Security Practices | Freedcamp
We take the security of your data very seriously at Freedcamp. As transparency is one of the principles on which our company is built, we aim to be as clear and open as we can about the way we handle security.
If you have additional questions regarding security, we are happy to answer them. Please write to email@example.com and we will respond as quickly as we can.
All of our employees are bound to our policies regarding User Data and we treat these issues as matters of the highest importance within our company.
Freedcamp conducts background checks on all employees before employment.
The environment that hosts the Freedcamp services maintains multiple certifications for its data centers, including ISO 27001 compliance, PCI Certification, and SOC reports. For more information about their certification and compliance, please visit the AWS Security website and the AWS Compliance website.
Security Features for Team Members & Administrators
Deletion of User Data
Return of User Data
In addition to the work we do at the infrastructure level, we provide Team Administrators of paid versions of the Freedcamp services with Backup service to protect their User Data. Information about the backup capabilities of the Freedcamp services can be found at our Help Center.
Data Encryption In Transit and At Rest
The Freedcamp services support the latest recommended secure cipher suites and protocols to encrypt all traffic in transit and rest. We monitor the changing cryptographic landscape closely and work promptly to upgrade the service to respond to new cryptographic weaknesses as they are discovered and implement best practices as they evolve.
We understand that you rely on the Freedcamp services to work. We're committed to making Freedcamp a highly-available service that you can count on. Our infrastructure runs on systems that are fault tolerant, for failures of individual servers or even entire data centers. Our operations team tests disaster-recovery measures regularly and staffs an around-the-clock on-call team to quickly resolve unexpected incidents.
User Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure availability. We have well-tested backup and restoration procedures, which allow recovery from a major disaster. User Data are automatically backed with an ability to recover data with one minute precision for the last 30 days.
In addition to sophisticated system monitoring and logging, we are running Security-Enhanced Linux (SELinux)* in enforcing mode. Firewalls are configured according to industry best practices and unnecessary ports are blocked by configuration with AWS Security Groups.
* - Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC)
We regularly patch our hosts and databases and run automatic intrusion detection system on all of our hosts and remediate any findings that present a risk to our environment.
Freedcamp maintains an extensive, centralized logging environment in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about the Freedcamp services.
Incident Management & Response
In the event of a security breach, Freedcamp will promptly notify you of any unauthorized access to your User Data. Freedcamp has incident management policies and procedures in place to handle such an event.
External Security Audits
We contract with two respected external security firms who perform regular audits (four times a year) of the Freedcamp services to verify that our security practices are sound and to monitor the Freedcamp services for new vulnerabilities discovered by the security research community. In addition to periodic and targeted audits of the Freedcamp services and features, we also employ the use of continuous hybrid automated scanning of our web platform.