credentials when you engage us for workflow investigation and diagnostics services.

Our Security Commitment

As your automation diagnostics partner, we commit to:

  1. Treating your systems with care: We approach your business systems with the same caution and precision we would use for our own critical infrastructure.
  2. Following security best practices: We implement current industry standards for secure access and data handling.
  3. Maintaining confidentiality: We recognize that your automation workflows may contain proprietary business logic and sensitive data.
  4. Documenting access: We keep detailed records of all system access for transparency and accountability.
  5. Minimizing exposure: We access only the systems and data necessary to complete the agreed-upon work.

System Access Security

When investigating your automation systems, we follow these protocols:

Credential Management

  • We use an enterprise-grade password manager with strong encryption to store access credentials
  • We generate and use unique, complex passwords for each system
  • We never store your passwords in plain text documents, emails, or unsecured applications
  • We transfer credentials through secure channels only

Authentication Practices

  • We use multi-factor authentication (MFA) wherever available
  • We never share login sessions between devices
  • We maintain separate browser profiles for client work to prevent cookie contamination
  • We validate our identity through approved channels when accessing your systems

Access Limitation

  • We request the minimum access level needed to complete the work
  • We prefer temporary access credentials when possible
  • We document all access privileges granted during our engagement
  • We follow a formal offboarding process to ensure all access is revoked when work is complete

Data Handling Procedures

Data Access

  • We access your data only for the specific purpose of investigating and documenting your workflows
  • We never download or store your business data unless explicitly authorized and necessary
  • When temporary data extraction is needed, we follow documented procedures with your approval

Data Storage

  • Any client files are stored in secure, encrypted cloud storage with strict access controls
  • Local workstations are encrypted and password-protected
  • We maintain current antivirus and anti-malware protection on all devices

Data Transmission

  • We use secure, encrypted channels for all data transmission
  • We share project deliverables through encrypted means or secure client portals
  • We never send sensitive information through unsecured email attachments

Operational Security

Work Environment

  • We work in secure, private environments when accessing client systems
  • Our physical workspace has appropriate controls to prevent unauthorized viewing
  • We use privacy screens when working in public spaces (though this is avoided for sensitive work)

Device Security

  • All devices used for client work employ:
    • Full-disk encryption
    • Automatic screen locking
    • Regular security updates
    • Limited application installation
    • Endpoint protection software

Network Security

  • We use only secure, private networks for client work
  • All sensitive operations utilize VPN technology when appropriate
  • We avoid public WiFi networks for accessing client systems

Incident Response

In the unlikely event of a security incident:

  1. We will promptly notify you of any suspected or confirmed security breaches affecting your data
  2. We will document the incident, including what happened and what data may have been affected
  3. We will cooperate with your security team and provide all necessary information
  4. We will take immediate steps to contain and remediate the incident

Compliance and Standards

Our security practices align with industry standards including:

  • GDPR requirements for data handlers
  • NIST Cybersecurity Framework guidance
  • ISO 27001 security principles

Ongoing Security Improvement

Security is not a static achievement but an ongoing process. We continuously improve our security practices by:

  • Staying current with security trends and threats in the automation space
  • Regularly reviewing and updating our security procedures
  • Investing in security training and awareness

Security Verification

Upon request, we can provide:

  • Documentation of our security practices
  • References regarding our security handling
  • Completion of your security assessment questionnaires

Client Responsibilities

To maintain effective security during our engagement, we request that clients:

  • Provide access through secure channels
  • Create temporary credentials where possible
  • Inform us of any specific security protocols we should follow
  • Promptly deactivate access when it's no longer needed
  • Report any security concerns immediately

Contact for Security Matters

For security-related questions or to report concerns:

Our Commitment to Trust

Security is not just about technology - it's about trust. We understand that by investigating your automation systems, you're placing significant trust in us. We take that responsibility seriously and are committed to maintaining the highest security standards throughout our work together.

While we follow industry best practices for security, we also recognize that each client may have unique security requirements. We're always open to discussing specific security measures or adapting our processes to meet your organization's needs.