1. Security Philosophy
Atlas is designed as mission-critical infrastructure for institutional users. Our security model reflects the sensitivity of the data we process, the sophistication of our users, and the responsibility assumed by Bay Street Hospitality as a platform operator. Security is treated as a foundational system requirement, embedded across all layers of the platform.
2. Data Encryption
All data transmitted to and from Atlas is encrypted using industry-standard protocols:
- TLS 1.2+ (or higher) encryption for all data in transit
- Encryption at rest for sensitive data storage
- Secure key management, including rotation and access controls aligned with best practices
3. Access Controls
Access to Atlas systems and data is governed by strict authentication and authorization controls:
- Role-based access control (RBAC) across all platform modules
- Multi-factor authentication (MFA) enforced for all user accounts
- Principle of least privilege applied across system and infrastructure layers
- Continuous monitoring of authentication events and access patterns
4. Infrastructure Security
Atlas is hosted on secure, enterprise-grade cloud infrastructure with layered defenses:
- Segmented and isolated network environments
- Firewall configurations and access restrictions at multiple levels
- Continuous system monitoring, logging, and anomaly detection
- Regular vulnerability assessments and third-party penetration testing
- Controlled and audited deployment and update processes
5. Third-Party Risk Management
All infrastructure and data service providers are subject to rigorous evaluation and oversight:
- Security due diligence and vendor risk assessments
- Contractual obligations including confidentiality and data protection requirements
- Ongoing monitoring to ensure compliance with security standards
6. Incident Response
In the event of a security incident, Bay Street follows a structured and documented response protocol:
- Immediate containment, investigation, and impact assessment
- Notification to relevant stakeholders and authorities, where required
- Remediation, recovery, and post-incident review
- Continuous improvement of controls based on incident learnings
7. Ongoing Commitment
Security practices are continuously reviewed and enhanced to address:
- Evolving threat landscapes
- Industry best practices and standards
- Institutional expectations and regulatory considerations
8. Contact
For security-related inquiries or to report a vulnerability, contact us directly:
Email: info@baystreethospitality.com