Trust
Security

We follow extensive administrative, operational and configuration practices to track and protect your information through a comprehensive set of security controls and practices. Our dedicated security team continuously improves our development, security operations and threat-mitigation practices to detect and prevent new security threats to safeguard your data.
Our Secure by Default and Secure by Design strategies encompass more than 140 protocols across the following principles:
- Least Privilege.
- Need-To-Know.
- Least Trust.
- Mandatory Access Control.
- Segregation of Duties.
- Full Lifecycle Approach.
- Comprehensive Threat Analysis.
- Security Built into the System Architecture.
- Regular Vulnerability Review.
- Rigorous Security Testing.
Security isn’t about checking the boxes, it’s the foundation for what we do and a reflection of our core values.
As part of this we have defined a series of programs across our various security capabilities to maximize specialization and cross-company collaboration, through which our security teams participate in:
- Product security and building a secure software development lifecycle.
- Infrastructure security.
- Security and threat intelligence.
- Red, purple and blue teams.
- Security operations.
- Security architecture.
- Threat hunting.
- Incident response.
- Security awareness and training.
- Dark web investigation.
Related Resources
Learn about service offerings and solutions from FTI: