Hosting and Data Collection Details

Modified on Wed, Oct 29 at 11:52 AM

This document outlines the data collection practices and sovereignty managed by ConnectSecure.


Table of Contents


Overview

This document outlines the data collection practices and sovereignty managed by ConnectSecure.


Data Residency & Local Hosting

  • Our platform supports regional hosting options, enabling partners to store data within their chosen jurisdiction.

  • We offer hosting across various regions, including the US, Canada, UK, EU, AU, and AF, allowing partners the flexibility to select their preferred data location.

  • Compliance: We comply with key regulatory standards, including HIPAA, CCPA, SOC 2, ISO 27001:2022, and other relevant frameworks.


Encryption & Data Control

  • End-to-end encryption ensures data security in transit and at rest.

  • We securely store data related to assets, events, audits, and scans, all necessary for effective vulnerability management, user management.

  • Zero-trust security model prevents unauthorized access and ensures strict security policies.



Hybrid & On-Premise Deployment

  • Organizations that require complete data sovereignty can choose on-premise or private cloud deployments, ensuring critical data remains within their own infrastructure.


Data Processing & Access Controls

  • Fine-grained access controls enable organizations to restrict data access according to user roles and compliance requirements.

  • Comprehensive audit logs ensure transparency by tracking all access activities.


How ConnectSecure Handles Data Privacy and PHI

ConnectSecure agent does not transmit or expose any PHI (Protected Health Information) or sensitive file contents from the host system.

The agent only collects metadata relevant to security and compliance, such as system configuration, vulnerability information, patch status, and other scan results necessary for reporting within the dashboard. No raw files, documents, or PHI are ever uploaded or made visible outside of the host.

Additionally, no one at ConnectSecure—or any external user—has access to the contents of your hosts. The agent operates strictly within its designed security scope, and all communications between the agent and the ConnectSecure platform are encrypted and limited to reporting data.

This ensures compliance with data protection requirements while maintaining full visibility into your security posture without compromising the confidentiality of PHI.


Script Integrity Check

  • The ConnectSecure Agent includes an internal mechanism that verifies the integrity of its scripts using hash-based validation.

  • If any script is tampered with or altered, the agent will automatically re-download the correct version to ensure consistency and security.


Need Support?

You can contact our support team by emailing support@connectsecure.com or visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login

image-20240206-144508.png

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article