At Mentornity, security and the protection of personal data are of utmost importance. We continuously work to ensure these aspects are well managed. Below, you will find our policies regarding these practices.
This document provides a comprehensive overview of Mentornity's security practices, including data security, operational security, software security, and infrastructure security and monitoring protocols.
This document provides an overview of log management practices at Mentornity. It details the types of logs generated, the data stored within these logs, and the policies regarding data retention and anonymization to ensure user privacy.
This document explains the precautions applied to Mentornity systems to secure them against the top 10 security risks outlined by OWASP, including proper handling of API requests, secure server configurations, and maintaining up-to-date components.
This plan enhances Mentornity's ability to manage cybersecurity risks across its supply chain, ensuring information security and privacy in relationships with suppliers. It includes strategies for policy definition, supplier security risk assessments, continuous monitoring, and communication procedures.
https://docs.mentornity.com/Supply-Chain-Risk-Management-Plan.pdf
This policy outlines procedures and actions to minimize the impact of a cybersecurity incident. It covers all phases from detection to recovery, ensuring effective communication with internal and external stakeholders and continuous improvement of incident response processes.
This policy defines the steps to restore systems and operations following a cybersecurity incident. It includes recovery planning, roles and responsibilities, communication during recovery, and continuous improvement processes to ensure business continuity.