Illizeo — Header EN (preview mega-menus)
Security

Technical & Organisational
Measures.

Pursuant to article 32 of GDPR, here are all the technical and organisational measures Illizeo implements to protect your data.

Version May 2026 GDPR art. 32 & FADP compliant
AES-256Encryption at rest
TLS 1.3+Encryption in transit
99.9%Availability SLA
24hAccess revocation on departure

General considerations

In the contractual relationship between Illizeo (processor under GDPR art. 4.8) and its customers (controllers, art. 4.7), each party implements the technical and organisational measures appropriate to ensure a level of security suited to the risk (art. 32 GDPR).

Commitments: Illizeo is undergoing ISO/IEC 27001 certification, adheres to international information-security standards and aligns with EDPB recommendations (Schrems II).

🏛️ 1. Organisational controls

1.1Internal governance & official directives

  • Formalised, auditable Information Security Policy (ISP)
  • Personal Data Protection Policy applicable to all
  • Procedures for remote work / VPN, IT use, incident management, password management
  • Documents validated by Top Management, binding for all

1.2Data Protection Officer (DPO)

  • External and independent DPO (GDPR art. 37)
  • Supervises all processing, takes part in DPIAs and security committees
  • Consulted on any new feature involving personal data
  • Single point of contact for supervisory authorities

1.3Confidentiality & third-party compliance

  • All employees sign a confidentiality undertaking (art. 5 & 32)
  • Commitment remains applicable post-contract
  • Third parties and providers bound via DPA, NDA, SCCs

1.4Training & security culture

  • Onboarding security & data-protection training from day one
  • Mandatory annual sessions (GDPR, phishing, incidents)
  • Tracked assessment quizzes for audit

1.5Strictly professional use

  • BYOD prohibited, strict private/professional separation
  • Illizeo devices only (MDM, disk encryption, active EDR)
  • Production access limited to authorised employees

1.6HR life cycle

  • Pre-hire: background checks, confidentiality clauses
  • During employment: least privilege, entitlement tracking
  • Graduated sanctions in case of non-compliance
  • Offboarding: equipment return, rights revoked within 24h

2. Technical controls

2.1Endpoint security (workstations)

  • Exclusive professional laptop, supplied and managed by Illizeo
  • EDR/XDR agent always active
  • Centralised MDM, locked policies (antivirus, encryption, firewall, USB ports)
  • Security updates deployed automatically in near real time (CI/CD IT)
  • No local admin user account, temporary elevation validated by IT

2.2Infrastructure security & server supervision

  • Secure cloud, European ISO 27001 providers
  • HIDS on each instance: real-time logs, behavioural detection
  • Heuristic correlation (non-compliant binaries, exploits)
  • Immediate alerts to security teams

2.3Network security (Zero Trust)

  • Mandatory VPN for access to critical resources (TLS 1.3+ or IPsec AES-256)
  • Public Wi-Fi tolerated only with active VPN
  • Segmentation (VPC, subnet, VLAN) + stateless/stateful firewalls
  • Per-role NACLs, no port exposed without documented justification
  • IDS/IPS coupled with a Threat Intelligence platform

3. Encryption of personal data

3.1Key management (KMS)

  • Keys generated and managed via cloud-integrated KMS, owned by Illizeo
  • Documented life cycle (generation, automated rotation, revocation)
  • Logged access, strict RBAC, alerts on anomaly

3.2Data at rest

  • Databases encrypted with AES-256
  • Files encrypted at filesystem level
  • Backups stored encrypted in segregated environments

3.3Data in transit

  • TLS 1.3+ with strong cipher suites (long RSA/ECC keys)
  • Dedicated Illizeo VPNs for remote administration & backups
  • No third-party/public VPN provider used

3.4Media & encrypted exchanges

  • USB and external storage prohibited
  • Personal cloud (Google Drive, unmanaged Dropbox) prohibited
  • File exchanges via HTTPS platform, fallback SFTP with strong auth
  • TLS emails, PGP/S/MIME for sensitive attachments

4. Data deletion

4.1Deletion in IS

  • 30-day grace period after termination/expiry
  • Automatic deletion (logical purge + physical + index cleanup)
  • Documented manual intervention if auto is not possible
  • Erasure proof (timestamped log) archived for audit

4.2Physical media

  • Destruction by certified third party (ISO/IEC 15408, EAL3+, NCSC)
  • Multiple overwriting + shredding / physical destruction

4.3Printed documents

  • Printing strongly discouraged and restricted
  • Cross-cut shredder DIN 66399 P-4 minimum
  • Secure incineration for large volumes

5. Physical controls

5.1Premises access

  • Premises permanently locked, electronic access control
  • Named badges, time-stamped and traced openings
  • Quarterly entitlement reviews

5.2Visitors & external parties

  • Prior authorisation + reception sign-in + ID document
  • Permanent escort by an authorised employee
  • “VISITOR” badge, in/out traceability

5.3Segmented zones

  • Public zone: free / supervised access
  • Controlled zone: employees only
  • High-risk zone: badge + code/biometrics, permanent CCTV
  • Privacy films on screens/documents

5.4Clear Desk / Clear Screen

  • Auto screen lock after 5–10 min
  • Sensitive documents stored under lock or destroyed
  • Random internal checks

