Confidentiality

  • Authentication: Access to software and components is authenticated.
  • Authorization: Access to software features is authorized using a Role-Based Access Control (RBAC) framework with proper role segregation.
  • Network Access Control: Access is secured using perimeter network controls.

Integrity

  • Data Security: Data is protected both at rest and in motion.
  • Auditability: All key activities are auditable and logged.

Availability

  • High Availability: Built-in failover and redundancy ensure continuous operation.
  • Backup & Recovery: Backup and restoration procedures are defined.
  • Disaster Recovery: Documented processes ensure business continuity in case of failures.

Contact Us

Have questions or want to know more about Eneruni?

We are here to help. Send us a message.

For further details on how your personal data will be processed and how your consent can be managed, refer to the TCS Privacy Notice