Security Overview

ClearGrid maintains the highest standards of security and compliance to protect your data and ensure regulatory adherence. Our framework covers all aspects of data handling and system security.

Authentication & Access Control

Single Sign-On (SSO)

ClearGrid uses SAML 2.0–based SSO via JumpCloud for centralized authentication.

  • Centralized Identity Management: One login across all ClearGrid services

  • Enhanced Security: Eliminates password-related risks

  • Seamless Access: Authenticate once, access all authorized resources

  • Auditability: Full logging of authentication events

  • Integration Ready: Works with most identity providers

Implementation Highlights

  • Encrypted assertion exchange

  • Real-time user provisioning/de-provisioning

  • Automatic session management

  • Support for IdP-initiated and SP-initiated flows

Multi-Factor Authentication (MFA)

Mandatory for all accounts:

  • SMS-based codes

  • Authenticator apps (Google Authenticator, Authy)

  • Hardware tokens

  • Backup authentication methods

  • Risk-based adaptive MFA

Role-Based Access Control (RBAC)

Granular, role-specific permissions ensure least-privilege access. User Roles:

  • Administrator: Full access

  • Manager: Portfolio oversight

  • Agent: Day-to-day collections

  • Analyst: Read-only for reporting

  • API User: Programmatic integrations

Permissions include account-level controls, feature-based restrictions, data visibility filters, and time-based access rules.

API Authentication

  • OAuth 2.0: Secure flows (client credentials, authorization code) with automatic token refresh and scope-based permissions

  • API Keys: Securely generated, rotated, and environment-specific (dev/prod)

  • Rate Limiting: Abuse and DoS protection

  • Monitoring: Usage tracking and alerts


Data Protection

Encryption

  • In Transit: TLS 1.2+, Perfect Forward Secrecy (PFS), certificate pinning, encrypted DB connections, secure SFTP/HTTPS

  • At Rest: AES-256, database and filesystem encryption, encrypted backups, key rotation policies

Data Classification

ClearGrid categorizes data into Highly Sensitive, Sensitive, Internal, and Public, applying controls accordingly.

  • Automated classification and tagging

  • DLP policies for prevention of unauthorized transfers

  • Secure data disposal procedures

  • Cross-border transfer controls

Data Residency & Sovereignty

  • Multiple geographic data centers

  • Data localization options for compliance

  • Sovereignty guarantees with legal protections

  • Regulatory alignment across jurisdictions


Infrastructure Security

Cloud Security Architecture

  • Isolated environments (network segmentation)

  • Firewalls with advanced threat detection

  • Intrusion detection and monitoring

  • DDoS protection

  • Load balancing and redundancy

Security Monitoring & Incident Response

  • 24/7 SOC with real-time monitoring and automated alerts

  • Defined incident response plan: containment, forensic investigation, escalation, remediation, and communication procedures

Vulnerability Management

  • Regular penetration testing by independent firms

  • Continuous vulnerability scanning

  • Secure code reviews (static/dynamic analysis)

  • Dependency and library monitoring

  • Managed patch updates


Compliance & Certifications

Certifications

  • SOC 2 Type II: Independently audited controls, continuous monitoring, customer reports available

  • ISO 27001: Global standard for information security, with regular audits and risk assessments

Regulatory Alignment

  • GDPR: Rights to access, rectify, erase, and port data; DPIAs; breach notifications

  • CCPA and PIPEDA: Full compliance with regional data rights

  • Banking & Financial Regulations: Jurisdiction-specific compliance mapping

Data Processing Agreements (DPAs)

  • Defined purposes for processing

  • Retention and disposal rules

  • Sub-processor management

  • Data transfer mechanisms

  • Liability and indemnification terms


Monitoring & Auditing

Audit Logging

Immutable logs across all activities:

  • Authentication & authorization events

  • Data access and changes

  • Configuration updates

  • API usage

  • Administrative actions

Logs are centralized, encrypted, and retained long-term for compliance reporting.

Continuous Monitoring

  • User behavior analytics

  • Anomaly and threat detection

  • Real-time compliance status tracking

  • Performance and availability monitoring

Regular Security Reviews

  • Quarterly internal security assessments

  • Annual penetration testing

  • Continuous risk assessments

  • Ongoing staff security training


Privacy & Data Rights

ClearGrid implements Privacy by Design principles.

Data Subject Rights

  • Access, rectification, erasure, portability, objection

  • Clear opt-out processes

  • Verified response procedures

Privacy by Design Measures

  • Data minimization

  • Purpose limitation

  • Storage limitation

  • Integrity and confidentiality safeguards


Business Continuity & Disaster Recovery

  • High Availability: Multi-region deployment, load balancing, DB replication, 99.9% uptime

  • Disaster Recovery: RTO ≤ 4 hours, RPO ≤ 1 hour, automated backup/restore, geo-distributed backups

  • Regular DR testing for assurance


Security Awareness

Staff Training

  • Security awareness & phishing simulations

  • Incident response readiness

  • Compliance and role-specific training

Customer Security Resources

  • Security best practices

  • Integration security guidelines

  • Compliance documentation

  • Assistance with security questionnaires

  • Regular updates and advisories

Last updated