6. Access controls & authentication

6.1Strong authentication

  • Centralised SSO for all internal platforms
  • Mandatory MFA (password + temp code/biometrics)
  • Privileged access: dual managerial validation, time-limited sessions

6.2Password policy (NIST SP 800-63 / ANSSI)

  • Minimum 12 characters, mandatory complexity
  • Renewal every 90 days max
  • Last 5 passwords blocked from re-use
  • bcrypt hashing with random salt

6.3Accounts & logging

  • Shared/generic accounts prohibited
  • Logs: user, IP, action, success/failure, timestamp
  • Stored 30 days minimum in secure SIEM

6.4RBAC model

  • Rights granted by role & documented business needs
  • Annual entitlement review
  • Immediate update on role change
  • Revocation within 24h on departure via SSO

6.5Illizeo access to customer accounts

  • Activation/deactivation by the customer via admin interface
  • No default access without explicit activation (except contractually framed cases)

7. Separability & isolation

7.1Dev / Test / Prod segregation

  • Validation cycle: dev → staging → prod
  • Strictly separated environments, dedicated infra
  • Production debug: Change Management, authorisation, logging, reversibility

7.2Network segmentation

  • Segments: Production, Development, Test/Staging, Internal network, Guest network
  • Distinct physical networks or VLAN/VPC with inter-subnet filtering

7.3Secure multi-tenancy

  • Unique customer ID (company ID/UUID) embedded in all layers
  • Explicit validation in SQL, API, exports, routines
  • Continuous automated integration tests

8. Integrity, transport & traceability

8.1Pseudonymisation & anonymisation

  • No real customer data in dev/test (simulated/anonymised datasets)
  • For bugs requiring real data: exceptional logged process on pseudonymised data

8.2Securing transfers

  • E2EE TLS 1.3+ over public networks
  • WAF + IP filtering at each zone entry
  • Active IDS/IPS, real-time SIEM supervision
  • Encrypted physical media (AES-256) + tamper seals

8.3No unauthorised disclosure

  • Communication only on the customer’s express instruction
  • Sub-processors bound by GDPR art. 28 DPA

8.4Input logging

  • Systematic logs: user, rights, IP, action, module, timestamp
  • Covers: account creations/deletions, rights changes, sensitive exports/transfers
  • Retention 30 days min in encrypted secure environment

9. Availability & continuity

9.1Backups

  • Automatic backup every 24 h
  • Retention 30 days, segregated and encrypted environments
  • Covers: production databases, HR documents, system images
  • Regular restoration tests + real-time monitoring

9.2Geo-redundancy

  • Data & backups hosted in physically separate datacenters (EU/Switzerland)
  • Restoration from backup site according to internal RTO/RPO

9.3Capacity & 24/7 supervision

  • Predictive monitoring CPU/RAM/disks/quotas
  • Real-time alerts to on-call engineers
  • Prometheus/Datadog or equivalent supervision

9.4Incident management

  • Structured process: identification, qualification, prioritisation
  • Personal-data breach notification within 72 h max
  • Crisis-simulation exercises

9.5Datacenters & SLA

  • Providers ISO/IEC 27001 or SOC 2 Type II or BSI C5
  • Redundant power (UPS + generators), fire suppression, redundant cooling
  • Availability SLA > 99.9% for critical infrastructures

10. Recoverability (DRP/BCP)

10.1Restoration tests

  • Full tests planned per business continuity plan
  • Full DB restoration + document integrity + isolated environment
  • Documented results, continuous improvement plans

10.2DRP aligned with ISO 22301

  • Covers: major technical failure, cyberattack, natural disaster
  • Defined RTO/RPO, assigned responsibilities
  • Annual minimum test + reporting to Top Management

11. Compliance, audits & sub-processing

11.1Security team & risk management

  • Multidisciplinary team (security, legal, DPO, operations)
  • Risk register, classification by criticality
  • Periodic reviews + adjustments to threats

11.2External audits & pentests

  • Annual independent audits (ISO 27001, ISO 27701, GDPR art. 28)
  • Continuous automated + manual vulnerability scans
  • Annual external pentests with report, remediation plan and follow-up

11.3Sub-processing framework

  • Processing only on the customer’s written instructions
  • Pre-engagement vendor evaluation (technical, organisational, contractual)
  • Verification of certifications (ISO 27001, SOC 2)
  • GDPR art. 28 clauses, regular audits

12. International transfers (post-Schrems II)

In accordance with GDPR art. 46 and EDPB recommendations, Illizeo applies additional measures to frame any transfer to third countries.

12.1Reinforced confidentiality

  • Double encryption: application (TLS 1.3+) + network (Zero Trust)
  • Geolocated authentication, default-deny from third countries
  • Devices abroad: strict EDR, USB prohibited

12.2Transfer restrictions

  • Transfers to third countries only with explicit customer agreement
  • “Kill Switch” triggerable from the EU, periodically tested

12.3European-only administration

  • Technical administration exclusively by EU/Swiss employees
  • Any action from a third country: European supervision + detailed logging

Legal hub

All our legal documents in one place.

Data Processing Addendum

The standard DPA we sign with our customers.

View →

Sub-processors

List of third parties involved in processing your data.

View →

Privacy Policy

How we collect, use and protect your data.

View →