Octopi was designed as a solution to allow cargo terminals to securely operate without interruption. Our team of experts continuously test and monitor our systems to prevent downtime and security risks. With Octopi, your data is in good hands.
The 3 Pillars of Trust
Security |
Resilience |
Privacy |
Protecting our infrastructure & data |
Maintaining 24/7 system availability |
Ensuring customer data remains private |
Security
Hardware and Infrastructure Security
Standing on the shoulders of giants.
Octopi is deployed on Amazon AWS, complying with ISO 27001, SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II), PCI Level 1, FISMA Moderate, Sarbanes-Oxley (SOX).
Password Management
Solid password policies and practices
The Octopi team utilizes a password manager to organize shared logins and avoid reusing passwords.
In addition, we never share passwords in clear text. When required to share login credentials, we only share safely using Passpass.co.
Audits and Penetration Testing
Automated Pen Testing & Manual 3rd-Party Audits
Octopi continuously performs penetration testing via Tinfoil Security’s automated service. Additionally, we run manual audits yearly through 3rd-party security consultants.
Data Handling
Your data is secure whether it’s at rest or in motion
Our databases are encrypted at rest with AES-256, block-level storage encryption. All employee devices are encrypted.
Octopi is only available via HTTPS.
Software Development Practices
Built by a team of experienced software developers
Every build of Octopi runs through static analysis tools which scans for security issues, detects dependency vulnerabilities, and prevents deploying security holes.
Employee Training
Security is baked into Octopi’s DNA and culture
Octopi employees are tested on their security knowledge upon joining and attend regular security trainings to stay vigilant and informed of modern threats.
Resilience
High Availability Database
Database Cluster
When a primary database with this feature fails, it is automatically replaced with another replica database called a standby. High Availability standbys are physically located in a different availability zone (AZ) to protect against AZ-wide failures.
Database Backups
Our PostgreSQL databases use physical backups for continuous protection by persisting binary copies of the database cluster files, also known as base backups, and write ahead log (WAL) files to external, reliable storage. All databases managed by Octopi use continuous protection by persisting base backups and WAL files to Amazon S3.
Database Followers
A database follower is a read-only copy of the leader database that stays up-to- date with the leader database data. As writes and other data modifications are committed in the leader database, the changes are streamed, in real-time, to the follower databases.
Twelve-Factor Application
Web application best practices
The twelve-factor is a methodology for building software-as-a-service (SaaS) applications. These best practices are designed to enable applications to be built with portability and resilience when deployed to the web.
Logical Backups
Daily, weekly & monthly backups
We perform daily, weekly, and monthly logical backups of our PostgreSQL databases against our follower databases.
We retain 7 days of daily backups, 8 weeks of weekly backups, and 12 months of monthly backups.
Application Monitoring
Uptime and error monitoring
We monitor application uptime, performance, security, and errors using a variety of modern tools. Our team of engineers remain on-call 24/7, receiving real-time notifications of any unusual activity.
Privacy
GDPR Compliant
We securely host the minimum required customer information — name, email address, and phone number. Customer information is never shared without explicit consent.
Octopi is not in the business of selling our customer data.
PSIRT Security Officers
During the onboarding process, a Security Officer is assigned at your location. This is the designated person who works at the terminal and is responsible for communicating security issues with us.
The Security Officer can report security-related concerns and incidents by submitting a ticket to our Customer Success team.
Managing a users, roles, and permissions
Octopi allows you to quickly remove a user, or change their permissions access level, while preserving data integrity of their recorded past activity. Please review the following guides for detailed steps.
Reporting security-related incidents or concerns
If an incident or concern arises that relates to security in Octopi, please report it to our Customer Success Team immediately.