Organizational Security

Information Security Program

Yariex Group Corp maintains an Information Security Program that aligns with the SOC 2 framework, ensuring client data's confidentiality, integrity, and availability. This program is regularly communicated to maintain a strong security posture.

Third-Party Audits

We will undergo third-party audits as part of our SOC 2 certification process to independently validate our security and compliance controls.

Third-Party Penetration Testing

We conduct third-party penetration tests biannually to ensure our security posture remains uncompromised.

Roles and Responsibilities

All roles and responsibilities related to security and data protection at Yariex are clearly defined and documented. Our team members regularly review and follow security policies in line with SOC 2 compliance requirements.

Security Awareness Training

All employees must complete security awareness training covering industry-standard practices such as phishing, password management, and secure coding practices.

Confidentiality

All team members sign a confidentiality agreement upon joining Yariex to protect sensitive information.

Background Checks

We perform background checks on all new hires in accordance with local laws to maintain the security and integrity of our team.

Cloud Security


Cloud Infrastructure Security

Our services are hosted on Amazon Web Services (AWS), which provides a robust security infrastructure with multiple certifications, including SOC 2. For more information, please visit AWS Security.

Data Hosting Security

We store all data in AWS data centers within regions that meet our data sovereignty and privacy requirements, ensuring that sensitive information remains protected in the appropriate jurisdictions. AWS allows us to control data residency by selecting specific regions to host our data, ensuring compliance with regulations such as PIPEDA (Canada), GDPR (EU), and other applicable laws as required. For more information, refer to AWS Security Documentation.

Encryption at Rest

All databases storing sensitive information are encrypted at rest to prevent unauthorized access.

Encryption in Transit

All communications and data transfers between our applications and servers are encrypted using TLS/SSL to ensure data security during transmission.

Vulnerability Scanning

We perform quarterly internal vulnerability scans, with third-party scans scheduled biannually once the platform is production-ready, to identify and address potential security risks proactively.

Logging and Monitoring

We actively log and monitor critical events across our infrastructure to detect and mitigate potential threats in real time.

Business Continuity and Disaster Recovery


Backup Services

Our data is continuously backed up using reliable backup services, ensuring that any hardware failure does not result in data loss.

Incident Response

Yariex has an Incident Response Plan that includes escalation procedures, mitigation strategies, and communication protocols to ensure rapid response to security incidents.

Access Security


Permissions and Authentication

Access to our cloud infrastructure, GitHub, and internal tools is restricted to authorized personnel only, using the principle of least privilege.

SSO, 2FA, and Strong Passwords

We use Single Sign-On (SSO) and Two-Factor Authentication (2FA) to enhance security, combined with strong password policies across all systems.

Quarterly Access Reviews

We review user access to sensitive systems quarterly to ensure permissions remain appropriate based on job roles.

Password Managers

Team members must use password managers on company-issued devices to securely store and manage credentials.

Vendor and Risk Management


Annual Risk Assessments

Yariex conducts annual risk assessments to identify and mitigate potential risks, including security vulnerabilities and fraud.

Vendor Risk Management

Before engaging with third-party vendors, we perform comprehensive vendor risk assessments to ensure they meet our security and compliance standards.

Contact Us


If you have any questions, comments, or concerns regarding security or to report a potential security issue, please get in touch with our support team at [email protected].