REOL Services Security, Compliance and Governance

Last Updated: Tuesday, 01 January 2017 02:43AM v091bh12


All of our clients entrust us with management, storage and manipulation of their sensitive data and confidential business processes. As such, operational and application security and performance are paramount to us and we continuously implement new technologies and methods to proactively detect and eliminate external and internal threats.

We strive to ensure that user data is kept securely, and that we collect only as much personal data as is required to provide our services to clients in an efficient and effective manner.

We use some of the most advanced technology for Internet security that is commercially available today. The policies are implemented using the guidelines published by the following authoritative governing bodies:

  • NSA/CSS Information Assurance Directorate (manageable network plan v4)
  • NSA/CSS Guidelines for secure REST Implementations
  • NSA/CSS Guidelines for secure RHEL operation (v5)
  • AWS Cloud Compliance Risk & Compliance Review
  • AWS Cloud Compliance Automating Governance in AWS
  • OCIE OSEC/IE Cyber-security Audit Guide
  • SEC Cyber-security Initiative Audit Guide
  • AWS BP Security at Scale: Governance in AWS
  • AWS BP Security at Scale: Logging in AWS

This Compliance Section is aimed at being transparent about our security infrastructure and practices to help reassure you that your data is appropriately protected.

Quick Start