Ensuring that our platform remains secure is imperative to our business. Our highest priority is protecting your data and your privacy. Every recipe-costing.com employee must sign a Data Access Policy that binds them to the terms of our data confidentiality policies, available at terms and privacy. Access rights are based on employee’s job function and role.
Our security strategy covers all aspects of our business and includes the following:
- Software Development Lifecycle
- Hosting Security
- Data Rights
- How to Contact Recipe Costing Software about Security Questions
- How to Report a Security Incident
Recipe-Costing.com uses Rackspace and Amazon Web Services to manage user data. Recipe-Costing.com utilizes both cloud and physical servers in our infrastructure. Our physical servers are located in Tier-4 data centers with full power, cooling, and network redundancy.
Software Development Lifecycle
Recipe-Costing.com uses the git revision control system. Changes to recipe-costing.com code base begin at our development servers undergo automated tests and are reviewed by our management development team. Once the code passes the testing system, changes are moved to our staging (beta) servers where our tech support team test all changes prior to moving it to our production servers. We also work with security professionals to test our code for common exploits and network scanning tools against our production servers.
We value your data, and we work hard to protect it. RackSpace provides recipe-costing.com multiple network hosts, multiple locations with regularly scheduled backups. Data is replicated with multiple redundancies and protected by bio metric locks, hardware and software fire walls, multiple layers of access security, and 24×7 interior and exterior surveillance. As an extra precaution, we take regular snapshots of the database and securely move them to a separate data center so that we can restore our software and database in the event of a regional failure.
Only our software engineering management teams have access to our production environment and our software engineering teams have access to our staging and beta sites. VPN, SSH keys and 2-Step Verification are required for console access to servers in all of our environments. Automated processes are in place to monitor hosting environments, unauthorized login attempts and IP addresses that are automatically blacklisted.
Recipe-Costing.com. uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run recipe-costing.com. Kitchen Porter Tech LLC d/b/a Recipe-Costing.com owns the code, database, recipe-costing.com application and you retain rights to your data.
How to Contact Recipe-Costing.com about Security Questions
Web: https://wordpress-99707-358481.cloudwaysapps.com – Look for chat
How to Report a Security Incident
To report incidence abuse, misuse, or a security breach or on a single account, please contact Recipe-Costing.com chat.
Certifications and Standards
RackSpace adheres to the following information security and related certifications and standards.
- ISO 27002
- ISO 27001
- PCI-DSS (PAYMENT CARD INDUSTRY DATA SECURITY STANDARD)
- SAFE HARBOR
- CONTENT PROTECTION AND SECURITY STANDARD (CPS)
- SOC 1
- SOC 2
- SOC 3