Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Introduction from our CTO

If you are reading this document, then you are serious about security. So am I.

I recognise that koppla has both a legal and moral responsibility to ensure that we comply with data protection legislation and industry standards. Our company value is “do the right thing for the customer” and that means not just ticking boxes to ensure your data is safe, but questioning everything we do with the intent of making it safer.

It’s not just the right thing to do; it’s good business sense. We survive by ensuring your data is safe. We thrive by constantly looking for ways to make it even safer.

It’s my intent that all common security questions should be answered here. If you have any further questions, please don't hesitate to get in touch with me at lasse.steffen@koppla.de,

Compliance

GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
TISAX Logo
TISAX
Start your security review
View & download sensitive information
Ask for information

koppla is reviewed and trusted by

Max Bögl-company-logoMax Bögl
ZECH Bau-company-logoZECH Bau
Implenia-company-logoImplenia
LEONHARD WEISS BAU-company-logoLEONHARD WEISS BAU
Instone Real Estate-company-logoInstone Real Estate
KoWo zu Hause in Erfurt.-company-logoKoWo zu Hause in Erfurt.
ISO 27001
Data Processing Agreement
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
IMS Policy
Information Security Policy
Internal and External Communication Policy
Network Security Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Third Party Personnel Policy
Vulnerability Management Policy

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective24-48 hours
View more

Product Security

Product Architecture
Role-Based Access Control
Service-Level Agreement
View more

Reports

Network Diagram
Pentest Report

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Credential Management
Software Development Lifecycle
View more

Data Privacy

Cookies
Data Breach Notifications
Data Privacy Officer
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
BC/DR
View more

Network Security

IDS/IPS
Virtual Private Cloud
Wireless Security

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more

If you need help using this Trust Center, please contact us.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo