At Opus 2 security is built into the heart of everything we build and do. We are an ISO:27001 certified organization committed to protecting your data and privacy. Read on to see how we provide a secure alternative to information sharing, process management and collaboration methods that can put clients' data at risk. Please contact the team with any security questions or concerns.
Complete the form to submit your question, query or security concern.×
We understand that providing a secure environment at least partially depends on measuring yourself against industry standards. We have:
As a result of our certification efforts, we have been consistently able to satisfy customer security validation needs. View our security policy.
Security is at the heart of our development process. Whenever a new version of an Opus 2 Product is planned or a new feature is considered, our development teams use a methodology called STRIDE to identify potential threats. A mature risk treatment program is used to assess and track potential threats. Each risk is assessed to quantify the risk profile and likelihood, and assigned a dedicated risk owner to eliminate or mitigate the threat.
We employ a combination of automated and manual testing that involves static binary analysis using industry-standard tooling and continuous checks for third-party dependencies. We also carry out regular internal penetration testing and third-party penetration testing at least once a year.
The code produced by our development teams is fed into a well-structured Continuous Integration (CI) pipeline so that it can be properly tested. Any issues that are found are verified and fed into the bug tracking system. Where possible we try to find solutions that address complete bug classes rather than point solutions for a single finding.
To ensure environments stay the same, we have built environment “templates” that can be deployed automatically. We call this “Infrastructure as Code”. It allows us to build a consistent environment for a client without being prone to human error. It also gives us a standard to measure other environments in order to prevent creep or technical debt.
In addition to regular vulnerability scanning and remediation, we also carry out regular internal penetration testing and third-party penetration testing at least once a year. Our Infrastructure is also subject to a Continuous Assurance service to alert us to relevant emerging threats and provide regular threat hunting activities.
In general Opus 2 uses three approaches for hosting its product infrastructure in Amazon Web Services:
Primary systems are hosted in availability zone EU-WEST–2. Secondary/Backup Systems are hosted in availability zone EU-WEST–1.
Primary systems are hosted in availability zone US-EAST–2. Secondary/Backup Systems are hosted in availability zone US-EAST–1.
If you have specific hosting needs that are unique to your organization, we can find an appropriate solution for your needs.
Opus 2 Services and Agreements meet global legal and regulatory requirements including but not limited to:
Authentication and authorization
There are a number of authentication methods in place to increase the security of accounts. This includes a client-defined password policy and several options for multi-factor authentication. It is also possible to link to your Single Sign-On provider to centralise account control and authentication policies.
As a client, you have full control over the permissions for each user you register to the platform. You can create, modify, and remove users based on your own internal policies.
Encryption at rest
All customer data is hosted on encrypted AWS containers. Encryption keys are programmatically managed through the AWS Key Management System (KMS).
Encryption in transit
All internet-facing application instances are assigned a TLS certificate to ensure that data communicated between your computer and the Opus 2 infrastructure is encrypted using the latest encryption protocols. The certificate is generated through a secure process and only supports encryption protocols and ciphers that are not currently known to be broken or otherwise compromised. All components communicate with each other over TLS.
The Opus 2 ecosystem includes 24/7 security monitoring. Every device, server instance, and application involved in the delivery of services to our clients provides a rich set of data points into our centralized log aggregation platform. Utilizing advanced AI, this data is continuously analyzed for anomalies and any events that potentially indicate a security incident is further investigated by the Opus 2 Incident Response team.
Apart from AWS, we do not rely on any third parties to provide our core products and services to our clients. Where third parties are involved for additional services, security screening is undertaken and an NDA signed. We also conduct the same level of background checks for our own employees and also sign a Data Protection Agreement (DPA) as required by GDPR.
We work with independent court reporters who are considered third parties for the services they provide. Each court reporter receives Opus 2’s Employee Security Awareness Training and signs an NDA with Opus 2. Additionally, a number of the court reporters hold security clearances of varying levels for which they have undergone independent background checks. The court reporters are contractually obliged to maintain the security of client information in line with Opus 2’s security classification and data protection policies.
Connect with our dedicated security team to discuss your security requirements or questionnaires. If you have any questions or concerns or have found something that might impact the security of our services or the products we provide to you, please do not hesitate to reach out to your primary contact at Opus 2 or contact us directly here, providing as much detail as possible.Contact us
Our core information security team consists of three security experts who work with the wider Opus 2 team, from Human Resources to Software Engineering and from Finance to Support, to deliver our products and services as securely as possible.