Brihat Infotech Logo
Security & Governance

We Take Security Seriously

Every system we build is designed with security from the ground up — not bolted on at the end. Here is how we protect your data, your users, and your business.

Our Practices

Security at Every Layer

From code to cloud, we apply security controls at every level of the systems we design and build.

Secure Development Lifecycle

Security is built into every stage of our development process — from architecture review and threat modeling to code review and pre-deployment testing. We follow OWASP guidelines and conduct regular security audits on all projects.

Data Protection & Encryption

All sensitive data is encrypted at rest (AES-256) and in transit (TLS 1.3). We never store plain-text passwords. Personally identifiable information (PII) is handled in compliance with applicable data protection regulations including GDPR and India's DPDP Act.

Access Control & Authentication

We implement role-based access control (RBAC) across all systems we build. Authentication follows industry best practices including JWT with short expiry, refresh token rotation, multi-factor authentication (MFA) where required, and OAuth 2.0 for third-party integrations.

Infrastructure Security

Systems we deploy run on isolated cloud environments with private VPCs, security groups, and minimal attack surface. We configure firewalls, disable unused ports, and enforce principle of least privilege for all service accounts and IAM roles.

Code Review & Dependency Audits

All code changes go through peer review before merge. We run automated vulnerability scans on dependencies using tools like npm audit, Snyk, and Dependabot. Known vulnerabilities are triaged and patched within defined SLA windows.

Incident Response

We maintain a documented incident response plan for all production systems we manage. Critical security incidents are escalated immediately with a defined communication timeline. Post-incident reviews are conducted within 48 hours.

Compliance

Regulatory Alignment

We build systems that meet the compliance requirements of the markets you serve.

GDPR

For clients serving EU users, we build systems compliant with GDPR requirements including consent management, data subject rights, and data processing agreements.

India DPDP Act 2023

We align data handling practices with the Digital Personal Data Protection Act, including lawful basis for processing and data principal rights.

OWASP Top 10

All web applications are audited against the OWASP Top 10 vulnerabilities including SQL injection, XSS, insecure deserialization, and broken access control.

SOC 2 Ready

Our internal practices align with SOC 2 trust principles (Security, Availability, Confidentiality). We can support clients during their SOC 2 certification process.

Our Commitments

What We Promise Every Client

Beyond technical controls, these are our contractual and ethical commitments to every client we work with.

1

We sign NDAs before any project discussion involving proprietary information.

2

Source code and project deliverables are the intellectual property of the client upon final payment.

3

We do not retain or reuse client data, code, or architecture in other projects.

4

Production credentials and secrets are managed via environment variables and secrets managers — never stored in code.

5

We use isolated development environments and never cross-pollinate client data.

6

Security findings discovered during our engagement are disclosed to the client immediately.

Responsible Disclosure

If you discover a security vulnerability in any system built or maintained by Brihat Infotech, we ask that you report it to us responsibly. We commit to acknowledging your report within 48 hours and working with you to resolve it promptly.

security@brihatinfotech.com

Building Something That Needs to Be Secure?

We help you architect and build systems with security built in from day one.