Veridian Data Systems is built with security at its core. We implement industry-leading practices to protect your data and maintain compliance with regulatory standards.
Independently audited for security, availability, and confidentiality controls
Prepared for federal government cloud security requirements
Registered in the System for Award Management for federal contracting
GDPR
Compliant
CCPA
Compliant
HIPAA
Ready
NAIC
Aligned
Trust Services Criteria
Veridian has achieved SOC 2 Type II certification, demonstrating our commitment to maintaining the highest standards of security, availability, processing integrity, confidentiality, and privacy. Our annual audits are conducted by independent third-party auditors.
Protection against unauthorized access through logical and physical controls, including firewalls, intrusion detection, and multi-factor authentication.
Systems are available for operation and use as committed, with 99.9% uptime SLA backed by redundant infrastructure and disaster recovery procedures.
System processing is complete, valid, accurate, timely, and authorized. All data generation follows validated algorithms with quality assurance.
Information designated as confidential is protected as committed through encryption, access controls, and data handling procedures.
Request Audit Report: Enterprise customers may request a copy of our SOC 2 Type II audit report under NDA. Contact [email protected] for access.
Industry-standard encryption at every layer
All data transmitted between your systems and Veridian is encrypted using TLS 1.3, the latest and most secure transport layer protocol.
All stored data is encrypted using AES-256 encryption. Database fields containing sensitive information use additional application-level encryption.
Encryption keys are managed using hardware security modules (HSMs) with automatic key rotation. Keys are never stored alongside encrypted data.
Multi-layered defense architecture
Principle of least privilege
MFA required for all employee access. Support for hardware keys, authenticator apps, and biometric verification.
Granular RBAC ensures employees only access systems and data necessary for their role. Regular access reviews conducted quarterly.
Comprehensive audit trails for all system access and data operations. Logs retained for 12 months with tamper-proof storage.
Prepared for any scenario
Veridian maintains a comprehensive incident response plan with defined procedures for detection, containment, eradication, and recovery. Our security team is available 24/7 to respond to potential incidents.
| Severity | Initial Response | Customer Notification |
|---|---|---|
| Critical | 15 minutes | 1 hour |
| High | 1 hour | 4 hours |
| Medium | 4 hours | 24 hours |
| Low | 24 hours | 72 hours |