Incident Response Plan
We have implemented a formal procedure for security events and have educated all our staff on our policies. When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
After a security event is fixed we write up a post-mortem analysis. The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
WasteHero will promptly notify you in writing upon verification of a security breach of the WasteHero services that affects your data. Notification will describe the breach and the status of WasteHero’s investigation.
Build Process Automation
We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes. We typically deploy code daily, so we have high confidence that we can get a security fix out quickly when required.
WasteHero runs both services in the cloud and on WasteHero owned and operated servers. WasteHero utilizes Cloudflare as its DNS provider. All of our services and data are hosted and stored on a server hosted by the beforenamed hosting provider and all servers are located within the European Union. All of our infrastructure is spread across 2 or more data centers and will continue to work should one of those data centers fail unexpectedly.
See https://www.hetzner.com/ for more information.
All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network. WasteHero uses a backup solution for datastores that contain customer data.
WasteHero services and data are hosted on Hetzner Server facilities in the European Union. Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation). We have many unit and integration tests in place to ensure these privacy controls work as expected. These tests are run every time our codebase is updated and even one single test failing will prevent new code being shipped to production.
Each WasteHero system used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
WasteHero engages certain subprocessors to process customer data. WasteHero is a data processor and engages certain onward subprocessors that may process personal data submitted to WasteHero’s services by the controller. These subprocessors are listed below, with a description of the service and the location where data is hosted. This list may be updated by WasteHero from time to time:
- Hetzner Hosting and storage (EU)
- Twilio, Inc. SMS functionality (USA)
All data sent to or from WasteHero is encrypted in transit using 256-bit encryption. Our API and application endpoints are TLS/SSL only and score an “A+” rating on SSL Labs’ tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled. We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
WasteHero is served 100% over https. WasteHero runs a zero-trust corporate network. There are no corporate resources or additional privileges from being on WasteHero’s network.
Permissions and Admin Controls
WasteHero enables permission levels to be set for any employees with access to WasteHero. Permissions and access can be set on a project level to include asset management, fleet management, operation management and user management permissions.
On an application level, we produce audit logs for all activity, ship logs to our service providers for analysis, and use S3/Glacier for archival purposes. All access to WasteHero applications is logged and audited. Bastion hosts are used to login to devices. All actions taken on production consoles or in the WasteHero application are logged.
Security Audits and Certifications
We bi-annually engage with well-regarded third-party auditors to audit our code-base, and work with them to resolve potential issues.
We use technologies to provide an audit trail over our infrastructure and the WasteHero application. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
WasteHero ApS complies with the Cloud Security Alliance (CSA) published best practices.
All payment instrument processing for purchase of the WasteHero services is performed by Stripe. For more information on Stripe’s security practices, please see Security at Stripe.
- Managing your own user accounts and roles from within the WasteHero services.
- Protecting your own account and user credentials by using a strong password for all of your employees accessing the WasteHero services.
- Compliance with the terms of your services agreement with WasteHero, including with respect to compliance with laws.
- Promptly notifying WasteHero if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the WasteHero services or your account.
- You may not perform any security penetration tests or security assessment activities without the express advance written consent of WasteHero.