Access to systems, networks and data is managed through group based access control, provided on a least privilege basis and with segregation of duties applied. Any requests over and above what is automatically provided, such as elevated rights, can only be given with business justification and requires management approval. All access is audited depending on the classification of the asset.
All accounts are unique and identifiable – sharing logins is a breach of policy and liable to disciplinary action.
Access to our resources is managed through our identity platform leveraging Multi-Factor Authentication (MFA).
Access to program and infrastructure source code is limited to our platform team. Source code relating to the delivery of services is limited to our service delivery team. All source code is version controlled using industry standard code versioning tools.
We do not permit third parties to access our network unless required to support one of our own systems. We do not permit access to client data by temporary staff or contractors.
Need further support?
If you still require assistance with us or have any further questions, please raise a ticket with our support team.
Alternatively, please see our frequently updated knowledge base articles for reference.