BoltCare’s Information Privacy
and Security Policy
1. Purpose
The Objective of BoltCare’s Information Privacy and Security Policy is to outline the administrative, technical, and physical safeguards applicable to the various types of information owned by Bolt Today.
The purpose of this policy is to,
- Ensure security, confidentiality, integrity, and availability of information according to its classification
- Protect against any anticipated threats or hazards to the security, confidentiality, and availability of Bolt Today System
- Protect against unauthorized use of information / access
2. Manage User Authentication and Authorization
- Practice the principle of least privilege. Grant necessary privileges only
- Lock and expire default (predefined) user accounts
3. Managing Security for Application Developers
- Force users to create strong passwords
- Limit the ability of the user to reuse old passwords
- A limited lifetime of passwords
- Enable case sensitive passwords
4. Manage Fine-Grained Access to Salesforce
- Configure fine-grained access control when access to external network service is needed from the Database
- Certificates are managed by Salesforce.
- Configure by Salesforce admin
- Revoke by Salesforce admin
5. Controlling Access to Data
- Use application context to retrieve user information
- Use Salesforce in-build capability to control DB
- Use Shield Platform Encryption for any sensitive data
6. Salesforce Cloud Security
Security
Salesforce Cloud services provide a highly secure environment for physical security and operating systems.
Their application services implement authentication, identity, and user permissions. They also offer an additional layer of trust with
Salesforce Shield, including Platform Encryption, Event Monitoring, and Field Audit Trail.
Password Policies
- Salesforce Cloud enforces
- Strong password policies
- Minimum password length
- Password complexity
- Challenge questions
- Regular password changes
SFCS is protected by,
- Design-time and runtime security.
- Only authorized users can access the web console at design time or invoke integrations at runtime.
7. Web Services Security
A secure communication channel requires with the application while sending and receiving messages from your application.
Applications gate their services through security policies such as HTTPS Basic or WS Security-based authentication.