Security at SZG Labs
Effective Date: March 8, 2026
At SZG Labs, security is not an afterthought. It is built into our architecture and delivery processes. Whether we are routing mission-critical data through EDI Nexus or engineering cloud infrastructure, we apply enterprise-grade security controls to protect intellectual property and data integrity.
1. Infrastructure and Hosting
Our products and delivery environments are built on Amazon Web Services (AWS), leveraging enterprise cloud controls.
- Physical security: Cloud provider facilities include controlled access and continuous monitoring.
- Environment isolation: Logical separation of customer data and dedicated virtual private cloud boundaries.
- High availability: Redundant architecture across multiple availability zones to reduce single points of failure.
2. Data Protection
We treat customer data as a critical asset and apply layered protections.
- Encryption in transit: TLS 1.2+ for web traffic and secure protocols such as SFTP and AS2 for EDI exchanges.
- Encryption at rest: Sensitive data stored on encrypted disk volumes using AES-256.
- Key management: Automated, managed key lifecycle controls through cloud KMS services.
3. Engineering and DevOps Practices
Security is integrated into development and operations from the beginning.
- Infrastructure as Code (IaC): Terraform-managed infrastructure with version control and peer review.
- Principle of least privilege: Access to customer environments is scoped to minimum required permissions.
- MFA enforcement: Multi-factor authentication required for administrative accounts and sensitive systems.
4. Workstation and Internal Security
- Device encryption: Full-disk encryption on engineering workstations.
- Credential security: Enterprise password management and hardware-backed security keys for privileged access.
- Zero-trust approach: Production data is not stored on local devices; development and testing are performed in controlled environments.
5. Compliance and Monitoring
- DPA support: Data Processing Addendum (DPA) available with engagements where required.
- Regulatory alignment: Security and privacy practices are designed to support obligations under frameworks such as CCPA and GDPR where applicable.
- Continuous monitoring: Automated cloud posture and vulnerability monitoring to detect and address risk.
6. Contact
For security-related questions, contact [email protected].