eBook - 4 Tactics Cyberattackers are Starting to Employ in Account Take Over Attacks Learn more
New Cloudflare Integration - Protecting your company is now simpler with Cloudflare. Learn more
Close
Last Update: 2 July, 2019

Policies and Procedures

Your one place for all documentation related to compliance, security and reliability of our products and services.

Download All
Acceptable Use Policy

The wide array of resources, services, and interconnectivity available via the Internet all introduce risks.

1.1 2019-07-02 Download PDF
Change Management Policy

Deploying changes, updates, and new software into production may, if not managed effectively, result in outages or other customer disruptions.

1.1 2019-07-02 Download PDF
Corporate Security Executive Statement

Identifying and managing any developments that may threaten the resilience and continued survival of a corporation.

1.1 2019-07-02 Download PDF
Data Classification and Handling

Accidental, unauthorized disclosure, theft, and dissemination are among the risks involved in handling sensitive information.

1.1 2019-07-02 Download PDF
Disaster Recovery Plan

Disaster Recovery Plan (DRP) for use in the event of a disaster affecting the data centers or other computing facilities of Castle.

1.1 2019-07-02 Download PDF
Network and Access Control Policy

Accessing and utilizing electronic resources creates risks associated with the methodologies used for such access.

1.1 2019-07-02 Download PDF
Security Administration Manual

Administration and operations of security tasks is a key element in managing data security at Castle.

1.1 2019-07-02 Download PDF
Security Incident Response Plan

Security incidents pose a risk to Castle’s business. Quick and effective handling of such incidents is an important factor in minimizing potential damage.

1.1 2019-07-02 Download PDF
Security Incident Response Template

The following report is used to track a confirmed security incident.

1.1 2019-07-02 Download PDF
Software Development Life Cycle (SDLC)

Process for planning, creating, testing, and deploying an information system.

1.1 2019-07-02 Download PDF
Vendor Risk Management

Process for ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption.

1.1 2019-07-02 Download PDF

See Castle in action

Try the first end-to-end solution to account takeover prevention.
Create Account