Envar LLC

Security
Policy

Access Control

  • Assign user roles and permissions aligned with individual job duties.
  • Employ robust authentication methods, including multi-factor authentication (MFA), particularly for authorized-drawer roles.
  • Regularly revise and update user permissions to adhere to the principle of least privilege.
  • Restrict direct access to critical directories and files via stringent server configuration.

Vulnerability and Incident Management

  • Quickly address software updates, including updates to web servers, CMS, plugins, and other critical components.
  • Develop a streamlined process for responding to and rectifying newly discovered security vulnerabilities.
  • Develop a comprehensive incident response plan detailing the procedures for managing security breaches.
  • Assign a dedicated response team with clearly defined roles and responsibilities.
  • Regularly execute drills and simulations to evaluate the effectiveness of the incident response strategy.

Security Monitoring and Physical Controls

  • Implement intrusion detection and prevention systems to monitor and counteract malicious activities.
  • Regularly check system, server, and network logs to spot signs of unauthorized access or irregular activities.
  • Set up real-time alerts to immediately inform administrators of potential security incidents.
  • Secure physical servers in locations with limited access to authorized personnel only.
  • Apply stringent environmental controls to prevent unauthorized access and equipment tampering.

Education and Solana Security Assurance

  • Provide ongoing training on security best practices, emphasizing the importance of phishing awareness and secure password practices.
  • Inform users about the dangers of divulging sensitive information and credentials.
  • Consistently monitor and update these services to prevent them from becoming security liabilities.
  • Continually educate and train on the specific security challenges unique to the Solana blockchain, ensuring our practices are up-to-date and tailored to provide a secure environment for our customers.