Search
You can find the results of your search below.
Fulltext results:
- Minimum Viable Secure Product (MVSP) Implementation Overview
- s a breakdown of how each MVSP requirement is met using Unicis-native tools or vetted third-party open-so... on (MFA) | MFA required for all critical systems using TOTP or YubiKey. Enforced at SSO level. ... AC + SSO + MFA enforced. Access reviews quarterly using **Unicis Cybersecurity Controls**. Inactive accou
- IT Security Policy @pub:trust_center:policies
- nd plugins that you can trust. We at Unicis are using the [[https://mvsp.dev/|Minimum Viable Secure Pro... * Store passwords in a hashed and salted format using a memory-hard or CPU-hard one-way hash function ... omponents and libraries for known vulnerabilities using automatic systems like [[https://docs.gitlab.com/
- Trusted Subprocessors and Infrastructure Overview
- suite of client-server software for creating and using file hosting services. Used for internal collabor
- Privacy Policy @pub:trust_center:policies
- suite of client-server software for creating and using file hosting services. - [[https://meet.jit.si/|J