Security

Overview of the security principles S4Ready follows when handling migration data.

Access control & RBAC

Role-based access control ensures that stewards, approvers, and admins only see the data and actions they need.

  • Role-tailored views for stewards, process owners, and viewers.
  • PII masking for sensitive fields outside privileged roles.
  • Audit logs for configuration changes and key workflow events.

Data protection & audit

Migration data is treated as sensitive by default with immutable audit logs and long-term retention options.

  • WORM-style audit trails with tamper‑evident hashing in supported deployments.
  • Configurable retention policies per environment and project.
  • Explicit capture of approvals and export-anyway decisions.

Deployment & encryption

S4Ready is designed for secure deployments in customer-controlled infrastructure or trusted cloud environments.

  • TLS for data in transit; encryption for storage handled by the hosting environment.
  • Segregated environments for dev, test, and production projects.

Data residency

Production deployments are hosted in EU data centres to support GDPR and KVKK compliance requirements.

  • All customer data stored and processed within EU regions.
  • No cross-border transfers outside the EU/EEA without explicit agreement.
  • Customers retain full control over storage locations and retention policies.
Download our DPA template

Fenikstech provides a standard Data Processing Agreement template. Contact us to execute a signed copy.

Download security questionnaire

A pre-filled security assessment based on common enterprise requirements. Contact us for additional details.