Security at SZG Labs

Effective Date: March 8, 2026

At SZG Labs, security is not an afterthought. It is built into our architecture and delivery processes. Whether we are routing mission-critical data through EDI Nexus or engineering cloud infrastructure, we apply enterprise-grade security controls to protect intellectual property and data integrity.

1. Infrastructure and Hosting

Our products and delivery environments are built on Amazon Web Services (AWS), leveraging enterprise cloud controls.

  • Physical security: Cloud provider facilities include controlled access and continuous monitoring.
  • Environment isolation: Logical separation of customer data and dedicated virtual private cloud boundaries.
  • High availability: Redundant architecture across multiple availability zones to reduce single points of failure.

2. Data Protection

We treat customer data as a critical asset and apply layered protections.

  • Encryption in transit: TLS 1.2+ for web traffic and secure protocols such as SFTP and AS2 for EDI exchanges.
  • Encryption at rest: Sensitive data stored on encrypted disk volumes using AES-256.
  • Key management: Automated, managed key lifecycle controls through cloud KMS services.

3. Engineering and DevOps Practices

Security is integrated into development and operations from the beginning.

  • Infrastructure as Code (IaC): Terraform-managed infrastructure with version control and peer review.
  • Principle of least privilege: Access to customer environments is scoped to minimum required permissions.
  • MFA enforcement: Multi-factor authentication required for administrative accounts and sensitive systems.

4. Workstation and Internal Security

  • Device encryption: Full-disk encryption on engineering workstations.
  • Credential security: Enterprise password management and hardware-backed security keys for privileged access.
  • Zero-trust approach: Production data is not stored on local devices; development and testing are performed in controlled environments.

5. Compliance and Monitoring

  • DPA support: Data Processing Addendum (DPA) available with engagements where required.
  • Regulatory alignment: Security and privacy practices are designed to support obligations under frameworks such as CCPA and GDPR where applicable.
  • Continuous monitoring: Automated cloud posture and vulnerability monitoring to detect and address risk.

6. Contact

For security-related questions, contact [email protected].