Security
Overview of the security principles S4Ready follows when handling migration data.
Access control & RBAC
Role-based access control ensures that stewards, approvers, and admins only see the data and actions they need.
- Role-tailored views for stewards, process owners, and viewers.
- PII masking for sensitive fields outside privileged roles.
- Audit logs for configuration changes and key workflow events.
Data protection & audit
Migration data is treated as sensitive by default with immutable audit logs and long-term retention options.
- WORM-style audit trails with tamper‑evident hashing in supported deployments.
- Configurable retention policies per environment and project.
- Explicit capture of approvals and export-anyway decisions.
Deployment & encryption
S4Ready is designed for secure deployments in customer-controlled infrastructure or trusted cloud environments.
- TLS for data in transit; encryption for storage handled by the hosting environment.
- Segregated environments for dev, test, and production projects.
Data residency
Production deployments are hosted in EU data centres to support GDPR and KVKK compliance requirements.
- All customer data stored and processed within EU regions.
- No cross-border transfers outside the EU/EEA without explicit agreement.
- Customers retain full control over storage locations and retention policies.
Download our DPA template
Fenikstech provides a standard Data Processing Agreement template. Contact us to execute a signed copy.
Download security questionnaire
A pre-filled security assessment based on common enterprise requirements. Contact us for additional details.