Security

Enterprise-Grade
Security Architecture

93 controls across 4 domains. ISO 27001 aligned. Built for organisations where data protection is a regulatory obligation, not a feature checkbox.

ISO 27001 Annex A

93 Controls, 4 Domains

Comprehensive information security management system aligned to the latest ISO 27001:2022 standard.

37

Organisational Controls

Information security policies, roles, responsibilities, threat intelligence, and supply chain security.

8

People Controls

Screening, terms of employment, security awareness, disciplinary processes, and post-employment obligations.

14

Physical Controls

Secure areas, equipment protection, clean desk policies, and physical media management.

34

Technological Controls

Access rights, cryptography, secure development, vulnerability management, and logging/monitoring.

Architecture

Defence in Depth

Multiple layers of security controls protecting data at every stage of its lifecycle.

TLS 1.3 In-Transit Encryption

All data transmitted between clients and WZI infrastructure is encrypted using TLS 1.3.

AES-256 At-Rest Encryption

All stored data is encrypted using AES-256 with managed encryption keys.

Role-Based Access Control

Granular RBAC with principle of least privilege across all modules and data access points.

Complete Audit Logging

Every data access, modification, and administrative action is logged with full attribution.

Zero-Trust Architecture

No implicit trust. Every request is authenticated, authorised, and encrypted regardless of origin.

Data Sovereignty Controls

Data residency controls ensuring information remains within specified jurisdictional boundaries.

Incident Response

Structured Response Lifecycle

Documented incident response procedures aligned to ISO 27001 requirements.

1

Detection

Automated monitoring and anomaly detection across all system layers.

2

Classification

Severity assessment and impact analysis using predefined classification criteria.

3

Containment

Immediate isolation of affected systems to prevent lateral movement.

4

Recovery

Systematic restoration of services with verified integrity checks.

5

Reporting

Regulatory notification, root cause analysis, and lessons learned documentation.

Download our security overview

Request a detailed security briefing including our ISO 27001 compliance architecture.

Request Security Briefing