security.koppla.de Open in urlscan Pro
2a09:8280:1:667:634a:5608:6788:3e70  Public Scan

URL: https://security.koppla.de/
Submission: On July 13 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

TRUST CENTER

Share
Subscribe
Start your security review
View & download sensitive information
Ask for information
Get Access
Search items

OVERVIEW


INTRODUCTION FROM OUR CTO

If you are reading this document, then you are serious about security. So am I.

I recognise that koppla has both a legal and moral responsibility to ensure that
we comply with data protection legislation and industry standards. Our company
value is “do the right thing for the customer” and that means not just ticking
boxes to ensure your data is safe, but questioning everything we do with the
intent of making it safer.

It’s not just the right thing to do; it’s good business sense. We survive by
ensuring your data is safe. We thrive by constantly looking for ways to make it
even safer.

It’s my intent that all common security questions should be answered here. If
you have any further questions, please don't hesitate to get in touch with me at
lasse.steffen@koppla.de,

COMPLIANCE


GDPR

ISO 27001

TISAX
Start your security review
View & download sensitive information
Ask for information
Get Access
KOPPLA IS REVIEWED AND TRUSTED BY

Max Bögl
ZECH Bau
Implenia
LEONHARD WEISS BAU
Instone Real Estate
KoWo zu Hause in Erfurt.
DOCUMENTS

All
Public
Private
Bulk Download

Request Access to Private Documents
Pentest Report

ISO 27001

Data Processing Agreement

Acceptable Use Policy

Access Control Policy

Anti-Malicious Software Policy

Asset Management Policy

Backup Policy

Business Continuity Policy

BYOD Policy

Data Classification Policy

Data Sanitization Policy

Data Security Policy

Encryption Policy

General Incident Response Policy

IMS Policy

Information Security Policy

Internal and External Communication Policy

Network Security Policy

Other Policies

Password Policy

Physical Security

Risk Management Policy

Software Development Lifecycle

Third Party Personnel Policy

Vulnerability Management Policy




RISK PROFILE

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective24-48 hours
View more
PRODUCT SECURITY

Product Architecture
Role-Based Access Control
Service-Level Agreement
View more
REPORTS

Network Diagram
Pentest Report
DATA SECURITY

Access Monitoring
Backups Enabled
Data Erasure
View more
APP SECURITY

Responsible Disclosure
Credential Management
Software Development Lifecycle
View more
LEGAL

Subprocessors
Data Processing Agreement
Master Services Agreement
View more
DATA PRIVACY

Cookies
Data Breach Notifications
Data Privacy Officer
View more
ACCESS CONTROL

Data Access
Logging
Password Security
INFRASTRUCTURE

Status Monitoring
Amazon Web Services
BC/DR
View more
NETWORK SECURITY

IDS/IPS
Virtual Private Cloud
Wireless Security
CORPORATE SECURITY

Asset Management Practices
Email Protection
Employee Training
View more
POLICIES

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more

If you need help using this Trust Center, please contact us.

Contact Support

If you think you may have discovered a vulnerability, please send us a note.

Report Issue
Powered by